Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase AdministratorsDatabase DesignersSupport EngineerTechnical Administrator Overview Monitor the DatabaseManage Database PerformanceImplement Database AuditingConfigure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and TasksSchedule Jobs to Run Inside or Outside of the DatabaseConfigure Oracle Net ServicesConfigure your Database For Backup and Recovery OperationsDescribe Oracle Database ArchitectureManage the Oracle Database InstanceManage Oracle Database Storage structuresCreate and Administer User Accounts The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance. The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.
Our Level 2 Award in Safe Moving and Handling (RQF) is a regulated and nationally recognised qualification designed for those who work, or intend to work, in a role that involves manual handling. It is ideal for those working in a variety of environments including warehouses and shops.
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for a wide range of managers and staff members who need to successfully manage small- to medium-sized projects. Overview Upon successful completion of this course, students will be able to: - plan the project and its parameters, including its scope, requirements, resources, and constraints. - implement the project plan, which includes putting the work of the project in motion and delegating tasks, and then monitoring the progress of the project and managing changes as they arise. In this course, students will identify methods of effectively managing small- to medium-sized projects and achieving their stated objectives. Planning the Project Define the Project Requirements Create Your Project Plan Implementing the Project Plan Execute the Project Plan Monitor the Progress of the Project Negotiate for Success Evaluate the Process
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 2 Days 12 CPD hours This course is intended for This course is most valuable for individuals who have been given responsibilities to create or maintain a website. It will also be valuable for new web designers, web developers, and graphic artists who want to extend their skills in creating complete websites. Learning how to use Dreamweaver CC will enable the practitioner to create web pages and sites in the most efficient manner. Overview In this course, you will use Dreamweaver CC to design, build, maintain, and upload websites. You will: ?Identify Dreamweaver fundamentals.?Create websites.?Create web pages.?Insert tables and import content into web pages. ?Create reusable site assets.?Link web pages and send the website to the server. In this course, you will learn to maintain and administer your website with Dreamweaver?s site and page management tools. In this course, you will learn to maintain and administer your website with Dreamweaver?s site and page management tools.
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features
Duration 2 Days 12 CPD hours This course is intended for Support Consultant System Administrator Technology Consultant Overview The objective of this course is to enable students to use the one-step migration procedure (DMO - Database Migration Option) to SAP HANA autonomously. This course covers the most important tasks for an SAP HANA administrator for the combined update & migration of an SAP system to the SAP HANA database. Furthermore, it provides details about the procedure and technical details of the process. Getting Familiar with Database Migration Option (DMO) Listing DMO Benefits Explaining DMO Basics Preparing Database Migration Option (DMO) Procedure Ensuring DMO Prerequisites are Fulfilled on the Host Configuring SAP Host Agent for DMO Examining the SUM UI Configuration of Database Migration Option (DMO) Procedure Starting the DMO Run Continuing DMO with Roadmap Steps Configuration and Checks Continuing DMO with Roadmap Steps Preprocessing Listing DMO Procedure Steps Monitoring the Migration Resetting the DMO Procedure Tuning the DMO Downtime Listing the DMO Steps After Roadmap Step Preprocessing Explaining the DMO Release Schedule Listing Migration Options to SAP HANA
Duration 1 Days 6 CPD hours This course is intended for This course is intended for SharePoint administrators who work in a Windows network environment. At least one year of experience managing SharePoint servers and using PowerShell is recommended. Overview At Course Completion?Configure SharePoint Servers using PowerShell?Manage SharePoint Server Administration with PowerShell?Manage SharePoint Server Maintenance with PowerShell This course provides students with the knowledge and skills needed to use PowerShell to administer SharePoint Servers. Students will learn how to manage day-to-day and automated tasks carried out by SharePoint Administrators. Install and Configure SharePoint Servers with PowerShell Overview Preparing the Server Configure Server Features Configure Prerequisite Applications Install SharePoint Software Configure SharePoint Farm Review Lab 1: Configure SharePoint Servers with PowerShell Administering SharePoint Servers with PowerShell Overview Administering Users and Groups Administering the Farm Administering Shared Services & Features Administering Sites Administering Databases Review Lab 1: Administering SharePoint Servers with PowerShell Maintaining SharePoint Servers with PowerShell Overview Managing Backups / Restores Monitoring and Auditing Managing Notifications Scheduling Tasks Review Lab 1: Maintaining SharePoint Servers with PowerShell
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management