• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

463 Running courses in Cardiff delivered Live Online

Troubleshooting VMware vRealize Operations [V8.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators tasked with maintaining a vRealize Operations cluster Overview By the end of the course, you should be able to meet the following objectives: Identify the vRealize Operations components affected in typical troubleshooting scenarios List the environmental and operational factors that can generate problems in vRealize Operations Use self-monitoring tools to assess and troubleshoot operational issues in vRealize Operations Access CLI-based tools to assess and troubleshoot operational issues in vRealize Operations Use the vRealize Operations API tool to retrieve cluster data and perform actions Retrieve and review log files associated with specific vRealize Operations components Use available tools to troubleshoot problem scenarios in vRealize Operations Identify the best practices to ensure a vRealize Operations instance remains in a healthy state Locate resources to help you troubleshoot vRealize Operations This two-day course gives VMware vRealize© Operations? administrators the skills to perform basic troubleshooting tasks. The course also gives administrators the skills to ensure that their vRealize Operations instance meets its use-case objectives of continuous performance optimization, app-aware intelligent remediation, and integrated compliance. Course Introduction Introduction and course logistics Course objectives Running a vRealize Operations Instance Identify the components of a vRealize Operations cluster Identify common problems that affect vRealize Operations List the environmental and operational factors that can affect vRealize Operations Identify the affected components vRealize Operations Troubleshooting Tools Use vRealize Operations self-monitoring tools to troubleshoot problems Use CLI tools to troubleshoot vRealize Operations problems Identify the log files used by individual vRealize Operations components Run commands to analyze vRealize Operations log files Use the vRealize Operations API tool vRealize Operations Troubleshooting Scenarios Use relevant tools to troubleshoot problem scenarios Maintaining vRealize Operations Use best practices to ensure the vRealize Operations cluster remains in a healthy state Back up and restore vRealize Operations Identify vRealize Operations troubleshooting resources Additional course details: Nexus Humans Troubleshooting VMware vRealize Operations [V8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Troubleshooting VMware vRealize Operations [V8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Troubleshooting VMware vRealize Operations [V8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

Deep Learning on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Developers responsible for developing Deep Learning applications Developers who want to understand concepts behind Deep Learning and how to implement a Deep Learning solution on AWS Overview This course is designed to teach you how to: Define machine learning (ML) and deep learning Identify the concepts in a deep learning ecosystem Use Amazon SageMaker and the MXNet programming framework for deep learning workloads Fit AWS solutions for deep learning deployments In this course, you?ll learn about AWS?s deep learning solutions, including scenarios where deep learning makes sense and how deep learning works. You?ll learn how to run deep learning models on the cloud using Amazon SageMaker and the MXNet framework. You?ll also learn to deploy your deep learning models using services like AWS Lambda while designing intelligent systems on AWS. Module 1: Machine learning overview A brief history of AI, ML, and DL The business importance of ML Common challenges in ML Different types of ML problems and tasks AI on AWS Module 2: Introduction to deep learning Introduction to DL The DL concepts A summary of how to train DL models on AWS Introduction to Amazon SageMaker Hands-on lab: Spinning up an Amazon SageMaker notebook instance and running a multi-layer perceptron neural network model Module 3: Introduction to Apache MXNet The motivation for and benefits of using MXNet and Gluon Important terms and APIs used in MXNet Convolutional neural networks (CNN) architecture Hands-on lab: Training a CNN on a CIFAR-10 dataset Module 4: ML and DL architectures on AWS AWS services for deploying DL models (AWS Lambda, AWS IoT Greengrass, Amazon ECS, AWS Elastic Beanstalk) Introduction to AWS AI services that are based on DL (Amazon Polly, Amazon Lex, Amazon Rekognition) Hands-on lab: Deploying a trained model for prediction on AWS Lambda Additional course details: Nexus Humans Deep Learning on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Deep Learning on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Deep Learning on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

M10961 Automating Administration with Windows PowerShell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. Overview After completing this course, students will be able to: Describe the functionality of Windows PowerShell and use it to run and find basic commands. Identify and run cmdlets for server administration. Work with Windows PowerShell pipeline. Describe the techniques Windows PowerShell pipeline uses. Use PSProviders and PSDrives to work with other forms of storage. Query system information by using WMI and CIM. Work with variables, arrays, and hash tables. Write basic scripts in Windows PowerShell. Write advanced scripts in Windows PowerShell. Administer remote computers. Use background jobs and scheduled jobs. Use advanced Windows PowerShell techniques. This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows based servers. Getting Started with Windows PowerShell Overview and Background Understanding command syntax Finding commands Lab : Configuring Windows PowerShell Lab : Finding and Running Basic Commands Cmdlets for administration Active Directory administration cmdlets Network configuration cmdlets Other server administration cmdlets Lab : Windows Administration Working with the Windows PowerShell pipeline Understanding the Pipeline Selecting, Sorting, and Measuring Objects Filtering Objects Out of the Pipeline Enumerating Objects in the Pipeline Sending pipeline data as output Lab : Using the Pipeline Lab : Filtering Objects Lab : Enumerating Objects Lab : Sending output to a file Understanding How the Pipeline Works Passing the pipeline data Advanced considerations for pipeline data Lab : Working with Pipeline Parameter Binding Using PSProviders and PSDrives Using PSProviders Using PSDrives Lab : Using PSProviders and PSDrives Querying Management Information by Using WMI and CIM Understanding WMI and CIM Querying Data with WMI and CIM Making changes with WMI/CIM Lab : Working with WMI and CIM Working with variables, arrays, and hash tables Using variables Manipulating variables Manipulating arrays and hash tables Lab : Working with variables Basic scripting Introduction to scripting Scripting constructs Importing data from files Lab : Basic scripting Advanced scripting Accepting user input Overview of script documentation Troubleshooting and error handling Functions and modules Lab : Accepting data from users Lab : Implementing functions and modules Administering Remote Computers Using basic Windows PowerShell remoting Using advanced Windows PowerShell remoting techniques Using PSSessions Lab : Using basic remoting Lab : Using PSSessions Using Background Jobs and Scheduled Jobs Using Background Jobs Using Scheduled Jobs Lab : Using Background Jobs and Scheduled Jobs Using advanced Windows PowerShell techniques Creating profile scripts Using advanced techniques Lab : Practicing advanced techniques Lab : Practicing script development (optional)

M10961 Automating Administration with Windows PowerShell
Delivered OnlineFlexible Dates
Price on Enquiry

10961 Automating Administration with Windows PowerShell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. Overview After completing this course, students will be able to:Describe the functionality of Windows PowerShell and use it to run and find basic commands.Identify and run cmdlets for server administration.Work with Windows PowerShell pipeline.Describe the techniques Windows PowerShell pipeline uses.Use PSProviders and PSDrives to work with other forms of storage.Query system information by using WMI and CIM.Work with variables, arrays, and hash tables.Write basic scripts in Windows PowerShell.Write advanced scripts in Windows PowerShell.Administer remote computers.Use background jobs and scheduled jobs.Use advanced Windows PowerShell techniques. This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows based servers. Getting Started with Windows PowerShell Overview and Background Understanding command syntax Finding commands Lab : Configuring Windows PowerShell Lab : Finding and Running Basic Commands Cmdlets for administration Active Directory administration cmdlets Network configuration cmdlets Other server administration cmdlets Lab : Windows Administration Working with the Windows PowerShell pipeline Understanding the Pipeline Selecting, Sorting, and Measuring Objects Filtering Objects Out of the Pipeline Enumerating Objects in the Pipeline Sending pipeline data as output Lab : Using the Pipeline Lab : Filtering Objects Lab : Enumerating Objects Lab : Sending output to a file Understanding How the Pipeline Works Passing the pipeline data Advanced considerations for pipeline data Lab : Working with Pipeline Parameter Binding Using PSProviders and PSDrives Using PSProviders Using PSDrives Lab : Using PSProviders and PSDrives Querying Management Information by Using WMI and CIM Understanding WMI and CIM Querying Data with WMI and CIM Making changes with WMI/CIM Lab : Working with WMI and CIM Working with variables, arrays, and hash tables Using variables Manipulating variables Manipulating arrays and hash tables Lab : Working with variables Basic scripting Introduction to scripting Scripting constructs Importing data from files Lab : Basic scripting Advanced scripting Accepting user input Overview of script documentation Troubleshooting and error handling Functions and modules Lab : Accepting data from users Lab : Implementing functions and modules Administering Remote Computers Using basic Windows PowerShell remoting Using advanced Windows PowerShell remoting techniques Using PSSessions Lab : Using basic remoting Lab : Using PSSessions Using Background Jobs and Scheduled Jobs Using Background Jobs Using Scheduled Jobs Lab : Using Background Jobs and Scheduled Jobs Using advanced Windows PowerShell techniques Creating profile scripts Using advanced techniques Lab : Practicing advanced techniques Lab : Practicing script development (optional)

10961 Automating Administration with Windows PowerShell
Delivered OnlineFlexible Dates
Price on Enquiry

BW305 SAP Business Warehouse Query Design and Analysis

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Learn how to create queries in BEx Query DesignerLearn how to use advanced query functionsLearn how to perform OLAP analysis In this course, students obtain the knowledge to create query definitions using the BEx Query Designer and to make them available for OLAP analysis. Data Warehousing Describing Data Warehousing Describing Data Warehouse Architecture Using Reporting Tools Navigation Options in Reports Using the Navigation Options in Reports Saving Analysis Views Simple Queries Creating Simple Queries Finding a Query Filtering Query Definition Data Configuring Query Properties Key Figures and Structures in Queries Creating Restricted Key Figures Creating Calculated Key Figures Creating a New Formula with Boolean Operators Configuring Properties of Key Figures Using Exception and Nested Exception Aggregation Queries with Multiple Structures Creating Structures Resolving Formula Collision Designing Detailed Queries with the Cell Editor Characteristics and Hierarchies in Queries Configuring the Properties of Characteristics Running Display and Navigation Attribute Queries Adding Hierarchies to Reports Adding External Hierarchies to a Report Using Hierarchies and Structures Creating External Hierarchies Variables in Queries Using Variables Creating Characteristic Value and Text Variables in Queries Creating Hierarchy and Hierarchy Node Variables in Queries Creating Formula Variables in Queries Activating Business Content Variables Exceptions and Conditions in Queries Creating Exceptions in Query Design Creating Conditions in Query Design Report-Report Interface Using the Report-Report Interface Query Performance Optimization Optimizing Query Performance Configuring Query Read Mode Use Performance Monitoring Tools Queries Management and Authorizations Overview Managing Query Objects Describing Authorizations Reporting Options Outlining Reporting Options for SAP NetWeaver BW Additional course details: Nexus Humans BW305 SAP Business Warehouse Query Design and Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW305 SAP Business Warehouse Query Design and Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BW305 SAP Business Warehouse Query Design and Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 3 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This course is designed for experienced Linux administrators who require networking and security administration skills. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode Additional course details: Nexus Humans Enterprise Linux System Admin 3 with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin 3 with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Enterprise Linux System Admin 3 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry

Learning Git and GitHub

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for developers who want to learn about Git and GitHub. Overview Upon completion of this course, participants will be able to: ? Install and run Git ? Describe basic concepts of Git version control ? Work on multiple branches ? Optimize merging and fixing merge conflicts ? Create and manage GitHub repositories ? Collaborate using GitHub This hands-on course teaches participants how to integrate Git and GitHub into their daily command-line workflow. Git operations, customizations of Git functionality, and how to connect to Git via Eclipse are covered as well. Introduction Introduction to Version Control Systems The Birth of Git and Why Git? What is GitHub? GitHub Repository Concepts Getting Started With Git Installing and Running Git The Git command Line Configuration Files Creating your First Git Repository Staging Area Git Commit Viewing History Creating Aliases and Shortcuts Hands-on Lab Session Getting Started with GitHub Creating and Configuring a Repository in GitHub Uploading your Repository to GitHub Understand Repository?s Main Page Using the README Hands-on Lab Session File Management in Git Locally The Index File Classifications in Git Rename a File Delete a File Ignore Files using .gitignore File Hands-on Lab Session Collaboration on Pull Requests Cloning and Forking Repositories Creating a Pull Request Collaborating a Pull Request Merging on a Pull Request Working with Branches Hands-on Lab Session Integrating GitHub with Eclipse Introducing EGit Plugin Configuring GitHub in Eclipse Working with Eclipse Hands-on Lab Session Reviewing and Configuring a Project on GitHub Configuring a Repository Adding Collaborators Creating Organizations Managing Teams Introducing Issues Merging, Rebasing and Resolving Conflicts Merging Branches Git diff and Commit Ranges Working with Merge Conflicts Merge Strategies Introduction to Rebasing Rebasing Branches Reverting and Fixing Bad Commits Hands-on Lab Session Additional course details: Nexus Humans Learning Git and GitHub training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Learning Git and GitHub course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Learning Git and GitHub
Delivered OnlineFlexible Dates
Price on Enquiry

Professional administrator (In-House)

By The In House Training Company

Today's administrative professional needs flexibility and a broad portfolio of skills including self-motivation, assertiveness, and the ability to deal with difficult people. You will benefit from this course if you are an administrator, medical/legal secretary or PA, who wants to enhance your administrative support skills, as well as evaluating your existing techniques. This course will help you identify: your areas of strength and your areas for improvement in the work environment ways to accept new challenges and responsibilities with confidence what motivates you at work techniques to improve your planning and time management ways of improving your influencing and assertiveness skills your preferred working style (and relate it to your interaction with others) ways of using your initiative how to deal with challenging people, using recognised communication methods The course will help you develop a flexible set of skills that will allow you to succeed at work, no matter what the day throws at you. It will help you communicate effectively with a diverse range of colleagues and others with tact and diplomacy. And, finally, it will help you provide the administrative support that is essential for the smooth running of your area and of the organisation as a whole. 1 Introduction Overview Introductions Individual objectives 2 What exactly is your role? Before looking at new skills and techniques, where are you now? Do you have the skills, knowledge and attitude required to be an exceptional administrator? Understand your job criteria Identifying your strengths and areas for development Activity - skills analysis Activity - action plan 3 Building trust How can you build trust? Understanding the links between reliability, consistency and trust What is required to deliver efficient service? Activity: efficient service requirements of the professional administrator 4 Working styles Identifying your working style preference Understanding the importance of a flexible approach Identifying areas of improvement to become a more effective team member Activity: Questionnaire (completing, scoring and charting) Activity: drawbacks of my style Developing your working style 5 Assertiveness Understand the differences between behaviours Activity: Definition and characteristics of assertive / aggressive / passive behaviour Activity: Identifying different behaviours Understanding how to be more assertive How to use assertiveness techniques How to ask for feedback Activity: Making requests assertively Activity: Refusing requests assertively 6 Time management The importance of planning for success The importance of managing interruptions The importance of having clear purpose Time management best practices Activity: How do you plan your time? What prevents you improving your time management? How will you recognise success? 7 Prioritisation How to prioritise work to meet deadlines The prioritisation matrix Activity: Post it! 8 Dealing with interruptions The impact interruptions have on productivity How to manage interruptions Activity: What interruptions do you experience? What tactics can be employed to reduce these interruptions? 9 Close Open forum Summary Action planning

Professional administrator (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry