Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers who are responsible for deployment and application engineering for Cisco Unified Contact Center Express customers. System and technical support engineers. Day 1 and Day 2 support personnel. Customers deploying and maintaining Cisco Unified CCX Overview Upon completing this course, the learner will be able to meet these overall objectives: Review Cisco Unified CCX environment components Create prompt recording tools Create a helpdesk script Apply common sense principles for scripting and system management, such as: Prompt, document, and grammar management Using the default script Scripting for proper call termination and ending a script Abandon rates Exception handling Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Setup access and use an external database Define and use skills Script for conditional routing Script for basic callback scenarios Setup and use enterprise data and session management Script for queuing and scheduled callback scenarios Building on the knowledge base and scripting experience learned in the UCCXD class, the student will explore advanced techniques in scripting and overall Cisco Unified CCX functionality. During this five day class the students will use advanced scripting to implement features that extend the functionality of Cisco Unified CCX using many of the tools that are already available in the premium version of the product. Students should expect to spend time using the script editor and other tools to create developer tools and enhanced scripts to provide for a more functional and user-friendly customer experience. Activities include creating prompt recording tools, applying common sense scripting principles, creating simple and complex ACD routing scripts, holiday routing, external database access, various callback scenarios such as non-queuing, queuing, and scheduled callbacks, defining and using enterprise data, passing data from one script to another using session management, and much more. Additionally, since this class focuses on complex scripting concepts, it requires the student to learn more about fundamental scripting requirements such as data manipulation and formatting, using variables and array variables, and using Java programming methods. Course Introduction Learner Prerequisite Skills and Knowledge Course Goal Course Objectives Course Flow General Administration Lab Diagram Please Introduce Yourself Lesson 1: Cisco Unified CCX Overview Components of the Cisco Unified CCX Environment Gateways Routers Cisco Unified Communications Manager Cisco Unified CCX Script Editor Cisco Finesse Cisco Unified Intelligence Center Cisco Unified CCX Agent External Servers Cisco Unified CCX System Cluster Components Engine Database Server Call Flow Terms The Call Flow The Debug Process Reactive Non-Reactive Lesson 2: Prompt Recording Utilities Prompt Recorder Emergency Message Recorder Lesson 3: Basic ACD Routing Review Script Steps used in a Simple ACD Routing Script Resource Group Routing Defining the Contact Service Queue Create a Simple ACD routing script Lesson 4: Common Scripting Concepts Prompt Management Using the Default Script Terminating a Call and Ending a Script Abandon Rates Exception Handling Script Interruptions Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Lesson 5: Accessing an External Database Database architecture and supported databases Setting up the Database Subsystem Using Database script steps Lesson 6: Skills Based Routing Appling skills to agents Defining the Contact Service Queue Specifying the CSQ in the Script Lesson 7: Advanced ACD Routing Overflow Routing When to Overflow How to get the Data Needed for Making Decisions Describe Methods of Overflowing Lesson 8: Basic ACD Callback Options Setup the Email Subsystem Script for Email Notification Script for Leaving a Recorded Message Script for Callback when Queue Times have Decreased Lesson 9: Enterprise Data and Session Management Define Enterprise Data in Cisco Finesse Define a Call Variable Layout in Cisco Finesse Define ECC Variables in the script editor Set Enterprise Data in the script Define Session Management Setup Session Management Use Session Management to Pass Variable Information Between Scripts Lesson 10: Advanced ACD Callback Options Leave Queued Message with an Option for Callback Scheduled Callback
Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course will help you to prepare for the Cisco Certified Network Associate (CCNA) certification exam. The course covers all the major topics of computer networking and network devices, such as Internet Protocol (IP) addressing, routing, switching, Transmission Control Protocol/Internet Protocol (TCP/IP), Network Address Translation (NAT), Dynamic Host Configuration Protocol (DHCP), and Domain Name System (DNS).
Dive into the structured elegance of web development with our ASP.NET MVC Essential Training Course. Built around the fundamentals of the Model-View-Controller architecture, this course introduces the clean separation of concerns that developers admire and employers expect. Whether you're familiar with basic C# or just starting to explore structured programming, this course serves as your gateway to crafting dynamic, scalable, and organised web applications using Microsoft's popular framework. Without throwing in unnecessary jargon or fluff, we've designed the learning experience to be sharp, SEO-friendly, and laser-focused on what truly matters — learning ASP.NET MVC the right way. You'll navigate through routing, controllers, views, models, and data handling in a way that keeps the process refreshingly clear. The goal? To get you comfortable with MVC architecture and let you develop web applications that are not only efficient but logically sound and maintainable. This course speaks to the coder in you who prefers clean code over clutter and logic over guesswork. Learning Outcomes: Understand the fundamentals of ASP.NET MVC 5 framework Learn how to create and configure an ASP.NET MVC application Develop knowledge of Model, View, and Controller (MVC) architecture and its components Gain expertise in URL routing, views, filters, and areas Learn how to implement Ajax calls in an ASP.NET MVC application The ASP.NET MVC Essential Training bundle is a comprehensive package designed for individuals who want to learn how to develop web applications using the ASP.NET MVC framework. The course covers a range of topics, from the fundamentals of MVC architecture to advanced concepts such as URL routing and Ajax. Participants will learn how to create and configure an ASP.NET MVC application, understand the components of Model, View, and Controller (MVC), and develop expertise in views, filters, and areas. This course is ideal for anyone who is interested in web development, particularly those who want to learn how to create web applications using the ASP.NET MVC framework. It is suitable for beginners as well as individuals with some experience in web development. The course is also suitable for software developers who want to expand their skill set and gain expertise in ASP.NET MVC development. ASP.NET MVC Essential Training Course Curriculum Section 01: ASP.Net MVC 5 Section 02: Your First application Section 03: Controller Fundamentals Section 04: Model fundamentals Section 05: URL Routing Section 06: View Fundamentals Section 07: Filters Section 08: Controllers In Depth Section 09: Views In Depth Section 10: Areas Section 11: Ajax How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of __ GBP. £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring web developers who want to learn ASP.NET MVC framework Web developers who want to expand their skill set and gain expertise in ASP.NET MVC development Professionals who want to build scalable and robust web applications Students who want to pursue a career in web development Anyone interested in learning the latest web development technologies Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path ASP.NET MVC Developer: £30,000 - £60,000 Web Developer: £22,000 - £45,000 Software Engineer: £25,000 - £65,000 Full Stack Developer: £28,000 - £75,000 Application Developer: £26,000 - £55,000 Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9. Certificate of completion Hard copy certificate - £15 Hard copy can be sent to you via post at the expense of £15.
Course Overview Learn the Latest Skills | Accredited by CPD | Recognised Certificate | MCQ Based Exam & Tutor Support | Interactive Video Training Advanced Cyber Security Course is one of our best selling and most popular course. This course gives you the background needed to understand basic cyber security and risk management. This program will provide you with the knowledge and abilities necessary to defend networks, create secure infrastructures, safeguard electronic assets, prevent cyberattacks, and protect your own privacy. The Advanced Cyber Security Course is organised into 3 modules and includes everything you need to become successful in this profession. What Will You Learn? Discover security vulnerabilities across an entire network by using network hacking techniques and vulnerability scanning Understand how we are tracked online by corporations, nation-states, your ISP and others Perform network monitoring to discover and identify potential hackers and malware You will learn how networking affects security systems within an organization What classes are included in this package? Earn a digital Certificate upon successful completion accredited by UK and internationally recognised accredited qualification There are no set schedules, so you can work at your own pace. Our email and live chat specialists are available to assist you 24 hours a day, 7 days a week. On weekdays, you'll have access to a full-time tutor. Learn in a user-friendly, cutting-edge online learning environment. High-quality e-learning study materials Lifetime Access Benefit from instant feedback through mock exams and multiple-choice assessments Who Should Take This Course? The Advanced Cyber Security Course course is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all students from any academic background to learn more about this subject. The Diploma in Professional Chef course is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all students from any academic background to learn more about this subject. Career Path Training offered by the Advanced Cyber Security Course could potentially benefit a range of roles but would particularly enhance careers in: Software Developer Network Administrator Cybersecurity Engineer Malware Analyst Computer Forensics Analyst Security Architect Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessments Assignment Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £119. Please note that overseas students may be charged an additional £10 for postage. Certificate of Achievements from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £119. Please note that overseas students may be charged an additional £10 for postage. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment On successful completion of the Advanced Cyber Security Course, you will be required to sit an online multiple-choice assessment. You will need to score 60% or above to pass the course. After successfully passing the exam, you will be able to apply for a Quality Licence Scheme endorsed certificate of achievement. The assessment will be evaluated automatically, and the results will be given to you immediately.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for skilled users of Microsoft Windows and Office who do not have prior coding or programming experience and who are interested in creating custom business apps quickly and without writing application code. Overview In this course, you will use Microsoft Power Apps to build and deploy low-code business apps. You will: Determine how Microsoft Power Apps can meet your business needs. Plan and design apps. Build canvas apps. Build model-driven apps. Test and deploy apps. This course introduces building low-code/no-code apps with Microsoft© Power Apps©. Most out-of-the-box solutions do not meet exact business needs or integrate well with existing business apps. Power Apps eases users into app development with templates, automated app-building tools, and a streamlined programming language to enable any business user to create a custom app. Getting Started with Microsoft Power Apps Topic A: Introduction to Microsoft Power Platform Topic B: Introduction to Power Apps Topic C: Select App Types to Address Business Needs Planning and Designing Apps Topic A: Plan Apps Topic B: Design Apps Building Canvas Apps Topic A: Create an App from a Blank Canvas Topic B: Create an App from a Template Building Model-Driven Apps Topic A: Create Model-Driven Apps Topic B: Add Visualizations and Reports Testing and Deploying Apps Topic A: Make Apps Available to Other Users Topic B: Test Apps Topic C: Revise Apps
Duration 2 Days 12 CPD hours This course is intended for This course is intended for software testers, architects, engineers, or other related roles, who wish to apply AI to software testing practices within their enterprise. While there are no specific pre-requisites for this course, it would be helpful is the attendee has familiarity with basic scripting (Python preferred) and be comfortable with working from the command line (for courses that add the optional hands-on labs). Attendees without basic scripting skills can follow along with the hands-on labs or demos. Overview This course introduces AI and related technologies from a practical applied software testing perspective. Through engaging lecture and demonstrations presented by our expert facilitator, students will explore: Exploring AI Introduction to Machine Learning Introduction to Deep Learning Introduction to Data Science Artificial Intelligence (AI) in Software Testing Implementing AI in Test Automation Innovative AI Test Automation Tools for the Future Implementing AI in Software Testing / AI in Test Automation is an introductory-level course for attendees new to AI, Machine Learning or Deep Learning who wish to automate software testing tasks leveraging AI. The course explores the essentials of AI, ML and DL and how the integrate into IT business operations and initiatives. Then the course moves to specifics about the skills, techniques and tools used to apply AI to common software testing requirements. Exploring AI AI-Initiatives The Priority: Excellence AI- Intelligence Types The Machine Learning Types The Quality Learning Initiative The Inception in Academics AI - Importance & Applications The Re-visit Learning Re-visited via AI Teaching in the world of AI Exploring AI for Self-Development AI In Academics Beyond Academics Introduction to Machine Learning What is Machine Learning? Why Machine Learning? Examples - Algorithms behind Machine Learning Introduction to Deep Learning What is Deep Learning? Why Deep Learning? Example - Deep Learning Vs Machine Learning Introduction to Data Science What is Data Science? Why Data Science? Examples - Use Cases of Data Science Artificial Intelligence (AI) in Software Testing What is AI in Software Testing? The Role of AI Testing Why do we Need AI in Software Testing? Pros and Cons of AI in Software Testing Applications of AI in Software Testing Is it time for Testers or QA Teams to worry about AI? Automated Testing with Artificial Intelligence Implementing AI in Test Automation Training the AI Bots Challenges with AI-powered Applications Examples - Real World use cases using Artificial Intelligence Demo - Facial Emotion Detection Using Artificial Intelligence Demo - Text Analysis API Using Artificial Intelligence Demo - EYE SPY Mobile App Using Artificial Intelligence Innovative AI Test Automation Tools for the Future Tools used for Implementing AI in Automation Testing What is NEXT? AI Test Automation Demo using Testim
Duration 1.5 Days 9 CPD hours This course is intended for Application developers on the beginner and intermediate level seeking to create and deploy secure Android applications. Overview Understand Android software architecture. Understand Android?s security model. Build Android applications with security best practices in mind. Build more secure and more robust application that appeals to clients. This is a two-day (12 hours) professional course, which thoroughly covers the Android security model and concerns of both the developer and end-user point of view. This course is mapped for AND-802 exam. PermissionsManaging the Policy FileUsers? Data Privacy and ProtectionSecuring Storage Additional course details: Nexus Humans Android Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is targeted towards developers looking to build a career as a Node.js developer. This course offers you a deep but gentle dive into Node.js. You will start off by discovering the basic building blocks of the modern JavaScript language, which are necessary for you to have a good grasp of Node.js, before delving into the fundamentals of Node.js.Most courses quickly dive into Node.js forgetting that, at the end of the day, Node.js is still JavaScript. This can be challenging for JavaScript newbies who are then trying to build a solid house on a shaky foundation.This course overcomes that obstacle by beginning with a quick introduction to the modern JavaScript language (ES6+). You will then discover Node's asynchronous programming model and examine Node's module system, including built-in modules and application modularization, as well as the NPM third-party module registry. We will finish off by working on a simple web application API using the Hapi.js and Knex.js frameworks. Introducing React and UI Design What is React? How to Set Up a React-Based Application How to Design a UI Creating Components Definition of a Component Using JSX Composing Components Data Propagation Managing the Internal State Managing User Interactivity Managing User Interaction Component Lifecycle Events Additional course details: Nexus Humans Beginning Frontend Development with React training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning Frontend Development with React course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real