• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37729 Success courses

Public Speaking

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to become more confident and relaxed when speaking in front of an audience. Overview Upon successful completion of this course, students will become more confident and relaxed in front of an audience which will translate into a successful speaking event. In this course, students will learn some basic public speaking skills, including in-depth information on developing an engaging program and delivering their presentation with power. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Identifying Your Audience Performing a Needs Analysis Creating an Audience Profile Identifying Key Questions and Concerns Creating a Basic Outline Outlining the Situation Identifying the Task That Had to Be Performed Listing the Actions You Took Revealing the Results Organizing the Program Making Organization Easy Organizational Methods Classifying and Categorizing Fleshing It Out Identifying Appropriate Sources Establishing Credibility The Importance of Citations Putting It All Together Writing Your Presentation Adding a Plan B Reviewing, Editing, and Rewriting Being Prepared Checking Out the Venue Gathering Materials A 24 Hour Checklist Overcoming Nervousness A Visit from the Boss Preparing Mentally Physical Relaxation Techniques Appearing Confident in Front of the Crowd Delivering Your Speech (I) Starting Off on the Right Foot Using Visual Aids Checking the Volume of Your Voice Delivering Your Speech (II) Adjusting on the Fly Gauging Whether Breaks Are Required Wrapping Up and Winding Down Questions and Answers Ground Rules Answering Questions That Sound Like an Attack Dealing with Complex Questions Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations

Public Speaking
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Product Owner Certified (SPOC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This certification is for anyone who interfaces with stakeholders or works as a Product Owner in a Scrum Team. Scrum Product Owner Certified (SPOC?) certification exam is designed to confirm applicants practical and working knowledge of Scrum that equips them to handle the business aspects and stakeholders in a Scrum environment. Successful candidates will be awarded the Scrum Product Owner Certified (SPOC?)certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Agile & Scrum Overview What is Agile? Why use Agile? The Agile Manifesto Principles of the Agile Manifesto Agile Methods Other Agile Methods Scrum Overview Scrum Summary Scrum Roles Scrum Roles The Product Owner The Scrum Team The Scrum Master Advantages of Cross-functional Teams Planning in Scrum Scrum Flow Requirements in Scrum Prioritizing the Product Backlog Adaptive Project Management Scrum Planning User Stories The Concept of Persona Acceptance Criteria Generic Done Criteria Criteria for a Good User Story Estimation Importance of Value Risk Burndown Graphics Scrum Board Sprint Planning Sprints (from Product Owner?s point of view) Sprint Planning Meeting Planning Game Task Estimation The Sprint Backlog Implementation of Scrum Daily Stand-up Meeting Sprint Review Meeting Sprint Retrospective Meeting Product Backlog Grooming Scrum for Large Projects Scrum for Large Projects The Chief Product Owner Distributed teams in Scrum Transition to Scrum Mapping Traditional Roles to Scrum Maintaining Stakeholder Involvement Note SCRUMstudy has authored the SBOK? Guide as a comprehensive guide to deliver successful projects using Scrum. SCRUMstudy works through its large global partner network of Authorized Training Providers (A.T.P.s) to deliver trainings and certifications. New Horizons is a proud Authorized Training Provider of SCRUMstudy.

Scrum Product Owner Certified (SPOC)
Delivered OnlineFlexible Dates
Price on Enquiry

Personal Productivity

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Overview Upon successful completion of this course, students will take ownership of their time management in order to achieve their goals and lead a more productive life. In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Setting SMART Goals The Three P's The SMART Way Prioritizing Your Goals Evaluating and Adapting The Power of Routines What is a Routine? Personal Routines Professional Routines Six Easy Ways to Simplify Your Life Scheduling Yourself The Simple Secret of Successful Time Management Developing a Tracking System Scheduling Appointments Scheduling Tasks Keeping Yourself on Top of Tasks The One-Minute Rule The Five-Minute Rule What To Do When You Feel Like You're Sinking Tackling New Tasks and Projects Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! Using Project Management Techniques The Triple Constraint Creating the Schedule Using a RACI Chart Creating a Workspace Setting Up the Physical Layout Ergonomics 101 Using Your Computer Efficiently Organizing Files and Folders Organizing Paper Files Organizing Electronic Files Scheduling Archive and Clean-Up Managing E-Mail Using E-mail Time Wisely Taking Action! Making the Most of Your E-mail Program Taking Time Back from Handheld Devices Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations

Personal Productivity
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWall Network Security Professional Course - SNSP - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices

SonicWall Network Security Professional Course - SNSP - NA
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. Identifying What's at Stake Topic A: Identify the Threats and Regulatory Responses Topic B: Identify Sensitive Information Describing CMMC Topic A: Describe the CMMC Model Architecture Topic B: Describe the CMMC Program Getting Ready for a CMMC Assessment Topic A: Scope Your Environment Topic B: Analyze the CMMC Assessment Guides Topic C: Foster a Mature Cybersecurity Culture Topic D: Identify Helpful Documents Topic E: Evaluate Your Readiness Interacting with the CMMC Ecosystem Topic A: Identify the CMMC Ecosystem Topic B: Describe a CMMC Assessment

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Advanced Cisco Contact Center Enterprise (CCEAA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities. Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration. Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop. Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new. Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop. Successfully deploy Mobile Agent in a CCE Environment. Successfully deploy Post Call Survey in a CCE Environment. The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco Contact Center Enterprise (CCE) solution. PCCE Review Review PCCE Architecture and Components Review PCCE Protocols Introducing Bulk Import Tools Use the PCCE Bulk Import Tool Use Bulk Import Templates Configuring Advanced Scripting and CCE Data Exchange Design for Advanced Scripting CCE Data Exchange Cisco Unified Communications Manager Initiated Call Flows Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models Describe Subsequent Transfers Using Gadgets to Customize the Finesse Desktop Obtain Finesse Custom Gadgets Deploy Finesse Custom Gadgets Implementing Mobile Agent Examine Mobile Agent Functionality Identify Mobile Agent Architecture and Components Implementing Post Call Survey Examine Post Call Survey Functionality Configure Post Call Survey Lab practice Review Discovery Navigate CCE Discovery Architecture and Components Import Bulk Data Create a VXML Application Using Call Studio Configure Precision Queues Create a CCE Routing Script Customize the Finesse Desktop Test Your Call Flow Configure Cisco Unifi

Cisco Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Delivered OnlineFlexible Dates
Price on Enquiry

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This two-day course provides students with intermediate switching knowledge and configuration examples using Junos Enhanced Layer 2 Software. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat System Administration II (RH134)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Red Hat System Administration II (RH134)
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)
Delivered OnlineFlexible Dates
Price on Enquiry