• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2941 Sup courses in Liverpool delivered Live Online

SCM130 SAP ERP Planning and Manufacturing Overview

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, and Users. Overview Provide an overview of the fundamental concepts and procedures of production planning within SAP ERP.Gain an overview of the manufacturing methods supported by ERP. This course is designed to provide an overview of the fundamental concepts and procedures of production planning within SAP ERP. Introduction to Supply Chain Planning Drafting Supply Chain Planning Planning-Specific Master Data Reviewing Supply Chain Master Data Reviewing Production Master Data Sales and Operations Planning Drafting Flexible Planning Executing Standard Sales and Operations Planning Releasing a Standard Sales and Operations Plan Demand Management Setting Up a Demand Program Planning Make-to-Stock Production Planning Make-to-Order Production Checking Product Availability Material Requirements Planning Drafting MRP Procedures Planning Material Requirements Interpreting the Results of Material Requirements Planning Long-Term Planning Creating a Long-Term Planning Scenario Executing Long-Term Planning Introduction to Production Execution Distinguishing Production Types Production with Production Orders Drafting Production Orders Creating Production Orders Releasing Production Orders Executing Material Staging for Production Orders Executing Confirmation and Goods Receipt for Production Orders Evaluating Production Orders Production with Process Orders Drafting Process Orders Creating and Interpreting Process Orders Executing Process Orders Using Additional Functions with Process Orders Repetitive Manufacturing Drafting Repetitive Manufacturing Preparing Repetitive Manufacturing Planning Line Loading in Repetitive Manufacturing Using Material Staging and Confirmation Integrating Costing, Controlling, and Reporting The Kanban Principle Drafting Kanban Using Kanban in Production Additional course details: Nexus Humans SCM130 SAP ERP Planning and Manufacturing Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM130 SAP ERP Planning and Manufacturing Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM130 SAP ERP Planning and Manufacturing Overview
Delivered OnlineFlexible Dates
Price on Enquiry

MB-300T00 Microsoft Finance and Operations Core

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A Dynamics 365 for Finance and Operations Functional Consultant is responsible for performing discovery, capturing requirements, engaging subject matter experts and stakeholders, translating requirements, and configuring the solution and applications. The Functional Consultant implements a solution using out of the box capabilities, codeless extensibility, application and service integrations. Overview This course provides the practical knowledge to Navigate and efficiently use search, filtering and queries Use operational workspaces Work with Business Document Management Work with record templates Integrate Power BI with Dynamics 365 Finance and Operations apps Personalize workspaces Run and analyze security reports Create and use workflow for approval Work with Organization Hierarchy and its purposes. How to use personalization feature Use Data Management workspace Create and use and entity templates Import and export data and manage data by using Office Integration Dynamics 365 Finance and Operations apps include, but are not limited to, Dynamics 365 Finance, Dynamics 365 Supply Chain Management, and Dynamics 365 Supply Chain Management, Manufacturing. This foundational course provides students with the important first steps in automating and modernizing both global financial and supply chain operations. USE COMMON FUNCTIONALITY AND IMPLEMENTATION TOOLS Introduction Identify and use common Dynamics 365 Finance and Operations apps features and functionality Describe use cases for Power Platform apps and services Module Summary CONFIGURE SECURITY, PROCESSES, AND OPTIONS Introduction Implement security Design and create workflows Configure Organization administration features Configure System administration features Module Summary MANAGE DYNAMICS 365 FINANCE AND OPERATION DATA Introduction Manage data in Dynamics 365 Finance and Operations apps Plan a migration strategy Prepare data for migration and migrate data Module Summary VALIDATE AND SUPPORT THE SOLUTION Introduction Test solutions in Dynamics 365 Finance and Operations apps Implement Lifecycle Services tools Module Summary Additional course details: Nexus Humans MB-300T00 Microsoft Dynamics 365: Core Finance and Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-300T00 Microsoft Dynamics 365: Core Finance and Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-300T00 Microsoft Finance and Operations Core
Delivered OnlineFlexible Dates
Price on Enquiry

ES24 IBM System Z Hardware Management Console (HMC) Operations

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This intermediate course is for operations personnel and technical staff who are directly involved in the installation, operation, systems support, and software support of their System z mainframe environment. Overview Identify the zEnterprise 196 and 114, System z10, System z9, and zSeries servers Describe the major differences of the function and features between the System z servers Describe and explain the concept of logical partitioning Identify how various resources are assigned to LPARs during initialization Describe the functions provided by the HMC and SE This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain indepth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers. WelcomeUnit 1: IBM mainframe server hardware: Overview Unit 2: Using the HMC classic style user interface Unit 3: Using the HMC tree style user interfaceUnit 4: Using the HMC to monitor System z servers Supporting labsReviewUnit 5: Activation profiles and operational tasksUnit 6: Single object operation: CPC session Supporting labs

ES24 IBM System Z Hardware Management Console (HMC) Operations
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)

By Nexus Human

Duration 3.75 Days 22.5 CPD hours This course is intended for New systems administrators Overview When you complete this course, you will be able to:Customize your application, including page layouts, fields, tabs, and business processes in Lightning Experience.Learn how security settings created in Salesforce Classic are applied in Lightning.Maintain and import clean data in Lightning.Use Lightning features to create high-value reports and dashboards.Understand how workflow automation complies with Lightning This course is the core training that ensures your success with Salesforce Lightning. It?s a must for new administrators, and we recommend completing this course before starting a Salesforce deployment or when taking over an existing deployment. Getting Around the App Data Model and Navigation Lightning Experience Help & Training Getting Your Organization Ready for Users Setting Up the Company Profile Configuring the User Interface Setting Up Activities and Calendars Configuring Search Settings Setting Up Chatter Groups Mobile Access with Salesforce1 Setting Up & Managing Users Managing User Profiles Managing Users Setting Up Chatter Free Users and Invites Troubleshooting Login Issues Security & Data Access Restricting Logins Determining Object Access Setting Up Record Access Creating a Role Hierarchy Dealing with Record Access Exceptions Managing Field-level Security Object Customizations Administering Standard Fields Creating New Custom Fields Creating Selection Fields: Picklists and Lookups Creating Formula Fields Working with Page Layouts Working with Record Types and Business Processes Maintaining Data Quality Managing Data Import Wizards Data Loader Data.com Mass Transfer Backing Up Data Mass Delete and Recycle Bin Reports & Dashboards Running and Modifying Reports Creating New Reports with the Report Builder Working with Report Filters Summarizing with Formulas and Visual Summaries Printing, Exporting, and Emailing Reports Building Dashboards Automation Email Templates Workflow Rules Process Builder Lead Automation Managing the Support Process Managing and Resolving Cases Customizing a Support Process Automating Support Understanding the Salesforce Console for Service Collaborating in the Service Cloud Analyzing Support Data Additional course details: Nexus Humans Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)
Delivered OnlineFlexible Dates
Price on Enquiry

JL2V - Junos Layer 2 VPNs

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Course Level : Junos Layer 2 VPNs (JL2V) is an advanced-level course. Overview Define the term virtual private network. Describe the business drivers for MPLS VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs. Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN. Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN. Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning. Monitor and troubleshoot a BGP Layer 2 VPN. Explain the BGP Layer 2 VPN scaling mechanisms and route reflection. Describe the Junos OS BGP Layer 2 VPN CoS support. Describe the flow of control and data traffic for an LDP Layer 2 circuit. Configure an LDP Layer 2 circuit. Monitor and troubleshoot an LDP Layer 2 circuit. Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs. Configure a FEC 129 BGP autodiscovery Layer 2 VPN. Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs. Describe the difference between Layer 2 MPLS VPNs and VPLS. Explain the purpose of the PE device, the CE device, and the P device. Explain the provisioning of CE and PE routers. Describe the signaling process of VPLS. Describe the learning and forwarding process of VPLS. Describe the potential loops in a VPLS environment. Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS. Troubleshoot VPLS. Describe the purpose and features of Ethernet VPN. Configure Ethernet VPN. Monitor and troubleshoot Ethernet VPN. Describe the Junos OS support for hierarchical VPN models. Describe the Junos OS support for Carrier-of-Carriers VPN Option C. Configure the interprovider VPN Option C. Describe the Junos OS support for multisegment pseudowire for FEC 129. Describe and configure circuit cross-connect (CCC). This two-day course is designed to provide students with MPLS-based Layer 2 virtual private network (VPN) knowledge and configuration examples. Course IntroductionMPLS VPNs MPLS VPNs Provider-Provisioned VPNs BGP Layer 2 VPNs Overview of Layer 2 Provider-Provisioned VPNs BGP Layer 2 VPN Operational Model: Control Plane BGP Layer 2 VPN Operational Model: Data Plane Preliminary BGP Layer 2 VPN Configuration BGP Layer 2 Configuration Monitoring and Troubleshooting BGP Layer 2 VPNs Lab: BGP Layer 2 VPNs Layer 2 VPN Scaling and CoS Review of VPN Scaling Mechanisms Layer 2 VPNs and CoS LDP Layer 2 Circuits LDP Layer 2 Circuit Operation LDP Layer 2 Circuit Configuration LDP Layer 2 Circuit Monitoring and Troubleshooting FEC 129 BGP Autodiscovery Layer 2 Circuit Operation FEC 129 BGP Autodiscovery Layer 2 Circuit Configuration FEC 129 BGP Autodiscovery Monitoring and Troubleshooting Virtual Private LAN Services Layer 2 MPLS VPNs Versus VPLS BGP VPLS Control Plane BGP VPLS Data Plane Learning and Forwarding Process Loops VPLS Configuration VPLS Configuration VPLS Troubleshooting Ethernet VPN (EVPN) EVPN Overview EVPN Control Plane EVPN Operation EVPN Configuration EVPN Troubleshooting

JL2V - Junos Layer 2 VPNs
Delivered OnlineFlexible Dates
Price on Enquiry

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Deploying Cisco Unified Contact Center Enterprise v2.0 (DUCCE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner will be able to meet these overall objectives: These are the ones listed in the Objectives Table I put together: Identify the basic components and operations of the Unified CCE solution. Use the available UCCE tools to complete a basic UCCE system installation. Discuss the installation and configuration steps required to support agent functionality in a UCCE deployment. Install a basic CCE VXML Solution. Install, configure and run a CCE Outbound Option Campaign. Describe how to support CCE. Deploying Cisco Unified Contact Center Enterprise (DUCCE) v2.0 is a 5-day instructor-led course presented by training partners. The course allows learners to deploy the Unified CCE v10.0 solution including installation, deploying HA and using troubleshooting tools to identify issues with inbound and outbound Contact Center functionality. This course is intended for those installing the Unified CCE solution, or those providing Level 3 solution support. This course also serves as a foundation for the two corresponding UCCE Administration courses, but is not a prerequisite. Students will learn enough about CCE scripting in this course to ensure system functionality only. A separate course exists for advanced scripting. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: Preparing UCCE for Basic IVR Scripting Module 3: Preparing UCCE for Basic Agent Functionality Module 4: Installing and Configuring CCE VXML Solution Module 5: Installing CCE Outbound Option Module 6: Supporting CCE

Cisco Deploying Cisco Unified Contact Center Enterprise v2.0 (DUCCE)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Optimize and Scale [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client™ to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority™ to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi™ host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms

VMware vSphere: Optimize and Scale [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry