Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - Introduction to Transact-SQL Work with schemas Explore the structure of SQL statements Examine the SELECT statement Work with data types Handle NULLs 2 - Sort and filter results in T-SQL Sort your results Limit the sorted results Page results Remove duplicates Filter data with predicates 3 - Combine multiple tables with JOINs in T-SQL Understand joins concepts and syntax Use inner joins Use outer joins Use cross joins Use self joins 4 - Write Subqueries in T-SQL Understand subqueries Use scalar or multi-valued subqueries Use self-contained or correlated subqueries 5 - Use built-in functions and GROUP BY in Transact-SQL Categorize built-in functions Use scalar functions Use ranking and rowset functions Use aggregate functions Summarize data with GROUP BY Filter groups with HAVING 6 - Modify data with T-SQL Insert data Generate automatic values Update data Delete data Merge data based on multiple tables Additional course details: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Risk Management for IT Projects: In-House Training IT projects may have direct bottom-line impact on the organization, cost millions of dollars, cause organizational change and change the way the organization is perceived by clients. Many IT projects are notoriously hard to predict and are filled with risk. IT Risk Management takes a comprehensive look at IT project risk management using PMI's PMBOK® Guide Risk Management Model in the context of IT Project Life Cycle phases. The goal of this course is to arm the practitioner with a rigorous, common-sense approach to addressing uncertainty in projects. This approach includes the ability to influence project outcomes, avoid many potential project risks, and be ready to calmly and efficiently respond to unavoidable challenges. What you will Learn You'll learn how to: Describe the risk management process, using the PMBOK® Guide's standard models and terminology Discuss the potential barriers to managing risk effectively in IT project organizations Develop an effective risk management plan for IT projects Identify project risks using IT-specific, practical tools Analyze individual risk events and overall project risk using IT-specific, practical approaches Plan effective responses to IT-specific risk based on the results of risk analysis and integrate risk responses into project schedules and cost estimates Manage and control risk throughout the IT project life cycle Implement selected elements of IT project risk management on your next project Foundation Concepts Basic concepts and purpose Risk and project constraints Risk and corporate cultures Risk management and IT PLC standards Plan Risk Management for IT Projects Plan Risk management process Plan Risk management activities Design a standard template Assess the project-specific needs Tailor the template Produce a project-specific risk management plan Gain consensus and submit as part of overall project plan A risk management plan of IT projects Identify Risks for IT Projects Identify risk process overview Risk categories and examples Risk identification tools Risk events by project life-cycle phases Perform Risk Analysis for IT Projects Perform qualitative risk analysis overview Core qualitative tools for IT projects Auxiliary qualitative tools for cost and schedule estimates When to use quantitative analysis for IT projects Plan Risk Response for IT Projects Plan risk response overview Active risk response strategies for IT projects (Threat and Opportunity) Acceptance and contingency reserves Contingency planning for IT projects Plan risk responses for IT projects Implement Risk Response for IT Projects Implement Risk Responses Executing Risk Response Plans Techniques and Tools Used Continuous Risk Management Monitor Risks for IT Projects Monitor risks overview Monitor risks tips for IT projects Technical performance measurement systems Risk management implementation for IT projects
Short Circuit Analysis for HV Three Phase Systems Course Overview This course on Short Circuit Analysis for HV Three Phase Systems provides an in-depth exploration of fault analysis in high voltage electrical systems. Focusing on the theoretical and practical application of various analysis methods, the course equips learners with the skills to assess and model electrical faults in three-phase systems. By covering core topics such as symmetrical and asymmetrical faults, per unit analysis, and transformer modelling, this course ensures that participants are prepared for real-world fault diagnosis and system modelling challenges. Learners will gain a thorough understanding of fault behaviour and how to perform accurate short circuit analysis, which is essential for enhancing system stability and safety. Course Description The course delves into the key aspects of short circuit and fault analysis for high voltage (HV) three-phase systems. Participants will explore various analysis techniques, including per-phase and per-unit analysis, along with the importance of base changes and transformer modelling. The course introduces symmetrical components and covers advanced topics such as asymmetrical three-phase fault analysis and system modelling. Learners will develop a clear understanding of how to assess the impact of short circuits on the electrical network and identify the appropriate mitigation strategies. The course is designed to provide learners with both the theoretical foundation and technical knowledge to perform detailed fault analysis and optimise system performance. Short Circuit Analysis for HV Three Phase Systems Curriculum Module 01: Introduction to Short Circuit Analysis for HV Three Phase Systems Module 02: Short Circuit & Fault Analysis Overview Module 03: Per Phase Analysis Module 04: Per Unit Analysis Module 05: Change of Base Module 06: Transformers & Per Unit Analysis Module 07: Symmetrical Components Module 08: Asymmetrical Three Phase Fault Analysis Module 09: System Modeling (See full curriculum) Who is this course for? Individuals seeking to understand short circuit analysis in electrical systems. Professionals aiming to enhance their knowledge in HV power system analysis. Beginners with an interest in electrical engineering and fault analysis. Engineers looking to advance their skills in power system design and fault management. Career Path Electrical Engineer Power System Analyst HV Systems Designer Electrical Maintenance Engineer Power Network Consultant Utility System Planner
Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Assess the business and application requirements of an environment Analyze design choices and design an EUC infrastructure architecture that addresses the needs of the environment Design an EUC architecture that addresses the needs of the organization and follows VMware best practices Document a design that can be implemented Design a comprehensive VMware EUC solution This five-day course presents a methodology for designing a VMware end-user computing (EUC) solution. The design methodology includes recommendations for the types of information and data that must be gathered and analyzed to make sound design decisions for the client systems, the desktop options, the VMware vSphere© infrastructure, VMware Horizon©, VMware Horizon© Cloud ServiceTM, VMware Workspace ONE© UEM, VMware Workspace ONE© AccessTM, VMware NSX-TTM, and VMware Unified Access GatewayTM. VMware best practices are presented for each phase of the design process. In this course, you apply your new knowledge by working with other participants to design a VMware EUC solution for a real-world project. Course Introduction Introductions and course logistics Course objectives VMWare EUC Design Methodology Recognize the characteristics of a good design. Identify the phases of VMware EUC Design Methodology Presenting Solutions to Executive Management Identify behaviors that can affect team performance negatively List common mistakes when working in a team Describe how to tailor a presentation to the company?s values, and stakeholders? backgrounds and roles List questions you should ask to identify how to address a problem a client is trying to solve Infrastructure Assessment and Services Definition Define customer business objective Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes Horizon Architecture and Components Determine the components required for a Horizon on-premises or Horizon Cloud deployment Implement the design considerations and recommendations for various Horizon components Analyze the use-case scenarios for various the Horizon deployment options Component Design: Horizon Pods Design a single-site Horizon desktop block and pod configuration for a given use case Design Cloud Pod Architecture for multisite pool access Design Control Plane Services Architecture for multisite pool access Component Design: App Volumes and Dynamic Environment Manager Identify the functionalities of the components in App Volumes Logical Architecture Implement the recommended practices when designing an application delivery mechanism using App Volumes Component Design: Workspace ONE Map the Horizon desktop building block and the Horizon management building block to VMware vSphere. Identify factors and design decisions that determine the sizing for ESXi hosts Workspace ONE & Horizon Infrastructure Design Design the environment resources required to support a Workspace ONE and Horizon deployment Identify factors and design decisions that determine the sizing for ESXi host Discuss the factors that determine the sizing for shared storage Identify the design decisions related to bandwidth utilization Discuss the implications of using load balancing and traffic management Identify factors and design decisions that determine the sizing of the Azure pods Design Integration and Delivery List the platform components that needs to be integrated along with their dependent services. Integrate Workspace ONE and Horizon platform components. Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware End User Computing: Design training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware End User Computing: Design course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course description Figma is an industry leading web-based design tool that allows you to create user interfaces for any screen type or size, collaborate on those designs in real-time and build interactive prototypes suitable for user testing. Figma is a visual design tool so there’s no coding involved. Design is achieved by adding, combining and styling shapes, text and images on a canvas or ‘Frame’. We run 2 consecutive Figma training days, the second day building on the practical activities from the first. You can attend just the first day. Attending just the second day is only recommended if you’re already very comfortable with the Figma interface. Day 1: Basic Figma design and collaboration For beginners with no prior experience with Figma who want to understand the basics, be able to create their own designs, share, collaborate and even iterate on the designs of others. You will learn: How to navigate the Figma interface. How to create your own designs by: Setting up a design file. Setting up the screen type you want to design and add grids and guides. Adding and modifying basic shapes and text to create user interface elements. How to save text and colour styles for reuse. How to create reusable components. How to use the ‘auto layout’ feature to promote tidy, consistent and usable design. How to collaborate on designs by sharing screens and commenting on designs. A brief introduction to prototyping: What’s possible. What’s not. Day 2: Component variants, design systems and prototyping This session will cover the more sophisticated aspects of Figma use such as: How to use component variants to create: Interaction styles such as hover and mouse down states ‘Flavours’ of a widget such as primary and secondary button styles. Toggleable elements within a widget such as buttons or bullets within a product card. How to turn a collection of components into a basic design system. Prototyping fundamentals: How to make journeys clickable. How to introduce animations. Tips and tricks for effective user testing. The limitations of Figma prototyping Is it for you? With no experience of Figma necessary, this course is suitable if: If you’re involved with creating or curating digital experiences. if you want to turn your design ideas into something tangible. If you work with Figma designers and want to understand the ‘art of the possible’. If you want to collaborate with your team on Figma projects. Learning objectives After completing day 1 you will be able to: Understand the Figma user interface. Create mobile and desktop interface designs. Effectively collaborate remotely. Share designs and gather feedback. Use auto layout to promote consistent and usable designs. Understand Figma’s role in user experience design, and its limitations. After day 2 you will be able to: Understand how design systems are set up and used. Create component variants for use in your own design system. Use that design system to efficiently create a user journey. Create a prototype suitable for user testing.
Duration 4 Days 24 CPD hours This course is intended for This intermediate course is for: Individuals who are assessing and/or planning to deploy storage network virtualization solutions Overview Create an implementation task list to integrate the SVC solution into the storage network fabric Establish or update zoning policies to enable the SVC to control storage device access and facilitate storage provisioning to host servers Utilize SVC user interfaces to manage the networked storage environment, assign storage to servers, migrate data, replicate data across storage systems, and monitor storage access activities Assess issues related to coexistence between the SVC and native disk storage access across host servers Migrate existing data to the virtualized SVC environment Implement SVC storage efficiency solutions including Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Implement data replication services including FlashCopy and Remote Copy Leverage networked storage connectivity by integrating a layer of intelligence - the SAN Volume Controller (SVC) - to facilitate storage application data access independence from storage management functions and requirements ...and more. Introducing the SAN Volume Controller Storage provisioning with the SAN Volume Controller SAN Volume Controller clustering environment SVC Cluster Setup and Storage Provisioning SVC physical environment and management interfaces Storage systems and LUN assignments to SVC Cluster creation and storage provisioning Additional functions: Quorum disks, expand/shrink volumes, MDisk removal, MDisk multipathing Fabric Zoning, Non Disruptive Volume Move, and iSCSI Connectivity Host to SVC volume access infrastructure Fibre Channel host to SVC SAN fabric zoning Non Disruptive Volume Move (NDVM) iSCSI host to SVC IP connectivity Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Easy Tier Thin Provisioning Volume Mirroring Real-time Compression and the Comprestimator Data Migration Pool Migration Migration Wizards (Import, Migration, Export) Storage system replacement Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Remote Copy: Global Mirror and Global Mirror with change volumes Managing the SVC Environment Logging and Directed Maintenance Procedures Code upgrades and node replacement Remote user authentication SVC configuration backup Additional course details: Nexus Humans SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This programme is aimed at helping participants to manage their time more effectively and to be more productive with the time available to them.
AgilePM® Practitioner: In-House Training This course offers preparation for the Practitioner-level examination to gain the APMG-International™ / Agile Project Management Practitioner Certification. Agile Project Management (AgilePM) is the result of collaboration between APMG-International and The DSDM Consortium. DSDM (Dynamic Systems Development Method) is the longest-established Agile method, launched in 1995, and is the only Agile method to focus on the management of Agile projects. The method has evolved over the years and the DSDM Agile Project Framework is the latest version of which AgilePM is a subset. DSDM has always operated predominantly in the corporate environment and has consistently demonstrated its ability to successfully work with and complement existing corporate processes. APMG-International is a global Examination Institute accredited by The APM Group Ltd. It is one of the Examination Institutes accredited by AXELOS. APMG-International has regional offices located in Australia, China, Denmark, Germany, the Netherlands, Malaysia, the United States, and the United Kingdom. Their portfolio of qualifications includes the Best Practice qualifications of ITIL®, PRINCE2®, MSP®, M_o_R®, and P3O®. AgilePM is one of their specialist management qualifications, which also include Change Management and Service Catalogue. The course covers all the Practitioner elements of the AgilePM Handbook v2 with: Clear explanations of the method and practical examples provided by your course tutor Sample exam paper for the Practitioner-level exams to enrich your knowledge and understanding A case study to allow you to practice the application of the method to an agile project The Traditional Classroom option includes the Practitioner exam to provide you with the right opportunity to verify your new skill set by way of a professional qualification The Virtual Classroom option includes a Practitioner exam voucher to allow you to choose the date and time of your online exam to verify your new skill set by way of a professional qualification What You Will Learn You will learn how to: Identify and apply the concepts, tools, and techniques described in Section 2 (Digging Deeper) of the APMG-International's Agile Project Management Handbook (v2.0) to agile projects Tailor and customize AgilePM to suit the needs of different projects Use AgilePM in conjunction with other project management methods such as PRINCE2® Prepare yourself for the Practitioner exam in AgilePM Roles and Responsibilities - The PM View The roles Key project manager relationships Agile Project Management - Through the Lifecycle The DSDM process and the project lifecycle Project management focus phase by phase The Effective Use of Products The products Deliver on Time - Combining MoSCoW & Timeboxing Ensuring effective prioritisation Bringing MoSCoW and timeboxing together People, Teams, and Interactions Effective communication Collaboration Requirements and User Stories What is a requirement? User stories Estimating - How and When Coping with uncertainty Estimating through the lifecycle Project Planning through the Lifecycle Planning in a DSDM project Planning activities phase by phase Quality - Never Compromise Quality What do we mean by quality? Solution and process quality Risk Management Project risk How DSDM helps mitigate project risk Tailoring the Approach The project approach questionnaire Summary and Next Steps
Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.
How to stay focued, organised and motivated in 2023