Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence
Leading People through Change: On-Demand: On-Demand Research shows that 70% of change initiatives fail in large organizations. The largest factor contributing to this failure rate is leadership - the inability to plan and lead people through change. In many change situations, tremendous focus is put on strategy, processes, and systems, while the issue of changing people's behavior is assumed it will 'just happen'. In this interactive course, you will learn why the people side of change is crucial. We will begin by understanding why and how people resist change, and how important it is to become strong and effective change champions. Next, we will focus on critical change management practices - creating our vision of the future state, planning for acceptance in our change audience and stakeholders, mitigating threats, and capitalizing on opportunities. We will use metrics to plan, show progress, and confirm success. Lastly, we will focus on the need to reinforce and sustain change, and to prevent relapse to old ways and methods. What you will Learn At the end of this program, you will be able to: Realize the nature of change and describe how resistance manifests in people Compare prevalent change models and categorize their similarities Identify and rate the skills, traits, and behaviors of effective change champions Envision the future state and assess stakeholders Plan for change communication, training, and risks Evaluate change effectiveness using feedback and metrics Develop reinforcement practices for benefits and communication Foundation Concepts What is Change? Resistance to Change Common Change Management Theories Becoming a Change Champion Plan Envisioning the future state Planning for people Change management plan Do Change communication Training Piloting Risks Study Feedback Metrics Variance analysis Act Benefits realization Change sustainment Reinforcement messaging and communications
Leading People Through Change (Free L&I Conference Course) (On-Demand) Research shows that 70% of change initiatives fail in large organizations. The largest factor contributing to this failure rate is leadership - the inability to plan and lead people through change. In many change situations, tremendous focus is put on strategy, processes, and systems, while the issue of changing people's behavior is assumed it will 'just happen'. In this interactive course, you will learn why the people's side of change is crucial. We will begin by understanding why and how people resist change, and how important it is to become strong and effective change champions. Next, we will focus on critical change management practices - creating our vision of the future state, planning for acceptance in our change audience and stakeholders, mitigating threats, and capitalizing on opportunities. We will use metrics to plan, show progress, and confirm success. Lastly, we will focus on the need to reinforce and sustain change, and to prevent relapse to old ways and methods. What you will Learn At the end of this program, you will be able to: Realize the nature of change and describe how resistance manifests in people Compare prevalent change models and categorize their similarities Identify and rate the skills, traits, and behaviors of effective change champions Envision the future state and assess stakeholders Plan for change communication, training, and risks Evaluate change effectiveness using feedback and metrics Develop reinforcement practices for benefits and communication Foundation Concepts What is Change? Resistance to Change Common Change Management Theories Becoming a Change Champion Plan Envisioning the future state Planning for people Change management plan Do Change communication Training Piloting Risks Study Feedback Metrics Variance analysis Act Benefits realization Change sustainment Reinforcement messaging and communications
Queen Cleopatra was known for her love of aromatherapy, using oils and herbs to enhance her beauty and wellness. If you're interested in learning about the ancient art of aromatherapy, our course is the perfect opportunity to delve into its history, methods, and uses. This Diploma in Aromatherapy Training at QLS Level 5 course is endorsed by The Quality Licence Scheme and accredited by CPDQS (with 150 CPD points) to make your skill development & career progression more accessible than ever! Throughout our 20-lesson curriculum, you'll explore essential oils, carrier oils, body systems, and the meanings of ailments. You'll learn how to blend oils and create personalized treatments, while also gaining an understanding of safety measures and contraindications. By the end of our course, you'll have a strong foundation in aromatherapy and the ability to use it for personal wellness or to enhance your current healthcare practice. Join us on this fragrant journey to learn more about this time-tested tradition. At the end of this aromatherapy course, you will learn: Understand the history and methods of extracting essential oils. Identify the general properties of essential oils and carrier oils. Create customized blends and treatments for personal use or professional practice. Explain safety measures and contraindications when using aromatherapy. Understand how different body systems are affected by aromatherapy. Interpret the meanings of ailments and how aromatherapy can support healing. Why Prefer This Aromatherapy at QLS Level 5 Course? Opportunity to earn a certificate endorsed by the Quality Licence Scheme & another accredited by CPDQS which is completely free. Get a free student ID card! (£10 postal charge will be applicable for international delivery) Innovative and engaging content. Free assessments 24/7 tutor support. Take a step toward a brighter future! *** Course Curriculum *** Here is the curriculum breakdown of the Aromatherapy at QLS Level 5 course: Lesson 1 - Introduction Lesson 2 - History Lesson 3 - Methods of Extraction Lesson 4 - General Properties Lesson 5 - Carrier Oils and Blending Lesson 6 - Part 1 - Essential Oils Lesson 6 - Part 2 Lesson 6 - Part 3 Lesson 7 - Safety Lesson 8 - Contraindications Lesson 9 - Methods of Use Lesson 10 - Body Processes Lesson 11 - Skeletal System Lesson 12 - Muscular System Lesson 13 - Circulatory System Lesson 14 - Respiratory and Digestive Lesson 15 - Endocrine System Lesson 16 - Urinary & Lymphatic Systems Lesson 17 - Nervous System Lesson 18 - Integumentary and Olfactory Systems Lesson 19 - DNA Lesson 20 - Meanings of Ailments Assessment Process You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you have completed all of the Diploma in Aromatherapy Training at QLS Level 5 exams. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This aromatherapy course is for: Anyone interested in aromatherapy for personal wellness. Healthcare practitioners seeking to enhance their knowledge and skills. Massage therapists, estheticians, and other wellness professionals. Individuals seeking to explore natural and holistic healing practices. Requirements No prior background or expertise is required. Career path The Aromatherapy at QLS Level 5 course will boost your CV and aims to help you get the job or even the long-awaited promotion of your dreams. Like as: Aromatherapist: £20,000 to £40,000 Spa Therapist: £16,000 to £26,000 Massage Therapist: £18,000 to £35,000 Naturopath: £20,000 to £50,000 Beauty Therapist: £15,000 to £26,000 Holistic Health Practitioner: £22,000 to £40,000 Certificates CPDQS Accredited Certificate Digital certificate - Included Diploma in Aromatherapy Training at QLS Level 5 Hard copy certificate - Included Show off Your New Skills with a Certificate of Completion After successfully completing the Diploma in Aromatherapy Training at QLS Level 5, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme andalso you can order CPDQSAccredited Certificate that is recognised all over the UK and also internationally. The certificates will be home-delivered, completely free of cost.
Master the art of safeguarding your business with our Transaction Monitoring Masterclass. Detect and prevent fraud effectively through in-depth exploration of regulatory frameworks, risk-based approaches, advanced monitoring systems, and the future of transaction security. Join us to acquire essential skills, reduce false positives, and stay ahead in the ever-evolving landscape of financial security. Protect your business with confidence.
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Elite EA/PA Forum We are delighted to announce that the Elite EA/PA Forum for Australia & New Zealand will be on the 25th of September 2025. Our workshop aims to: Enhance your influence and impact by mastering assertive communication, negotiation, and self-advocacy skills. Stay composed and solution-focused in high-pressure situations with practical tools for crisis management and clear decision-making. Embrace evolving technology by understanding how AI and automation can streamline your role and boost efficiency. Future-proof your career by building strategic value, resilience, and adaptability in an ever-changing professional landscape. Keynote Address with Q&A from the audience: What to expect from Sam's Keynote: With over 30 years supporting leaders at the highest levels, Sam Cohen brings a wealth of insight, experience, and stories (the kind she can share) to the stage. From 18 years serving within The Royal Household - including as Deputy Private Secretary and Press Secretary to Her late Majesty Queen Elizabeth II - to working with The Duke and Duchess of Sussex, running the Prime Minister’s Office at Downing Street, and serving as Chief of Staff to the global CEO of Rio Tinto, Sam’s career is a masterclass in discretion, diplomacy, and delivering at the top. In this exclusive keynote, Beyond the Role, Sam will explore how Executive Assistants don’t just support leaders - they shape leadership, drive strategy, and build legacy from behind the scenes. Join us for this rare opportunity to hear from someone who’s been at the epicentre of power - and bring your questions! The keynote will include a live Q&A, where you can ask Sam about her remarkable career, leadership insights, and how to truly excel in high-performance environments. (Don’t ask her what the Queen kept in her handbag - she’s not telling.) Sam Cohen Career Bio: Sam Cohen has spent the last 30 years working to support leaders in the public and private sectors. Sam spent 18 years serving The Royal Household, as Deputy Private Secretary to Her late Majesty Queen Elizabeth II and Press Secretary to The Queen. Sam also served as Private Secretary to The Duke and Duchess of Sussex. Following this time, Sam worked as Director of the Prime Minister’s Office at Downing Street under Boris Johnson and, most recently, was Chief of Staff to the global CEO at Rio Tinto. Source: ABC News - YouTube Channel. Facilitator - AM: The Future-Proofed Assistant: Speak Up, Stand Out & Shape Your Career Path How to reimagine your Assistant role in 2025 and beyond - How the EA role is evolving (and what Executives now expect) & why Assistants who think like strategists will be indispensable Assertiveness as an Assistant – The key to retaining your role & the difference between being ‘helpful’ and being ‘heard’ Self-Advocacy as a Career Growth Strategy – The importance of advocating for your career development, workload boundaries and recognition Own Your Professional Future - Map your career development. Whether you're an EA for life or looking to a role beyond in the future, this is for you. Ruth Kilah Career Bio: Ruth is an international executive career coach and founder of Hoxton Hyde – Executive Career Coaching & Mentoring, delivering 1:1 and group programs for experienced Executive Assistants. She specialises in helping EAs step into higher-level roles, increase their income, and expand their professional impact. With 14 years’ experience supporting C-suite executives in Australia and the UK, Ruth brings deep industry insight and a strategic approach to career development. She empowers Assistants to gain clarity on their next move, adopt a strategic mindset, communicate their value effectively, and lead their own growth conversations with confidence. A former EA turned Stakeholder Relations and Project Manager, Ruth launched Hoxton Hyde in 2018 after spotting a clear gap in the market for tailored coaching for career-driven EAs. She is a recognised member of the World Administrators Alliance and a respected thought leader in the EA space, regularly sharing insights via LinkedIn and Instagram. Ruth is also a certified fitness and wellness coach, passionate about helping Assistants achieve long-term career fulfilment through intentional development and well-being. Panel: Crisis Mode: What to do when everything goes wrong Master a step-by-step approach to prioritising and problem-solving under pressure. Strengthen emotional resilience and calm decision-making during unexpected disruptions. Learn how to communicate clearly and lead from behind in high-stress situations. Emma-Kate Bos Bio Emma-Kate works alongside the CEO at Squadron Energy, one of Australia’s leading renewable energy companies. With over 28 years of experience in Executive Assistant and Operational roles supporting business leaders in professional services, politics, membership industries, sporting and not-for-profit organisations, Emma-Kate has a deep understanding of business support roles and has managed large teams of assistants and receptionists. She is passionate about developing and mentoring team members Emma-Kate holds an Associate Degree in Law, Mini MBA and Certificate in Public Relations. Sepi Nowlands Sepi has also worked as an EO for Deloitte and spent 18 years previously as an Executive Assistant at the ATO, Law Council of Australia, Grains Research and Development Corporation and Air Services Australia. Holly Clareburt Hollie Clareburt is an experienced Executive Assistant, currently supporting the Managing Director of Microsoft New Zealand and the Chief Partner Officer. Known for her professionalism and discretion, she excels in providing high-level support in fast-paced, executive environments. Prior to Microsoft, Hollie was Executive Assistant to the Chief of Corporate & Enterprise Systems at BECA, and previously supported the CEO at SKY News New Zealand. Her career reflects a strong track record of reliability, organisation, and executive partnership. Liv Wilson With over 20 years of experience across banking, government, creative industries, and global tech, Liv has supported senior leaders at companies including LinkedIn and Slack. She brings a strategic lens to the business support function, with deep expertise in operations, leadership enablement, and organisational effectiveness. As a passionate advocate for elevating the role of Executive Assistants, Liv has led women’s networks, championed DEI and social impact initiatives, and continues to push for recognition of business support as a critical driver of business success. She is currently working on her side hustle business - collaborating with executives, entrepreneurs, and small business owners to amplify their impact by removing operational barriers, optimising systems, and unlocking their capacity to lead and grow. Facilitator - PM: Justin Kabbani AI Is Not Here to Replace You. It's Here to Upgrade You. We'll explore Justin's proven 3P framework: Priming – How to set up AI like a strategic advisor by feeding it context, tone and mindset Prompting – How to craft clear, structured instructions to get consistently great results Producing – How to turn AI outputs into high-leverage work that makes you stand out Your session outcomes: Real examples from admin professionals already using AI to elevate their work Prompts you can copy, adapt, and test live Interactive exercises to build confidence fast A practical challenge to implement right after the session If you’ve been overwhelmed by AI, or underwhelmed by its impact, this session will change that. You'll leave with tools you can use today, and a mindset you’ll carry forward for the rest of your career. Justin Kabbani Career Bio: Justin Kabbani is one of Australia’s most in-demand AI trainers and keynote speakers, known for making AI feel simple, powerful, and immediately useful. He’s worked with brands like Uber, Treasury Wine Estates, and Udemy, helping their teams embed AI into daily workflows, strategic planning, and executive communication. Over the past two years, Justin has trained more than 2,000 professionals across Australia and beyond, consistently earning feedback like “mind-blowing,” and “game-changing”. His signature Prime, Prompt, Produce framework has transformed how business leaders, executive assistants, marketers, and teams think, work, and communicate with AI, without needing to be “tech people.” Justin believes AI isn’t here to replace people. It’s here to take the robotic work off our plate, so we can focus on what humans do best. LinkedIn: https://www.linkedin.com/in/justinkabbani/ Website: https://justinkabbani.com/ Speed Connections Networking Session Join us for Speed Connections, a lively 30-minute networking session designed to foster meaningful connections in a fun, fast-paced environment. Every 10 minutes, attendees will be placed into new breakout rooms with small groups, giving everyone the chance to meet a diverse range of peers. Each breakout session will feature engaging prompts to spark conversations and make networking enjoyable and memorable! Who will attend this event? Executive Assistant (EA) Personal Assistant (PA) Virtual Assistant (VA) Legal Secretary Legal Executive Assistant Administrative Assistant Office Manager Health Care Office Manager Chief of Staff Additional roles may be relevant depending on role responsibilities, along with development opportunities. This workshop is open to females, male including trans women/males and non-binary professionals. Group Rate Discounts: To discuss our group rates in more detail, please email support@elite-forums.com and provide the following: Group Number (How many would like to attend) Event Date (If numerous dates, please advise if we are splitting attendees across multiple dates) Attendee Contact details (Or request our Group Rate Document. Complete and return - we'll sort the rest.) Group discounts are on request - see below group rate discount brackets: 🧩 You just need one piece to come together - to unlock your Elite Potential. 🔑