• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7467 Systems courses

CompTIA Security+ Certification Training Advanced Diploma

3.0(2)

By Alpha Academy

The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Security+ Certification Training Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. Course Curriculum Security Fundamentals The Information Security Cycle 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00

CompTIA Security+ Certification Training Advanced Diploma
Delivered Online On Demand
£10.99

Business Administration Level 3

By Rachel Hood

Supporting and engaging with different parts of the organisation and interact with internal or external customer.

Business Administration Level 3
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Cassandra (TTDS6776)

By Nexus Human

Duration 3 Days 18 CPD hours Overview The goal of this course is to enable technical students new to Cassandra to begin working with Cassandra in an optimal manner. Throughout the course students will learn to: Understand the Big Data needs that C* addresses Be familiar with the operation and structure of C* Be able to install and set up a C* database Use the C* tools, including cqlsh, nodetool, and ccm (Cassandra Cluster Manager) Be familiar with the C* architecture, and how a C* cluster is structured Understand how data is distributed and replicated in a C* cluster Understand core C* data modeling concepts, and use them to create well-structured data models Be familiar with the C* eventual consistency model and use it intelligently Be familiar with consistency mechanisms such as read repair and hinted handoff Understand and use CQL to create tables and query for data Know and use the CQL data types (numerical, textual, uuid, etc.) Be familiar with the various kinds of primary keys available (simple, compound, and composite primary keys) Be familiar with the C* write and read paths Understand C* deletion and compaction The Cassandra (C*) database is a massively scalable NoSQL database that provides high availability and fault tolerance, as well as linear scalability when adding new nodes to a cluster. It has many powerful capabilities, such as tunable and eventual consistency, that allow it to meet the needs of modern applications, but also introduce a new paradigm for data modeling that many organizations do not have the expertise to use in the best way.Introduction to Cassandra is a hands-on course designed to teach attendees the basics of how to create good data models with Cassandra. This technical course has a focus on the practical aspects of working with C*, and introduces essential concepts needed to understand Cassandra, including enough coverage of internal architecture to make good decisions. It is hands-on, with labs that provide experience in core functionality. Students will also explore CQL (Cassandra Query Language), as well as some of the ?anti-patterns? that lead to non-optimal C* data models and be ready to work on production systems involving Cassandra. Session 1: Cassandra Overview Why We Need Cassandra - Big Data Challenges vs RDBMS High level Cassandra Overview Cassandra Features Optional: Basic Cassandra Installation and Configuration Session 2: Cassandra Architecture and CQL Overview Cassandra Architecture Overview Cassandra Clusters and Rings Nodes and Virtual Nodes Data Replication in Cassandra Introduction to CQL Defining Tables with a Single Primary Key Using cqlsh for Interactive Querying Selecting and Inserting/Upserting Data with CQL Data Replication and Distribution Basic Data Types (including uuid, timeuuid) Session 3: Data Modeling and CQL Core Concepts Defining a Compound Primary Key CQL for Compound Primary Keys Partition Keys and Data Distribution Clustering Columns Overview of Internal Data Organization Overview of Other Querying Capabilities ORDER BY, CLUSTERING ORDER BY, UPDATE , DELETE, ALLOW FILTERING Batch Queries Data Modeling Guidelines Denormalization Data Modeling Workflow Data Modeling Principles Primary Key Considerations Composite Partition Keys Defining with CQL Data Distribution with Composite Partition Key Overview of Internal Data Organization Session 4: Additional CQL Capabilities Indexing Primary/Partition Keys and Pagination with token() Secondary Indexes and Usage Guidelines Cassandra collections Collection Structure and Uses Defining and Querying Collections (set, list, and map) Materialized View Overview Usage Guidelines Session 5: Data Consistency In Cassandra Overview of Consistency in Cassandra CAP Theorem Eventual (Tunable) Consistency in C* - ONE, QUORUM, ALL Choosing CL ONE Choosing CL QUORUM Achieving Immediate Consistency Overview of Other Consistency Levels Supportive Consistency Mechanisms Writing / Hinted Handoff Read Repair Nodetool repair Session 6: Internal Mechanisms Ring Details Partitioners Gossip Protocol Snitches Write Path Overview / Commit Log Memtables and SSTables Write Failure Unavailable Nodes and Node Failure Requirements for Write Operations Read Path Overview Read Mechanism Replication and Caching Deletion/Compaction Overview Delete Mechanism Tombstones and Compaction Session 7: Working with IntelliJ Configuring JDBC Data Source for Cassandra Reading Schema Information Querying and Editing Tables. Additional course details: Nexus Humans Introduction to Cassandra (TTDS6776) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cassandra (TTDS6776) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Cassandra  (TTDS6776)
Delivered OnlineFlexible Dates
Price on Enquiry

Implementing Aruba OS-CX Switching, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. Introduction to Aruba Switching Switches overview Architectures NetEdit Overview Centralized configuration Switch groups/templates AOS-CX mobile App Network Analytics Engine (NAE) Overview Configuration Core NAE feature lab sflow, local mirror, remote mirror VSX VSF vs. VSX: access and Agg/core design Stacking review VSF and uni/multi packet forwarding Stack fragments / split brain VSX Overview: roles, control, data, management planes VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) Split Brain scenario Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) Upstream/Downstream unicast traffic flow (South-North and North-South) VSX Configuration: VSX and Active Gateway VSX firmware updates ACLs Overview: types, components MAC ACL, Standard ACL, Extended ACL, Classifier-based Policies Configuration: wildcard bits, logging, pacl, vacl, racl Advanced OSPF Review basic OSPF Multi area: setup and aggregation Area-Types Stub, Totally Stub, NSSA, Totally NSSA External routes OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP Overview: i/e bgp, as numbers Best path selection Configuration: route announcement Route filtering to prevent transit as IGMP Overview Querier Snooping Unknown multicasts Multicast Routing: PIM Overview PIM DM 802.1X Authentication Overview: roles, requirements, coa, accounting Dynamic port configuration: avp, acl, qos, VLAN Port-based vs. user-based: examples Radius service tracking, critical VLAN MAC Authentication Overview: Use cases Radius-based MAC Auth Dynamic Segmentation Leverage dynamic segmentation features Configure tunneled-node on AOS-CX switches Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node Quality of Service Overview VoQ (Virtual Output Queue) QOS: queueing, QOS marks, dot1p, dscp Trust levels QOS configuration: port, VLAN, policies Interaction with user roles Queue configuration Rate limiters LLDP-MED Additional Routing Technologies VRF - Management VRF PBR MDNS PIM SM Capitve Portal Authentication Overview of guest solutions Built-in web auth ClearPass redirect with CPPM

Implementing Aruba OS-CX Switching, Rev. 20.21
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting on AWS - Accelerator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS - Accelerator
Delivered OnlineFlexible Dates
Price on Enquiry

Evaluacion-y Gestion de Riesgos - Evaluation and Risk Management

4.3(43)

By John Academy

Para quién es el curso? Artistas o pintores que quieren pinturas caseros como un negocio. Las personas que tienen un interés en la pintura profesional Requisito de entrada: Este curso está disponible para todos los estudiantes, de todos los antecedentes académicos. Los estudiantes deben tener 16 años o más para realizar la calificación. Se requiere una buena comprensión del idioma inglés, aritmética y TIC para asistir a este curso. Evaluación: Este curso no implica ninguna prueba de MCQ. Los estudiantes deben responder las preguntas de asignación para completar el curso, las respuestas serán en forma de trabajo escrito en PDF o en Word. Los estudiantes pueden escribir las respuestas en su propio tiempo. Una vez que se envían las respuestas, el instructor verificará y evaluará el trabajo. Proceso de dar un título: Después de completar y aprobar el curso con éxito, podrá obtener un Certificado de Logro Acreditado. Los certificados pueden obtenerse en copia impresa a un costo de £39 o en formato PDF a un costo de £24. Por qué elegirnos? Materiales de estudio de e-learning accesibles, atractivos y de alta calidad; Videos tutoriales / materiales de los principales expertos de la industria; Estudia en una plataforma de aprendizaje en línea avanzada y fácil de usar; Sistemas de examen eficientes para la evaluación y el resultado instantáneo; La calificación acreditada reconocida internacionalmente y en el Reino Unido; Acceda al contenido del curso en dispositivos móviles, tabletas o computadoras desde cualquier lugar en cualquier momento; El beneficio de solicitar la tarjeta de descuento extra de NUS; Asistencia 24/7 por correo electrónico. Trayectoria profesional: Después de completar este curso, podrá desarrollar conocimientos y habilidades precisas con la confianza adecuada para enriquecerse y alegrar su carrera en el mercado laboral relevante. Módulo Uno: Primeros Pasos 00:05:00 Módulo Dos: Identificando Peligros y Riesgos 00:10:00 Módulo Tres: Buscando los Problemas Antes de que Ocurran (I) 00:10:00 Módulo Cuatro: Buscando los Problemas Antes de que Ocurran (II) 00:10:00 Módulo Cinco: La Responsabilidad de Todos 00:10:00 Módulo Seis: Seguimiento y Actualización de las Medidas de Control 00:10:00 Módulo Siete: Técnicas de Gerencia de Riesgos 00:10:00 Módulo Ocho: Informes y Seguridad General en la Oficina 00:10:00 Módulo Nueve: Análisis de Impacto a la Empresa 00:10:00 Módulo Diez: Plan de Recuperación Ante Desastres 00:10:00 Módulo Once: Resumen de la Evaluación de Riesgos 00:10:00 Módulo Doce: Cierre 00:05:00 Evaluación Presente su tarea 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Evaluacion-y Gestion de Riesgos - Evaluation and Risk Management
Delivered Online On Demand1 hour 50 minutes
£22

Seguridad en el Lugar de Trabajo - Safety in the Workplace

4.3(43)

By John Academy

Para quién es el curso? Artistas o pintores que quieren pinturas caseros como un negocio. Las personas que tienen un interés en la pintura profesional Requisito de entrada: Este curso está disponible para todos los estudiantes, de todos los antecedentes académicos. Los estudiantes deben tener 16 años o más para realizar la calificación. Se requiere una buena comprensión del idioma inglés, aritmética y TIC para asistir a este curso. Evaluación: Este curso no implica ninguna prueba de MCQ. Los estudiantes deben responder las preguntas de asignación para completar el curso, las respuestas serán en forma de trabajo escrito en PDF o en Word. Los estudiantes pueden escribir las respuestas en su propio tiempo. Una vez que se envían las respuestas, el instructor verificará y evaluará el trabajo. Proceso de dar un título: Después de completar y aprobar el curso con éxito, podrá obtener un Certificado de Logro Acreditado. Los certificados pueden obtenerse en copia impresa a un costo de £39 o en formato PDF a un costo de £24. Por qué elegirnos? Materiales de estudio de e-learning accesibles, atractivos y de alta calidad; Videos tutoriales / materiales de los principales expertos de la industria; Estudia en una plataforma de aprendizaje en línea avanzada y fácil de usar; Sistemas de examen eficientes para la evaluación y el resultado instantáneo; La calificación acreditada reconocida internacionalmente y en el Reino Unido; Acceda al contenido del curso en dispositivos móviles, tabletas o computadoras desde cualquier lugar en cualquier momento; El beneficio de solicitar la tarjeta de descuento extra de NUS; Asistencia 24/7 por correo electrónico. Trayectoria profesional: Después de completar este curso, podrá desarrollar conocimientos y habilidades precisas con la confianza adecuada para enriquecerse y alegrar su carrera en el mercado laboral relevante. Módulo Uno: Primeros Pasos 00:05:00 Módulo Dos: Un Resumen 00:10:00 Módulo Tres: Tipos de Peligros 00:10:00 Módulo Cuatro: El Rol de la Gerencia 00:10:00 Módulo Cinco: Entrenamiento 00:10:00 Módulo Seis: Manejo del Estrés 00:10:00 Módulo Siete: Violencia en el Lugar de Trabajo 00:10:00 Módulo Ocho: Identificando los Peligros de tu Compañía 00:10:00 Módulo Nueve: Abuso de Drogas y Alcohol 00:10:00 Módulo Diez: Escribiendo el Plan de Seguridad 00:10:00 Módulo Once: Implementación del Plan 00:05:00 Módulo Doce: Cierre 00:05:00 Evaluación Presente su tarea 00:00:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Seguridad en el Lugar de Trabajo - Safety in the Workplace
Delivered Online On Demand1 hour 45 minutes
£22

Etica Empresarial - Business Ethics

4.3(43)

By John Academy

Para quién es el curso? Artistas o pintores que quieren pinturas caseros como un negocio. Las personas que tienen un interés en la pintura profesional Requisito de entrada: Este curso está disponible para todos los estudiantes, de todos los antecedentes académicos. Los estudiantes deben tener 16 años o más para realizar la calificación. Se requiere una buena comprensión del idioma inglés, aritmética y TIC para asistir a este curso. Evaluación: Este curso no implica ninguna prueba de MCQ. Los estudiantes deben responder las preguntas de asignación para completar el curso, las respuestas serán en forma de trabajo escrito en PDF o en Word. Los estudiantes pueden escribir las respuestas en su propio tiempo. Una vez que se envían las respuestas, el instructor verificará y evaluará el trabajo. Proceso de dar un título: Después de completar y aprobar el curso con éxito, podrá obtener un Certificado de Logro Acreditado. Los certificados pueden obtenerse en copia impresa a un costo de £39 o en formato PDF a un costo de £24. Por qué elegirnos? Materiales de estudio de e-learning accesibles, atractivos y de alta calidad; Videos tutoriales / materiales de los principales expertos de la industria; Estudia en una plataforma de aprendizaje en línea avanzada y fácil de usar; Sistemas de examen eficientes para la evaluación y el resultado instantáneo; La calificación acreditada reconocida internacionalmente y en el Reino Unido; Acceda al contenido del curso en dispositivos móviles, tabletas o computadoras desde cualquier lugar en cualquier momento; El beneficio de solicitar la tarjeta de descuento extra de NUS; Asistencia 24/7 por correo electrónico. Trayectoria profesional: Después de completar este curso, podrá desarrollar conocimientos y habilidades precisas con la confianza adecuada para enriquecerse y alegrar su carrera en el mercado laboral relevante. Módulo Uno: Inicio 00:05:00 Módulo Dos: ¿Qué Es La Ética? 00:05:00 Módulo Tres: Implementar La Ética En El Lugar De Trabajo 00:10:00 Módulo Cuatro: Derechos Del Empleado/Empleador 00:10:00 Módulo Cinco: Responsabilidades Sociales Y De Negocio 00:10:00 Módulo Seis: Decisiones Éticas 00:10:00 Módulo Siete: Hacer La Denuncia 00:10:00 Módulo Ocho: Ética De La Gerencia Empresarial 00:05:00 Módulo Nueve: Comportamiento Poco Ético 00:10:00 Módulo Diez: Ética Empresarial (I) 00:10:00 Módulo Once: Ética Empresarial (II) 00:10:00 Módulo Doce: Finalizando 00:05:00 Evaluación Presente su tarea 00:00:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Etica Empresarial - Business Ethics
Delivered Online On Demand1 hour 40 minutes
£22

Conceptos Basicos del Lenguaje Corporal - Basic Concepts of Body Language

4.3(43)

By John Academy

Para quién es el curso? Artistas o pintores que quieren pinturas caseros como un negocio. Las personas que tienen un interés en la pintura profesional Requisito de entrada: Este curso está disponible para todos los estudiantes, de todos los antecedentes académicos. Los estudiantes deben tener 16 años o más para realizar la calificación. Se requiere una buena comprensión del idioma inglés, aritmética y TIC para asistir a este curso. Evaluación: Este curso no implica ninguna prueba de MCQ. Los estudiantes deben responder las preguntas de asignación para completar el curso, las respuestas serán en forma de trabajo escrito en PDF o en Word. Los estudiantes pueden escribir las respuestas en su propio tiempo. Una vez que se envían las respuestas, el instructor verificará y evaluará el trabajo. Proceso de dar un título: Después de completar y aprobar el curso con éxito, podrá obtener un Certificado de Logro Acreditado. Los certificados pueden obtenerse en copia impresa a un costo de £39 o en formato PDF a un costo de £24. Por qué elegirnos? Materiales de estudio de e-learning accesibles, atractivos y de alta calidad; Videos tutoriales / materiales de los principales expertos de la industria; Estudia en una plataforma de aprendizaje en línea avanzada y fácil de usar; Sistemas de examen eficientes para la evaluación y el resultado instantáneo; La calificación acreditada reconocida internacionalmente y en el Reino Unido; Acceda al contenido del curso en dispositivos móviles, tabletas o computadoras desde cualquier lugar en cualquier momento; El beneficio de solicitar la tarjeta de descuento extra de NUS; Asistencia 24/7 por correo electrónico. Trayectoria profesional: Después de completar este curso, podrá desarrollar conocimientos y habilidades precisas con la confianza adecuada para enriquecerse y alegrar su carrera en el mercado laboral relevante. Módulo Uno: Primeros Pasos 00:05:00 Módulo Dos: Comunicando con Lenguaje Corporal 00:20:00 Módulo Tres: Leyendo el Lenguaje Corporal 00:30:00 Módulo Cuatro: Errores Relacionados con el Lenguaje Corporal 00:20:00 Módulo Cinco: Diferencias de Genero 00:30:00 Módulo Seis: Comunicación No Verbal 00:30:00 Módulo Siete: Expresiones Faciales 00:30:00 Módulo Ocho: El Lenguaje Corporal en los Negocios 00:20:00 Módulo Nueve: Las Mentiras y el Lenguaje Corporal 00:20:00 Módulo Diez: Mejorar El Lenguaje Corporal 00:30:00 Módulo Once: Combinando Las Palabras con Los Movimientos 00:20:00 Módulo Doce: Cierre 00:05:00 Evaluación Presente su tarea 00:00:00

Conceptos Basicos del Lenguaje Corporal - Basic Concepts of Body Language
Delivered Online On Demand4 hours 20 minutes
£22

Telephone Training - Live On-Site and Remote Training Sessions

By Telephone Trainers Ltd

Our telephone training takes place in your normal working situation, using the actual telephones and software, and the programming software clients that trainees will use when fully trained. Our trainers will travel anywhere in the world to train you face to face, or if you prefer, we can offer our whole training catalogue remotely using Teams or Zoom. On-site and live remote telecoms training sessions have a general reputation as most effective for trainees to continue to efficiently carry out their telecoms usage, programming and own in-house training of future new employees. On-site training involves employees training at their place of work while they are doing their actual job, or in pre-organised classroom training sessions, based around hands-on interaction, trainer Q&A and all carried out using your own site telephone system. Our telephone trainers also offer consultations on your new or current telephone systems: looking into how you currently use your system, making suggestions on how programming could be tweaked and changed to improve your current usage, how to improve on call handling methods, and informing you of additional products which may be available on your system that you may not be aware of. This could help improve the level of communication across your company and interactions with your customers. We believe telephone handset and voicemail training sessions are essential to the smooth and efficient running of your company, making sure your staff are aware of all the features and benefits that the telephone handsets can offer, and ensuring calls are dealt with quickly and effectively. System administration training is available to teach new administrators how to manage and control a variety of system features. This type of training is especially important when new administrators have little or no previous telecom knowledge or experience, but it is equally important at all levels to ensure the new system is utilised to its maximum capability. Administration days or Call Centre Software training days take one full day to complete. Full Day Example: 9:30 - 16:00 Day Structure  09:30 - 10:45 Handset & VM session for up to 8 people 10:45 - 12:00 Handset & VM session for up to 8 people 12:00 - 12:45 Lunch  12:45 - 14:00 Handset & VM session for up to 8 people 14:00 - 15:15 Handset & VM session for up to 8 people 15:15 - 16:30 Handset & VM session for up to 8 people Half Day Example: 9:30 - 13:00 Switchboard training takes half a day (3-4 hours for up to 3 people). If you want to train more than 3 people, you may need to extend the day to a full day, to ensure everyone gets to have hands-on training on the switchboard. Super Users and Train the Trainer Sessions Super User sessions can also be organised to show advanced system features in order to provide an ongoing training service to their colleagues, once the trainers have left the site.

Telephone Training - Live On-Site and Remote Training Sessions
Delivered in Milton Keynes + 1 more or UK Wide or OnlineFlexible Dates
Price on Enquiry