• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

312 Windows courses in Cardiff delivered Live Online

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Quick Start to Mastering Prompt Engineering for Software Developers (TTAI2300)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for To gain the most from attending this course you should possess the following incoming skills: Basic knowledge of programming concepts and syntax in Python. Familiarity with common data formats such as CSV, JSON, and XML. Experience using command-line interfaces and basic text editing tools. Understanding of basic machine learning concepts and algorithms. Overview Working in an interactive learning environment, led by our engaging expert, you will: Gain a solid understanding of prompt engineering concepts and their applications in software development and AI-driven solutions. Master the techniques for preprocessing and cleaning text data to ensure high-quality inputs for AI models like GPT-4. Develop expertise in GPT-4 tokenization, input formatting, and controlling model behavior for various tasks and requirements. Acquire the ability to design, optimize, and test prompts effectively, catering to diverse business applications and use cases. Learn advanced prompt engineering techniques, such as conditional text generation and multi-turn conversations, to create more sophisticated AI solutions. Practice creating prompts to generate, run, and test code in a chosen programming language using GPT-4 and OpenAI Codex. Understand the ethical implications and best practices in responsible AI deployment, ensuring fair and unbiased AI applications in software development. Prompt Engineering offers coders and software developers a competitive edge by empowering them to develop more effective and efficient AI-driven solutions in their projects. By harnessing the capabilities of cutting-edge AI models like GPT-4, coders can automate repetitive tasks, enhance natural language understanding, and even generate code suggestions, boosting productivity and creativity. In addition, mastering prompt engineering can contribute to improved job security, as professionals with these in-demand skills are highly sought after in the rapidly evolving tech landscape. Quick Start to Prompt Engineering for Coders and Software Developers is a one day course designed to get you quickly up and running with the prompting skills required to out AI to work for you in your development efforts. Guided by our AI expert, you?ll explore key topics such as text preprocessing, data cleansing, GPT-4 tokenization, input formatting, prompt design, and optimization, as well as ethical considerations in prompt engineering. In the hands-on labs you?ll explore tasks such as formatting inputs for GPT-4, designing and optimizing prompts for business applications, and implementing multi-turn conversations with AI. You?ll work with innovative tools like the OpenAI API, OpenAI Codex, and OpenAI Playground, enhancing your learning experience while preparing you for integrating prompt engineering into your professional toolkit. By the end of this immersive course, you?ll have the skills necessary to effectively use prompt engineering in your software development projects. You'll be able to design, optimize, and test prompts for various business tasks, integrate GPT-4 with other software platforms, and address ethical concerns in AI deployment. Introduction to Prompt Engineering Overview of prompt engineering and its importance in AI applications Major applications of prompt engineering in business Common challenges faced in prompt engineering Overview of GPT-4 and its role in prompt engineering Key terminology and concepts in prompt engineering Getting Things Ready: Text Preprocessing and Data Cleansing Importance of data preprocessing in prompt engineering Techniques for text cleaning and normalization Tokenization and n-grams Stop word removal and stemming Regular expressions and pattern matching GPT-4 Tokenization and Input Formatting GPT-4 tokenization and its role in prompt engineering Understanding and formatting GPT-4 inputs Context windows and token limits Controlling response length and quality Techniques for handling out-of-vocabulary tokens Prompt Design and Optimization Master the skills to design, optimize, and test prompts for various business tasks. Designing effective prompts for different tasks Techniques for prompt optimization GPT-4 system and user parameters for controlling behavior Importance of prompt testing and iteration Best practices for prompt engineering in business applications Advanced Techniques and Tools in Prompt Engineering Learn advanced techniques and tools for prompt engineering and their integration in business applications. Conditional text generation with GPT-4 Techniques for handling multi-turn conversations Overview of tools for prompt engineering: OpenAI API, OpenAI Codex, and OpenAI Playground Integration of GPT-4 with other software platforms and tools Monitoring and maintaining prompt performance Code Generation and Testing with Prompt Engineering Develop the skills to generate, integrate, and test AI-generated code effectively, enhancing productivity and creativity in software development projects. Introduction to code generation with AI models like GPT-4 Designing prompts for code generation across programming languages Techniques for specifying requirements and constraints in prompts Generating and interpreting code snippets using AI-driven solutions Integrating generated code into existing projects and codebases Best practices for testing and validating AI-generated code Ethics and Responsible AI Understand the ethical implications of prompt engineering and the importance of responsible AI deployment in business. Ethical considerations in prompt engineering Bias in AI systems and its impact on prompt engineering Techniques to minimize bias and ensure fairness Best practices for responsible AI deployment in business applications Monitoring and addressing ethical concerns in prompt engineering

Quick Start to Mastering Prompt Engineering for Software Developers  (TTAI2300)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

20345-1 Administering Microsoft Exchange Server 2016/2019

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20345-1 Administering Microsoft Exchange Server 2016/2019
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for those with a basic understanding of Microsoft Windows and who need to learn foundational Word skills, such as creating, editing, and formatting documents; inserting simple tables and creating lists; and employing a variety of techniques for improving the appearance and accuracy of document content. Overview In this course, you will learn fundamental Word skills. You will: Navigate and perform common tasks in Word, such as opening, viewing, editing, saving, and printing documents, and configuring the application. Format text and paragraphs. Perform repetitive operations efficiently using tools such as Find and Replace, Format Painter, and Styles. Enhance lists by sorting, renumbering, and customizing list styles. Create and format tables. Insert graphic objects into a document, including symbols, special characters, illustrations, pictures, and clip art. Format the overall appearance of a page through page borders and colors, watermarks, headers and footers, and page layout. Use Word features to help identify and correct problems with spelling, grammar, readability, and accessibility. These days, most people take electronic word processing for granted. While we may still write out our grocery lists with pen and paper, we expect to use a computer to create the majority of our documents. It's impossible to avoid word-processing software in many areas of the business world. Managers, lawyers, clerks, reporters, and editors rely on this software to do their jobs. Whether you are an executive secretary or a website designer, you'll need to know the ins and outs of electronic word processing.Microsoft© Word is designed to help you move smoothly through the task of creating professional-looking documents. Its rich features and powerful tools can make your work easy, and even fun. In this course, you'll learn how to use Word on the desktop to create and edit simple documents; format documents; add tables and lists; add design elements andlayout options; and proof documents.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will alsoenable you to access and effectively utilize many web-based resources provided with your Microsoft 365 subscription. This includes brief coverage of key skills for using Word for theWeb and OneDrive. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for the Microsoft Word (Microsoft 365 Apps and Office 2019): Exam MO-100 and Microsoft Word Expert (Microsoft 365 Apps and Office 2019): Exam MO-101 certification exams. Lesson 1: Getting Started with Word Topic A: Navigate in Microsoft Word Topic B: Create and Save Word Documents Topic C: Edit Documents Topic D: Work with Word for the Web Lesson 2: Formatting Text and Paragraphs Topic A: Apply Character Formatting Topic B: Control Paragraph Layout Topic C: Align Text Using Tabs Topic D: Display Text in Bulleted or Numbered Lists Topic E: Apply Borders and Shading Lesson 3: Working More Efficiently Topic A: Make Repetitive Edits Topic B: Apply Repetitive Formatting Topic C: Use Styles to Streamline Repetitive Formatting Tasks Topic D: Customize the Word Environment Lesson 4: Managing Lists Topic A: Sort a List Topic B: Format a List Lesson 5: Adding Tables Topic A: Insert a Table Topic B: Modify a Table Topic C: Format a Table Topic D: Convert Text to a Table Lesson 6: Inserting Graphic Objects Topic A: Insert Symbols and Special Characters Topic B: Add Images to a Document Lesson 7: Controlling Page Appearance Topic A: Apply a Page Border and Color Topic B: Add Headers and Footers Topic C: Control Page Layout Topic D: Add a Waterm Lesson 8: Preparing to Publish a Document Topic A: Check Spelling, Grammar, and Readability Topic B: Preview and Print Documents Topic C: Use Research Tools Topic D: Check Accessibility Topic E: Dictate Text in a Document Topic F: Save a Document to Other Form Additional course details: Nexus Humans Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

HTML5 - Content Authoring Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed as an introduction to HTML and CSS for those who want to learn to develop standards-compliant web content, with a focus on current HTML5 and CSS3 standards. This course can be taught on Microsoft© Windows©, Apple© Mac OS© X, or Linux©, and supports developers who work in any of those environments. HTML5 is one of the most integral and evolving web technologies that enables a user to structure content and present it on the web.This course lays the foundation for mastering this popular web publishing technology. Authoring Content in HTML Web Development Standards Create an HTML Page Apply HTML Attributes Embedding and Linking Content Embed Content within an HTML Page Link HTML Pages Create Image Maps Formatting Content with CSS Apply Style Sheets to HTML Use CSS to Create Multiple Column Layouts Authoring Complex Content Structures Author Table Content Construct and Format Forms Testing and Publishing HTML Content Identify and Correct Structural and Compatibility Problems Make HTML Content Accessible Publish and Deploy Web Content Additional course details: Nexus Humans HTML5 - Content Authoring Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HTML5 - Content Authoring Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HTML5 - Content Authoring Fundamentals
Delivered OnlineFlexible Dates
£395

HTML5 - Content Authoring with New and Advanced Features

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for those who have experience authoring content in HTML and CSS, and want to learn how to use new HTML5 and CSS3 features. This course can be taught on Windows©, Mac OS© X, or Linux©, and supports developers who work in any of those environments. Although JavaScript© knowledge is helpful, HTML and CSS are the focus, so this course does not require that the learner have extensive JavaScript skills. Overview In this course, you will develop web content in HTML5 and CSS3 following principles of responsive web design. You will: ?Optimize HTML content to take advantage of HTML5 and CSS3 features.?Write advanced CSS3 selectors and media queries.?Use advanced background and border options introduced in CSS3.?Use advanced text formatting options introduced in CSS3.?Use HTML5 graphics and multimedia elements, including transforms, animation, audio, and video. ?Follow best practices to enable HTML content to be successfully processed by many different web browsers and machine readers. This course focuses on the new and advanced features of HTML5, covering how to create HTML5 and CSS3 markup that will work well on the widest possible variety of web browsers, mobile devices, and machine readers, such as search engine web crawlers. Creating HTML5 Content Develop Web Content to Follow Standards Update Legacy Web Content to Meet HTML5 Requirements Using Advanced Techniques to Select and Apply Styles Use Advanced CSS Selectors Provide Alternate Layouts Based On Device Characteristics Using Advanced Background and Border Techniques Use Advanced Techniques to Create Backgrounds Use Advanced Techniques to Create Borders Incorporating Advanced Text Formats Use Web Fonts Apply Advanced Text Styles Adding Animation and Multimedia Use 2D Transforms Use Animation Styles Embed Audio and Video in a Web Page Making HTML Readable and Accessible Support Various Browsers Improve Markup to Benefit Human and Machine Readers Additional course details: Nexus Humans HTML5 - Content Authoring with New and Advanced Features training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HTML5 - Content Authoring with New and Advanced Features course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HTML5 - Content Authoring with New and Advanced Features
Delivered OnlineFlexible Dates
£395

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. What is Robotic Process Automation? Scope and techniques of automation Robotic process automation About UiPath The future of automation Record and Play UiPath stack Downloading and installing UiPath Studio Learning UiPath Studio Task recorder Step-by-step examples using the recorder Sequence, Flowchart, and Control Flow Sequencing the workflow Activities Control flow, various types of loops, and decision making Step-by-step example using Sequence and Flowchart Step-by-step example using Sequence and Control flow Data Manipulation Variables and scope Collections Arguments ? Purpose and use Data table usage with examples Clipboard management File operation with step-by-step example CSV/Excel to data table and vice versa (with a step-by-step example) Taking Control of the Controls Finding and attaching windows Finding the control Techniques for waiting for a control Act on controls ? mouse and keyboard activities Working with UiExplorer Handling events Revisit recorder Screen Scraping When to use OCR Types of OCR available How to use OCR Avoiding typical failure points Tame that Application with Plugins and Extensions Terminal plugin SAP automation Java plugin Citrix automation Mail plugin PDF plugin Web integration Excel and Word plugins Credential management Extensions ? Java, Chrome, Firefox, and Silverlight Handling User Events and Assistant Bots What are assistant bots? Monitoring system event triggers Monitoring image and element triggers Launching an assistant bot on a keyboard event Exception Handling, Debugging, and Logging Exception handling Common exceptions and ways to handle them Logging and taking screenshots Debugging techniques Collecting crash dumps Error reporting Managing and Maintaining the Code Project organization Nesting workflows Reusability of workflows Commenting techniques State Machine When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file Integrating a TFS server Deploying and Maintaining the Bot Publishing using publish utility Overview of Orchestration Server Using Orchestration Server to control bots Using Orchestration Server to deploy bots License management Publishing and managing updates

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite
Delivered OnlineFlexible Dates
Price on Enquiry

DIY Home Improvement

By NextGen Learning

Course Overview The "DIY Home Improvement" course provides an in-depth exploration of various home improvement projects, equipping learners with the knowledge to enhance their homes. Covering a wide range of topics from basic painting and wall repairs to more complex plumbing and electrical tasks, this course offers practical skills that are directly applicable to everyday home maintenance. Learners will gain the confidence to undertake home improvement projects, understand safety protocols, and manage issues such as damp and pest control effectively. The course aims to foster self-sufficiency in home care, empowering individuals to improve their living spaces efficiently. Course Description This course delves into the core aspects of DIY home improvement, beginning with an introduction to essential tools and techniques, followed by detailed lessons on painting, wall repairs, door and window installation, and electrical fixture adjustments. Learners will explore plumbing basics and how to address common issues like damp, rots, and pests. Safety is also emphasised, ensuring that learners understand how to safeguard themselves and their homes during projects. By the end of the course, participants will have developed a comprehensive understanding of home maintenance and improvement, allowing them to tackle a variety of domestic challenges with confidence and competence. Course Modules Module 01: Introduction to Home Improvement Module 02: Paint Job Module 03: Walls Module 04: Doors and Windows Module 05: Electrical Fixtures Module 06: Outdoor Projects Module 07: Plumbing Module 08: Damp, Rots, and Pests Module 09: Home Safety (See full curriculum) Who is this course for? Individuals seeking to improve their homes with cost-effective solutions. Professionals aiming to expand their home maintenance skills. Beginners with an interest in home improvement and maintenance. Homeowners looking to enhance their property value. Career Path Home Improvement Specialist Property Maintenance Manager DIY Consultant Home Renovation Project Manager Estate Agent or Property Manager (specialising in home improvements)

DIY Home Improvement
Delivered OnlineFlexible Dates
£9.99