• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1249 Courses

Complete Microsoft Power BI 2021

5.0(10)

By Apex Learning

Overview This comprehensive course on Complete Microsoft Power BI 2021 will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Complete Microsoft Power BI 2021 comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Complete Microsoft Power BI 2021. It is available to all students, of all academic backgrounds. Requirements Our Complete Microsoft Power BI 2021 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 140 lectures • 14:25:00 total length •Welcome!: 00:01:00 •What is Power BI?: 00:03:00 •Download & Installing Power BI Desktop: 00:04:00 •Getting to know the interface: 00:03:00 •Mini Project: Transform Data: 00:07:00 •Mini Project: Visualize Data: 00:05:00 •Mini Project: Creating a Data Model: 00:07:00 •Course Outline: What will you learn in this course?: 00:05:00 •How to learn best with this course?: 00:03:00 •Creating our initial project file: 00:04:00 •Working with the attached project files: 00:04:00 •Exploring the Query Editor: 00:06:00 •Connecting to our data source: 00:07:00 •Editing rows: 00:08:00 •Changing data types: 00:08:00 •Replacing values: 00:03:00 •Close & Apply: 00:03:00 •Connecting to a csv file: 00:03:00 •Connecting to a web page: 00:05:00 •Extracting characters: 00:06:00 •Splitting & merging columns: 00:09:00 •Creating conditional columns: 00:06:00 •Creating columns from examples: 00:09:00 •Merging Queries: 00:17:00 •Pivoting & Unpivoting: 00:06:00 •Appending Queries: 00:08:00 •Practice & Solution: Population table: 00:15:00 •The Fact-Dimension-Model: 00:09:00 •Practice: Load the dimension table: 00:04:00 •Organizing our queries in groups: 00:03:00 •Entering data manually: 00:05:00 •Creating an index column: 00:03:00 •Workflow & more transformations: 00:05:00 •Module summary: 00:05:00 •Exercise 1 - Instruction: 00:02:00 •Exercise 1 - Exercise Solution: 00:11:00 •Advanced Editor - Best practices: 00:09:00 •Performance: References vs. Duplicating: 00:10:00 •Performance: Enable / Disable Load & Report Refresh: 00:05:00 •Group by: 00:05:00 •Mathematical Operations: 00:05:00 •Run R Script: 00:15:00 •Using Parameters to dynamically transform data: 00:06:00 •M formula language: Basics: 00:07:00 •M formula language: Values, Lists & Tables: 00:14:00 •M formula language: Functions: 00:13:00 •M formula language: More functions & steps: 00:05:00 •Exercise 2 - Instructions: 00:01:00 •Exercise 2 - solution: 00:05:00 •Understanding the relationship: 00:05:00 •Create & edit relationships: 00:06:00 •One-to-many & one-to-one relationship: 00:06:00 •Many-to-many (m:n) relationship: 00:08:00 •Cross filter direction: 00:06:00 •Activate & deactivate relationships: 00:06:00 •Model summary: 00:03:00 •Exercise 3 Create Model: 00:02:00 •Exercise 3 Solution: 00:02:00 •Our first visual: 00:08:00 •The format tab: 00:12:00 •Understanding tables: 00:10:00 •Conditional formatting: 00:09:00 •The Pie Chart: 00:06:00 •All about the filter visual: 00:13:00 •The filter pane for developers: 00:09:00 •Cross filtering & edit interactions: 00:04:00 •Syncing slicers across pages: 00:07:00 •Creating drill downs: 00:08:00 •Creating drill throughs: 00:07:00 •The tree map visual: 00:07:00 •The decomposition tree: 00:05:00 •Understanding the matrix visual: 00:05:00 •Editing pages: 00:07:00 •Buttons & Actions: 00:09:00 •Bookmarks to customize your report: 00:10:00 •Analytics and Forecasts with line charts: 00:10:00 •Working with custom visuals: 00:07:00 •Get data using R Script & R Script visual: 00:08:00 •Asking questions - Q&A visual: 00:04:00 •Wrap up - data visualization: 00:08:00 •Python in Power BI - Plan of attack: 00:03:00 •Setting up Python for Power BI: 00:03:00 •Transforming data using Python: 00:11:00 •Creating visualizations using Python: 00:08:00 •Violin plots, pair plots & ridge plots using Python: 00:15:00 •Machine learning (BayesTextAnalyzer) using Python: 00:00:00 •Performance & Troubleshooting: 00:03:00 •Introduction: 00:01:00 •Show Empathy & Identify the Requirement: 00:03:00 •Finding the Most Suitable KPI's: 00:02:00 •Choose an Effective Visualization: 00:04:00 •Make Use of Natural Reading Pattern: 00:03:00 •Tell a Story Using Visual Cues: 00:05:00 •Avoid Chaos & Group Information: 00:02:00 •Warp Up - Storytelling with Data: 00:02:00 •Introduction: 00:03:00 •The project data: 00:04:00 •Measures vs. Calculated Columns: 00:15:00 •Automatically creating a date table in DAX: 00:08:00 •CALENDAR: 00:05:00 •Creating a complete date table with features: 00:04:00 •Creating key measure table: 00:03:00 •Aggregation functions: 00:06:00 •The different versions of COUNT: 00:14:00 •SUMX - Row based calculations: 00:09:00 •CALCULATE - The basics: 00:11:00 •Changing the context with FILTER: 00:07:00 •ALL: 00:08:00 •ALL SELECTED: 00:03:00 •ALL EXCEPT: 00:07:00 •How to go on now?: 00:03:00 •Power BI Pro vs Premium & Signing up: 00:04:00 •Exploring the interface: 00:04:00 •Discovering your workspace: 00:03:00 •Connecting Power BI Desktop & Cloud: 00:04:00 •Understanding datasets & reports: 00:03:00 •Working on reports: 00:04:00 •Updating reports from Power BI Desktop: 00:04:00 •Creating and working with workspaces: 00:07:00 •Installing & using a data gateway: 00:13:00 •Get Quick Insights: 00:03:00 •Creating dashboards: 00:04:00 •Sharing our results through Apps: 00:10:00 •Power BI Mobile App: 00:05:00 •Creating the layout for the Mobile App: 00:04:00 •Wrap up - Power BI Cloud: 00:07:00 •Introduction: 00:03:00 •Creating a Row-Level Security: 00:05:00 •Row-Level Security in the Cloud: 00:04:00 •Row-Level Security & Data Model: 00:05:00 •Dynamic Row-Level Security: 00:07:00 •Dynamic Many-to-Many RLS: 00:04:00 •Hierarchical Row-Level Security: 00:13:00 •JSON & REST API: 00:10:00 •Setting up a local MySQL database: 00:14:00 •Connecting to a MySQL database in Power BI: 00:05:00 •Connecting to a SQL database (PostgreSQL): 00:05:00 •Congratulations & next steps: 00:06:00 •The End: 00:01:00 •Resources - Complete Microsoft Power BI 2021: 00:00:00

Complete Microsoft Power BI 2021
Delivered Online On Demand14 hours 25 minutes
£12

Data Visualization and Reporting with Power BI

5.0(10)

By Apex Learning

Overview This comprehensive course on Data Visualization and Reporting with Power BI will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Data Visualization and Reporting with Power BI comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Data Visualization and Reporting with Power BI. It is available to all students, of all academic backgrounds. Requirements Our Data Visualization and Reporting with Power BI is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 140 lectures • 14:25:00 total length •Welcome!: 00:01:00 •What is Power BI?: 00:03:00 •Download & Installing Power BI Desktop: 00:04:00 •Getting to know the interface: 00:03:00 •Mini Project: Transform Data: 00:07:00 •Mini Project: Visualize Data: 00:05:00 •Mini Project: Creating a Data Model: 00:07:00 •Course Outline: What will you learn in this course?: 00:05:00 •How to learn best with this course?: 00:03:00 •Creating our initial project file: 00:04:00 •Working with the attached project files: 00:04:00 •Exploring the Query Editor: 00:06:00 •Connecting to our data source: 00:07:00 •Editing rows: 00:08:00 •Changing data types: 00:08:00 •Replacing values: 00:03:00 •Close & Apply: 00:03:00 •Connecting to a csv file: 00:03:00 •Connecting to a web page: 00:05:00 •Extracting characters: 00:06:00 •Splitting & merging columns: 00:09:00 •Creating conditional columns: 00:06:00 •Creating columns from examples: 00:09:00 •Merging Queries: 00:17:00 •Pivoting & Unpivoting: 00:06:00 •Appending Queries: 00:08:00 •Practice & Solution: Population table: 00:15:00 •The Fact-Dimension-Model: 00:09:00 •Practice: Load the dimension table: 00:04:00 •Organizing our queries in groups: 00:03:00 •Entering data manually: 00:05:00 •Creating an index column: 00:03:00 •Workflow & more transformations: 00:05:00 •Module summary: 00:05:00 •Exercise 1 - Instruction: 00:02:00 •Exercise 1 - Exercise Solution: 00:11:00 •Advanced Editor - Best practices: 00:09:00 •Performance: References vs. Duplicating: 00:10:00 •Performance: Enable / Disable Load & Report Refresh: 00:05:00 •Group by: 00:05:00 •Mathematical Operations: 00:05:00 •Run R Script: 00:15:00 •Using Parameters to dynamically transform data: 00:06:00 •M formula language: Basics: 00:07:00 •M formula language: Values, Lists & Tables: 00:14:00 •M formula language: Functions: 00:13:00 •M formula language: More functions & steps: 00:05:00 •Exercise 2 - Instructions: 00:01:00 •Exercise 2 - solution: 00:05:00 •Understanding the relationship: 00:05:00 •Create & edit relationships: 00:06:00 •One-to-many & one-to-one relationship: 00:06:00 •Many-to-many (m:n) relationship: 00:08:00 •Cross filter direction: 00:06:00 •Activate & deactivate relationships: 00:06:00 •Model summary: 00:03:00 •Exercise 3 Create Model: 00:02:00 •Exercise 3 Solution: 00:02:00 •Our first visual: 00:08:00 •The format tab: 00:12:00 •Understanding tables: 00:10:00 •Conditional formatting: 00:09:00 •The Pie Chart: 00:06:00 •All about the filter visual: 00:13:00 •The filter pane for developers: 00:09:00 •Cross filtering & edit interactions: 00:04:00 •Syncing slicers across pages: 00:07:00 •Creating drill downs: 00:08:00 •Creating drill throughs: 00:07:00 •The tree map visual: 00:07:00 •The decomposition tree: 00:05:00 •Understanding the matrix visual: 00:05:00 •Editing pages: 00:07:00 •Buttons & Actions: 00:09:00 •Bookmarks to customize your report: 00:10:00 •Analytics and Forecasts with line charts: 00:10:00 •Working with custom visuals: 00:07:00 •Get data using R Script & R Script visual: 00:08:00 •Asking questions - Q&A visual: 00:04:00 •Wrap up - data visualization: 00:08:00 •Python in Power BI - Plan of attack: 00:03:00 •Setting up Python for Power BI: 00:03:00 •Transforming data using Python: 00:11:00 •Creating visualizations using Python: 00:08:00 •Violin plots, pair plots & ridge plots using Python: 00:15:00 •Machine learning (BayesTextAnalyzer) using Python: 00:00:00 •Performance & Troubleshooting: 00:03:00 •Introduction: 00:01:00 •Show Empathy & Identify the Requirement: 00:03:00 •Finding the Most Suitable KPI's: 00:02:00 •Choose an Effective Visualization: 00:04:00 •Make Use of Natural Reading Pattern: 00:03:00 •Tell a Story Using Visual Cues: 00:05:00 •Avoid Chaos & Group Information: 00:02:00 •Warp Up - Storytelling with Data: 00:02:00 •Introduction: 00:03:00 •The project data: 00:04:00 •Measures vs. Calculated Columns: 00:15:00 •Automatically creating a date table in DAX: 00:08:00 •CALENDAR: 00:05:00 •Creating a complete date table with features: 00:04:00 •Creating key measure table: 00:03:00 •Aggregation functions: 00:06:00 •The different versions of COUNT: 00:14:00 •SUMX - Row based calculations: 00:09:00 •CALCULATE - The basics: 00:11:00 •Changing the context with FILTER: 00:07:00 •ALL: 00:08:00 •ALL SELECTED: 00:03:00 •ALL EXCEPT: 00:07:00 •How to go on now?: 00:03:00 •Power BI Pro vs Premium & Signing up: 00:04:00 •Exploring the interface: 00:04:00 •Discovering your workspace: 00:03:00 •Connecting Power BI Desktop & Cloud: 00:04:00 •Understanding datasets & reports: 00:03:00 •Working on reports: 00:04:00 •Updating reports from Power BI Desktop: 00:04:00 •Creating and working with workspaces: 00:07:00 •Installing & using a data gateway: 00:13:00 •Get Quick Insights: 00:03:00 •Creating dashboards: 00:04:00 •Sharing our results through Apps: 00:10:00 •Power BI Mobile App: 00:05:00 •Creating the layout for the Mobile App: 00:04:00 •Wrap up - Power BI Cloud: 00:07:00 •Introduction: 00:03:00 •Creating a Row-Level Security: 00:05:00 •Row-Level Security in the Cloud: 00:04:00 •Row-Level Security & Data Model: 00:05:00 •Dynamic Row-Level Security: 00:07:00 •Dynamic Many-to-Many RLS: 00:04:00 •Hierarchical Row-Level Security: 00:13:00 •JSON & REST API: 00:10:00 •Setting up a local MySQL database: 00:14:00 •Connecting to a MySQL database in Power BI: 00:05:00 •Connecting to a SQL database (PostgreSQL): 00:05:00 •Congratulations & next steps: 00:06:00 •The End: 00:01:00 •Resources - Data Visualization and Reporting with Power BI: 00:00:00

Data Visualization and Reporting with Power BI
Delivered Online On Demand14 hours 25 minutes
£12

Interior design and decor onsite 5 week course

By FLOCK interiors

This is a one to one course running over five weeks, providing two hours a week of tuition on a flexible basis. The course is aimed at those keen to discover more about the practical aspect of interior design. Whether you are about to embark on a project of your own, are keen to learn more about your individual style, or are just looking to gain more confidence, this course will give you the knowledge and tools to confidently create stylish interiors.

Interior design and decor onsite 5 week course
Delivered OnlineFlexible Dates
£375

IT Administration and Networking

4.7(160)

By Janets

Register on the IT Administration and Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The IT Administration and Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The IT Administration and Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the IT Administration and Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Administration and Networking
Delivered Online On Demand3 days
£25

Level 5 Diploma in IT - Networking

4.7(160)

By Janets

Register on the Level 5 Diploma in IT - Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Level 5 Diploma in IT - Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Level 5 Diploma in IT - Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Level 5 Diploma in IT - Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

Level 5 Diploma in IT - Networking
Delivered Online On Demand3 days
£25

IT Manager

4.7(160)

By Janets

Register on the IT Manager today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The IT Manager is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The IT Manager Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the IT Manager, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Manager
Delivered Online On Demand3 days
£25

Autodesk Revit Complete Training

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime: With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This Autodesk Revit Complete Training course will help you to navigate the interface, enabling you to download, install, and understand essential tools such as Align, offset, mirror and many more. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Understand how to download, install, and troubleshoot Autodesk Revit Learn how to navigate the interface Get introduced to walls and wall panel, wall option bar, and wall properties palette Understand essential tools such as Align, offset, mirror - Pick, Axis, Mirror - Draw Axis Learn how to define the building levels and create reference levels 2 Understand how to make the Grid system Know major components of Autodesk Revit, such as placing structural or architectural columns on the grid Learn how to place the external and internal walls Understand minor components of Autodesk Revit, such as setting doors from the type selector Understand what is vertical circulation and roof components Why Autodesk Revit Complete Training right for you? This comprehensive online course will help you develop a solid understanding of certified hardware, subscriptions, Revit VS Revit LT, and help you install Revit on an Apple MAC. You will learn how to get started with Autodesk Revit, create an account, install the software, and configure the library and template file paths. In addition, this extensive course will teach you how to use the interface such as start screen, file tab, quick access toolbar and info centre, and navigate properties palette and project browser. By the end of the course, you will gain theoretical knowledge in Autodesk Revit essential tools, major and minor components, steps to create the next level, and vertical circulation. Autodesk Revit Complete Training Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Download, Install and Troubleshooting Introduction to download and install Revit System Requirements Certified Hardware Subscriptions Revit VS Revit LT Installing Revit on an Apple MAC Getting Started Creating an Account Installing the Software Configuring the Library and Template File Paths Introduction to the Beginners Course Introduction to the Beginners Course Touring the Interface 1.1 Start Screen [NOTES ATTACHED] 1.2 File Tab, Quick Access Toolbar & Info Centre 1.3 Tabs, Ribbons & Panels 1.4 Properties Palette & Project Browser 1.5 Status Bar, View Controls, Selection Toggles & Context Menu 1.6 Navigating the Drawing Area 1.7 Contextual Tab 1.8 Terminology Introduction to Walls 2.1 Introduction to Walls & the Wall Panel 2.2 Wall Option Bar 2.3 Wall Properties Palette Basic Tools 3.1 Align, Offset, Mirror - Pick Axis, Mirror - Draw Axis 3.2 Move, Copy, Rotate, Trim/extend to Corner, T/E Single Element, T/E Multiple 3.3 Split element, Pin, Array, Scale, Delete Datum Elements 4.1 Defining the Buildings Levels & Creating Reference Levels 4.2 Creating the Grid System Major Components 5.1 Placing Structural Columns on the Grid 5.2 Placing Architectural Columns on the Grid 5.3 Placing the External Walls 5.4 Placing the Internal Wall 5.5 Using the Equality Constraints 5.6 Placing the Ground Floor Slab 5.7 Placing a Boundary Footpath Minor Components 6.1 Placing Doors From the Type Selector 6.2 Loading Doors From the Library 6.3 Creating a New Door Type 6.4 Adding a Wall Opening 6.5 Editing the Walls Profile to Create an Opening 6.6 Adding a Structural Opening to the Wall 6.7 Placing Windows Creating the Next Level 7.1 Increasing Top Constraint 7.2 Placing the First Floor Slab 7.3 Adding a Shaft Opening to the Slab 7.4 Selection Filter and Aligned to Selected Levels Vertical Circulation 8.1 Stair by Component 8.2 Stair by Sketch 8.3 Creating Project Stair 8.4 Placing a Railing 8.5 Creating a Railing Roof Component 9.1 Introduction to Roof by Footprint 9.2 Pitched Roof by Footprint 9.3 Flat roof by Footprint 9.4 Roof by Extrusion Curtain Walls 10.1 Introduction to Curtain Walls 10.2 Constructing a Curtain Wall 10.3 Create 'Curtain Wall - Entrance' 10.4 Create 'Curtain Wall - Rear' 10.5 Create 'Curtain Wall - Front' Reflected Ceiling Plan 11.1 Introduction to Reflected Ceilings 11.2 Adjusting the Ceiling Position 11.3 Creating the First Floor Ceiling Plan 11.4 Adding Components to the Ceiling 11.5 Example of Rendered Ceiling Components Creating a 2D Detail (Callout) 12.1 Setting up a Callout 12.2 Masking and Filled Regions 12.3 Detail Components and Repeating Detail Components 12.4 Placing Insulation 12.5 Using the Detail Line and Creating a Line Style 12.6 Adding Text with Leaders 12.7 Adding Break Lines Dimensions 13.1 Introduction to Dimensions by Individual References 13.2 Dimension by Entire Wall 13.3 Witness Lines 13.4 Modifying a Dimension 13.4 Modifying a Dimension 14.1 Introduction to Tags 14.2 Adding information to the Tags 14.3 Placing Window Tags 14.4 Placing Wall Tags 14.5 Applying Tags to First Floor 14.6 Creating a Room and Placing Room Tags 14.7 Creating a Room Legend 14.8 Creating a Room Schedule 14.9 Creating a Door Schedule 14.10 Creating a Window Schedule 14.11 Creating a Door & Window Legend Visualisations 15.1 Introduction to Shadows and Sun Settings 15.2 Creating a One-Day Solar Study 15.3 Introduction to Rendering and Rendering First Image 15.4 Rendering Second Image 15.5 Introduction to Walkthroughs 15.6 Modifying a Walkthrough 15.7 Creating a Walkthrough Over Two Levels Create Sheets & Print 16.1 Opening a Sheet and Overview of the Title-block 16.2 Setting Up a Sheet Part 1 16.3 Setting Up a Sheet Part 2 16.5 Loading an A2 Title-block 16.6 Duplicating Views 16.7 Page Setup & Printing Who should take this course? This comprehensive course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of Autodesk Revit. Entry Requirements There are no academic entry requirements for this course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Autodesk Revit Complete Training Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Autodesk Revit Complete Training
Delivered Online On Demand
£25

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication™ functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups. Build, edit, execute, test, and remove a recovery plan Perform a planned migration This two-day, hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Introductions and course logistics Course objectives Site Recovery Manager Architecture Describe Site Recovery Manager architecture Identify disaster recovery options with Site Recovery Manager Evaluate how Site Recovery Manager integrates with VMware products Describe Site Recovery Manager licensing options List the disaster recovery topologies supported by Site Recovery Manager Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager Deploying and Configuring Site Recovery Manager Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager Define Site Recovery Manager virtual appliance system requirements Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Configuring Inventory Mappings Explain the importance of inventory mappings Identify configuration options for inventory mappings Describe the importance of placeholder virtual machines and datastores Describe the importance of the vSphere inventory changes for Site Recovery Manager operation Using Array-Based Replication Describe array-based replication Describe Storage Replication Adapters and explain their role for the array-based replication Describe the concept and configuration of array pairs Describe datastore groups and the relationship between devices and datastore groups Describe the role of consistency groups Identify the advantages of array-based replication vSphere Replication Describe Site Recovery Manager with vSphere Replication Architecture Discuss the role of vSphere Replication components Discuss use cases for vSphere Replication Discuss system requirements and operational limits of vSphere Replication Determine how to calculate bandwidth requirements for vSphere Replication Identify the advantages of vSphere Replication Deploy a vSphere Replication appliance Configure a vSphere Replication appliance and register it with vCenter Server Pair vSphere Replication appliances Deploy an additional vSphere Replication server Register a vSphere Replication server with a vSphere Replication management server Replicating VMs Using vSphere Replication Describe the replication process used by vSphere Replication List vSphere Replication replica states Describe vSphere Replication of encrypted virtual machines Describe vSphere native key provider Describe how to configure vSphere Replication Discuss vSphere Replication RPO settings Describe MPIT instances Describe additional vSphere Replication settings Describe how to disable vSphere Replication Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups Create a protection group View a placeholder virtual machine in the inventory Configure protection for virtual machines and edit protection groups Recovery Plans Discuss recovery plan concepts Discuss network planning Discuss the organization of storage for recovery plans Describe customization options in recovery planning Describe priority groups and VM dependencies Describe how to implement a recovery plan Configure VM recovery plan properties Describe the customization of recovery plans Configure additional steps in the recovery plan Delete a recovery plan Executing Recovery Plans Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Examine Site Recovery Manager integration with various vSphere technologies Describe how to conduct a recovery plan test Perform a recovery plan test Identify the effect on the storage layer during the test recovery steps Review the recovery plan test steps Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation Explain a recovery plan execution in planned migration or disaster recovery mode Identify the recovery steps for each execution type Describe a forced recovery Explain the importance of reprotection processes and states Examine failback steps Describe how to reprotect a data center Monitoring and Troubleshooting Identify Site Recovery Manager alarm options Generate Site Recovery Manager recovery plan history reports Configure Site Recovery Manager advanced settings Identify Site Recovery Manager logs Describe the vRealize Operations management pack for Site Recovery Manager

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Business and Communication Essentials

By Xpert Learning

About Course The Business and Communication Essentials Bundle on Xpert Learning is a comprehensive collection of courses designed to help you develop the essential skills and knowledge you need to succeed in the modern workplace. Whether you're a new graduate, a seasoned professional, or a business owner, this bundle will give you the tools you need to communicate effectively, manage documents efficiently, and navigate business etiquette confidently. The Bundle contains the following courses: Business Communication Business Etiquette for the Modern Workplace Business Ethics Document Management What Will You Learn? Communicate effectively in both written and verbal formats with a variety of audiences Manage documents efficiently and effectively using a variety of tools and technologies Navigate business etiquette in a variety of professional settings Understand and apply business communication best practices Course Content Business Communication A Comprehensive Course on Business Communication and Communication Skills In this Business Communication online course by Xpert Learning, you will learn how to adapt your communication style for different audience, how to nuance your communication in different situations and mediums, and in this process, maximize productivity. You will also learn the necessary skills to handle difficult conversations within the workplace. According to a LinkedIn survey, Communication is identified as the most sought-after soft skill among employers. Communication is an essential skill for every individual regardless of position in the hierarchy, industry, or location. For achieving organizational success, effective communication is crucial. Through precise and succinct communication, organizations can develop better strategies, enhance productivity, boost morale, and stimulate innovation. Because communication is so important in business, Organizations want and need people with good communication skills. However, most individuals do not communicate well and they are unaware of the fact. The communication shortcomings of employees and the importance of communication in business explain why you should work to improve your communication skills. Your ability to communicate effectively will determine how others perceive you, and largely, your performance and value in the organization. Business Communication is a Learned skill: you learn when and how to say or write the message that needs to be delivered. You can learn this skill from the comprehensive course developed by Xpert Learning. Through different learning mediums you will learn how to understand your audience and nuance your message accordingly, qualities of Effective Business Writing, how to write precise Business Reports, Emails, how to present a Steller Business presentation, and how to use these skills in your career development. Enroll today in this Business Communication Course and advance your career with Xpert Learning! Introduction to Business Communication Understanding your Audience and Deliver your Message Effective Business Writing Writing Business Reports and Emails Business Presentation Part 1 Business Presentation Part 2 Business Presentation Example Career Development: Job Searching, Resume/CV, Cover Letters, and Interview skills Conclusion Business Etiquette Business Etiquette is a crucial aspect of any professional career and is essential to make a lasting impression in the business world. This course provides a comprehensive guide to mastering business etiquette, covering all the critical aspects of professional behavior and communication. Whether you're starting a new job, seeking a promotion, or simply want to enhance your professional image, this course will provide you with the essential skills and knowledge to succeed. In this course, you will learn the fundamental principles of professional communication, including the art of conversation, effective writing, and active listening. You will also discover the importance of professionalism, including the proper use of social media, and the importance of showing up on time and being prepared for meetings. The business dress code and grooming section covers the best practices for dressing for success, including the appropriate attire for various occasions and events. You will also learn the dos and don'ts of networking manners and how to dress for a successful job interview. The business dining etiquette section teaches you how to make the most of your business meals, from selecting the right restaurant to making the perfect first impression. You will learn the etiquette of using utensils, making toasts, and much more. The meeting etiquette section covers the best practices for conducting successful meetings, including preparing an agenda, managing time effectively, and handling conflict. You will also learn the importance of following up after meetings and the proper use of technology in meetings. In conclusion, this course will provide you with the knowledge and skills to enhance your professional image and succeed in your career. With engaging lessons and practical tips, you'll be equipped with the business etiquette skills to make a lasting impression in any business setting. Whether you're a seasoned professional or just starting your career, this course is an investment in your personal and professional growth. Enroll now and take your professional skills to the next level! Introduction to Business Etiquette Professional communication Impression and Professional Image Business Dress code and Grooming part 1 Business Dress code and Grooming part 2 Business Dress code and Grooming part 3 Dressing and Networking Manners for Special Occasions and Events Dining etiquette Meeting etiquette Conclusion Business Ethics Ethical behaviour brings significant benefits to businesses such as attracting employees, customers and investors. But failure to manage it properly can create huge challenges. Suppose every employee knows the difference between correct or incorrect choices and how to handle various ethical dilemmas. This knowledge is likely to produce a work environment where moral transgressors are held accountable for their actions, ultimately building a healthier workplace for all involved. The course explores topics such as Ethical Decision-Making, Ethical culture in organizations, and Corporate Social Responsibilities .These provide practical information to help employees understand business issues and equip them with practical skills for success. Ethics will be formally defined, and the presenter will discuss the sources of ethical dilemmas and the stakeholder's importance when addressing a problem. Enrol now and strengthen yourself against Unethical practices in Business. Introduction to Business Ethics Ethical Decision-Making Ethical Culture in Organizations Business Ethics in the Digital Age Corporate Social Responsibility Conclusion Document Management Document Management: Develop and implement Document Management Strategy for productivity, security, and cost efficiency Are you tired of sifting through stacks of paper documents, losing important files, and dealing with security breaches? Our Introduction to Document Management course is here to help! In this course, you'll learn how to digitize paper documents and manage electronic files, and discover the benefits of implementing a Document Management System. We'll cover everything you need to know about protecting sensitive information, including implementing security measures, electronic signatures, access controls, and document destruction. You'll also learn how to create and edit digital documents, collaborate with others, and use version control to track changes. Compliance and regulatory considerations are crucial in Document Management, and we'll cover them in-depth. Additionally, we'll explore Document Workflow Management, including best practices for retrieval, archiving, and audit trails. The course will also cover emerging trends and developments in the field of Document Management, including content management, metadata, workflow automation, and electronic forms. You'll learn about information governance and information lifecycle management, and how these concepts impact Document Management. By the end of this course, you'll be able to troubleshoot and solve common Document Management issues, streamline your processes, and save valuable time and resources. This course is perfect for anyone looking to develop their skills in Document Management, from beginners to professionals. Join us today and revolutionize the way you manage documents! With our comprehensive curriculum and expert instructors, you'll gain the skills and knowledge you need to succeed in today's fast-paced digital world. Don't wait - sign up now and take the first step towards efficient and secure Document Management. Introduction to Document Management Digitizing paper documents and managing electronic files Document Management System Implementing security measures to protect sensitive information Document creation and editing Collaboration and Version Control Compliance and regulatory considerations for document management Document Workflow Management Troubleshooting and problem-solving for common document management issues Emerging trends and developments in the field of document management Conclusion A course by Xpert Learning Audience Administrative assistants Office managers Project managers Team leaders Sales professionals Customer service representatives Business owners Anyone who wants to advance their career in the workplace

Business and Communication Essentials
Delivered Online On Demand6 hours
£9.99