• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

16940 Courses

Project planning and control (In-House)

By The In House Training Company

This programme concentrates on the core planning skills needed to develop sound practical project plans in a team environment. This enables the plan to be modified should requirements change or difficulties arise. The programme also gives participants the confidence to practise those skills and apply them in the work environment and deliver their projects more successfully in the future. Participants learn fundamental project management concepts and terminology, demystifying the project management process, and, in particular, how to: Break a project down into manageable sections and ensure nothing is left out Understand and apply estimating techniques to develop realistic estimates Sequence work effectively and carry out critical path analysis to determine project duration and which tasks to pay closest attention to Manage project risk effectively to protect project value Monitor, control and re-plan the project to best keep it on track Close out the project and ensure the project comes to an orderly end 1 Introduction Self-introductions and personal objectives Course objectives Sharing of project issues 2 Project management concepts Characteristics of a project and what should be kept as operational responsibilities Understanding the triple and quadruple constraints - and their limitations Prioritising requirements through the MOSCOW technique Product v project life cycle Key project roles and responsibilities - the importance of sponsorship and clarity of roles 3 Starting a project, and the importance of the terms of reference / project brief Avoiding the pressure to 'just do it'! The importance and benefits of planning The best time to learn! Initial project documentation - the BOSCARDI approach 4 Breaking the work down Understanding alternative breakdown structures such as the product breakdown structure and work breakdown structure Guidelines for creating a work breakdown structure to ensure the full work scope is identified 5 Estimating Alternative estimating techniques and associated confidence levels Further considerations - loss and resource factors 6 Organising the work Use of network diagrams to develop a clear sequence of work Critical path analysis and calculating the project duration and task float - and usage 7 The management of project risk Understanding the nature of project risk The risk analysis and risk management processes How to best manage threats and opportunities Running a risk workshop Using the risk register 8 Scheduling the work The importance of the Gantt chart and understanding its limitations The Gantt chart layout and using alternative views such as the tracking Gantt Using alternative dependencies 9 Resource issues Assigning resources and resolving resource overloads Crashing and fast-tracking your project and potential issues to look out for 10 Controlling the project The control cycle and alternative feedback mechanisms Alternative progress reporting Assessing the impact The importance of re-planning The benefits of control Change control - the importance of impact analysis The steps of change control and the use of the issue register 11 Closing the project The project closure checklist Reviewing the project - things to avoid Developing meaningful lessons and ensuring they are applied effectively The post-project review - its importance to the organisation

Project planning and control (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified IT Specialist (CITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified IT Specialist (CITS)
Delivered OnlineFlexible Dates
Price on Enquiry

UK Employment Law

5.0(1)

By Course Gate

Master UK employment law with our online course covering recruitment, contracts, rights, discrimination, safety, and dismissal in 11 modules.

UK Employment Law
Delivered Online On Demand
£11.99

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. Introducing Cisco Security APIs Role of APIs in Cisco Security Solutions Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs Use cases and security workflow Consuming Cisco Advanced Malware Protection APIs Cisco AMP overview Cisco AMP endpoint API Cisco AMP use cases and workflows Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance Using Cisco ISE Introducing Cisco Identity services engine Cisco ISE use cases Cisco ISE APIs Using Cisco pxGrid APIs Cisco pxGrid overview WebSockets and STOMP messaging protocol Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine Using Cisco Threat Grid APIs Cisco threat grid overview Cisco threat grid API Cisco threat grid use cases and workflows Discovery 3: Construct a Python script using the Cisco threat grid API Investigating Cisco Umbrella Security Data Programmatically Cisco Umbrella investigate API overview Cisco Umbrella investigate API: Details Discovery 4: Query security data with the Cisco Umbrella investigate API Exploring Cisco Umbrella Reporting and Enforcement APIs Cisco Umbrella reporting and enforcement APIs: Overview Cisco Umbrella reporting and enforcement APIs: Deep dive Discovery 5: Generate reports using the Cisco Umbrella reporting API Automating Security with Cisco Firepower APIs Review basic constructs of Firewall policy management Design policies for automation Cisco FMC APIs in depth Discovery 6: Explore the Cisco Firepower management center API Cisco FTD automation with ansible Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration Cisco FDM API in depth Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API Operationalizing Cisco Stealthwatch and Its API Capabilities Cisco Stealthwatch overview Cisco Stealthwatch APIs: Details Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs Using Cisco Stealthwatch Cloud APIs Cisco Stealthwatch Cloud overview Cisco Stealthwatch Cloud APIs: Deep dive Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs Describing Cisco Security Management Appliance APIs Cisco SMA APIs overview Cisco SMA API Discovery 11: Construct reports using Cisco SMA APIs

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Developing iRules for BIG-IP

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system administrators, network administrators and application developers responsible for the customization of traffic flow through a BIG-IP system. This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Getting Started with iRules Customizing Application Delivery with iRules Triggering an iRule Leveraging the DevCentral Ecosystem Creating and Deploying iRules Module 3: Exploring iRule Elements Introducing iRule Constructs Understanding iRule Events and Event Context Working with iRule Commands Logging from an iRule Using SYSLOG-NG (LOG Command) Working with User-Defined Variables Working with Operators and Data Types Working with Conditional Control Structures (IF and SWITCH) Incorporating Best Practices in iRules Module 4: Developing and Troubleshooting iRules Mastering Whitespace and Special Symbols Grouping Strings Developing and Troubleshooting Tips Using Fiddler to Test and Troubleshoot iRules Module 5: Optimizing iRule Execution Understanding the Need for Efficiency Measure iRule Runtime Efficiency Using Timing Statistics Modularizing iRules for Administrative Efficiency Using Procedures to Modularize Code Optimizing Logging Using High-Speed Logging Commands in an iRule Implementing Other Efficiencies Using Looping Control Structures (WHILE, FOR, FOREACH Commands) Module 6: Securing Web Applications with iRules Integrating iRules into Web Application Defense Mitigating HTTP Version Attacks Mitigating Path Traversal Attacks Using iRules to Defends Against Cross-Site Request Forgery (CSRF) Mitigating HTTP Method Vulnerabilities Securing HTTP Cookies with iRules Adding HTTP Security Headers Removing Undesirable HTTP Headers Module 7: Working with Numbers and Strings Understanding Number Forms and Notation Working with Strings (STRING and SCAN Commands) Combining Strings (Adjacent Variables, CONCAT and APPEND Commands) Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands) Module 8: Processing the HTTP Payload Reviewing HTTP Headers and Commands Accessing and Manipulating HTTP Headers (HTTP::header Commands) Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri) Parsing the HTTP URI (URI::path, URI::basename, URI::query) Parsing Cookies with HTTP::cookie Selectively Compressing HTTP Data (COMPRESS Command) Module 9: Working with iFiles and Data Groups Working with iFiles Introducing Data Groups Working with Old Format Data Groups (MATCHCLASS, FINDCLASS) Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH) Module 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles Implementing Universal Persistence (PERSIST UIE Command) Working with the Stream Profile (STREAM Command) Collecting Statistics Using a Statistics Profile (STATS Command) Collecting Statistics Using iStats (ISTATS Command) Module 11: Incorporating Advanced Variables Reviewing the Local Variable Namespace Working with Arrays (ARRAY Command) Using Static and Global Variables Using the Session Table (TABLE Command) Processing Session Table Subtables Counting ?Things? Using the Session Table

F5 Networks Developing iRules for BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

The professional project manager (In-House)

By The In House Training Company

The aim of this programme is to provide current / prospective senior project managers with an in-depth review of the role and importance of project management in the organisation. It focuses on the strategic role of the project manager and aims to draw out the full scope of the role and how it impacts on project performance. The five key objectives of this programme are to enable the participants to: Identify the characteristics and attributes needed by project managers in ensuring the organisation is recognised as an industry leader in delivering successful projects Understand the full scope and impact of the project manager / leader's role in managing projects or programmes to maximise benefit to the business Define the hallmarks and skills required to manage significant business projects or project portfolios Develop an understanding of the skills required and their impact on the project through case study work and syndicate exercises Benefit from an effective forum for exchanging experience and fostering a sense of team spirit and mutual support between senior project managers DAY ONE 1 Introduction (Course sponsor) A vision of future opportunities and challenges The impact of project managers / leaders on future success 2 The determinants of success The contractor's perspective The client's perspective Success and failure: factors that determine the project outcome The impact of the project manager 3 Case study: Project Giotto How successful was this project? What were the primary factors that influenced the outcome? How relevant are these factors to current projects? Feedback and review 4 Project team exercise A practical exercise demonstrating the role of the project manager in managing the interfaces between the client, the project team and suppliers Review - what skills are required to be a 'world class' project manager? 5 The role of the Project Manager The role and skills of the 'world class' project manager The three key dimensions of effective project leadershipManaging influential stakeholdersManaging project performanceManaging the project team Project leadership skills appraisal (individual review) DAY TWO 6 Managing influential stakeholders Project management and the art of leadership Who are the influential stakeholders and how do they affect the project? What we need to do / not do, to build successful working relationships 7 Case study: Understanding the customer What are the likely problems the project manager will encounter? What should the project manager do to ensure an effective partnership? 8 Managing project performance Issues affecting commercial performance Joining up the project life-cycle: getting performance from inception to closure The roles of project manager, line manager and project sponsor 9 Project team exercise: Making the promise / delivering the promise An exercise demonstrating the commercial and team leadership skills needed by the project manager Review - what must the project manager do to optimise project performance? 10 Managing multi-functional project teams The challenges of building effective, multi-functional project teams Co-ordinating work across functional and organisational boundaries Maintaining strategic focus and balancing priorities 11 Making it happen Individual action planning Syndicate discussion 12 Course review and transfer planning (Course sponsor present) What will we do differently? How will we make it happen? Conclusion

The professional project manager (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Mandatory Refresher Training

5.0(1)

By Empower UK Employment Training

Enhance your professional skills in Health & Care with our Mandatory Refresher Training. Covering critical areas from First Aid to Mental Health, this training is designed to update and deepen your knowledge in Health Care settings. Ensure compliance and excellence in Care with our comprehensive course offerings. Learning Outcomes Administer effective First Aid as a Health Care professional. Apply specialised paediatric First Aid techniques in Care settings. Understand comprehensive Care Certificate standards for Health & Care. Advance in Health & Care with a Level 3 Diploma in Health & Social Care. Fulfill Duty of Care obligations with updated practices. Enhance communication within Health Care settings. Manage information securely and efficiently in Care environments. Implement robust infection control protocols in Health & Care. Promote equality and inclusion within Care settings. Adopt person-centred approaches to improve Care quality. Address mental health issues with confidence in Health Care. This Mandatory Refresher Training Bundle comes up with the following courses:Course 01: First Aid at Work Essentials of First Aid in Health & Care: Equip Health Care professionals with the skills necessary to respond to emergencies effectively. Course 02: Paediatric First Aid Specialised First Aid for Children: Focus on paediatric emergencies and preventative measures in Care settings. Course 03: Care Certificate Foundations of Professional Care: Standardized training fulfilling the Care Certificate requirements to ensure high-quality Health & Care services. Course 04: Level 3 Diploma in Health & Social Care Advanced Practices in Health & Care: Enhance your qualifications with advanced knowledge crucial for Health & Care professionals. Course 05: Duty of Care Ethical and Legal Practices in Care: Understand and apply Duty of Care to safeguard and promote the interests of those receiving Care. Course 06: Communication in Care Settings Effective Communication Techniques: Master communication skills to improve interactions and understanding within Health Care environments. Course 07: Information Handling in Care Settings Confidentiality and Data Management: Training on secure handling of information in compliance with Care standards. Course 08: Infection Prevention and Control in Care Settings Maintaining Safe Care Environments: Strategies to prevent and control infections, critical for patient and staff safety in Health Care settings. Course 09: Equality and Inclusion in Care Settings Promoting Diverse and Inclusive Care: Address and foster equality and inclusion practices within Health Care facilities. Course 10: Person Centred Approaches in Care Settings Individualized Care Strategies: Emphasize the importance of person-centred Care to enhance patient satisfaction and outcomes. Course 11: Mental Health Mental Health Awareness and Support: Equip staff with the skills to recognize and address mental health issues effectively in Health & Care settings.

Mandatory Refresher Training
Delivered Online On Demand15 hours
FREE

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

Power BI - introduction to intermediate (2 days) (In-House)

By The In House Training Company

This course starts with the basics then moves seamlessly to an intermediate level. It includes a comprehensive yet balanced look at the four main components that make up Power BI Desktop: Report view, Data view, Model view, and the Power Query Editor. It also demonstrates how to use the online Power BI service. It looks at authoring tools that enables you to connect to and transform data from a variety of sources, allowing you to produce dynamic reports using a library of visualisations. Once you have those reports, the course looks at the seamless process of sharing those with your colleagues by publishing to the online Power BI service. The aim of this course is to provide a strong understanding of the Power BI analysis process, by working with real-world examples that will equip you with the necessary skills to start applying your knowledge straight away. 1 Getting started The Power BI process Launching Power BI Desktop The four views of Power BI Dashboard visuals 2 Connecting to files Connect to data sources Connect to an Excel file Connect to a CSV file Connect to a database Import vs. DirectQuery Connect to a web source Create a data table 3 Transforming data The process of cleaning data Column data types Remove rows with filters Add a custom column Append data to a table Fix error issues Basic maths operations 4 Build a data model Table relationships Manage table relationships 5 Merge queries Table join kinds Merging tables 6 Create report visualisations Creating map visuals Formatting maps Creating chart visuals Formatting chart Tables, matrixes, and cards Control formatting with themes Filter reports with slicers Reports for mobile devices Custom online visuals Export report data to Excel 7 The power query editor Fill data up and down Split columns by delimiter Add conditional columns Merging columns 8 The M formula Creating M functions Create an IF function Create a query group 9 Pivot and unpivot tables Pivot tables in the query editor Pivot and append tables Pivot but don't summarise Unpivot tables Append mismatched headers 10 Data modelling revisited Data model relationships Mark a calendar as a date table 11 Introduction to calculated columns New columns vs. measures Creating a new column calculation The SWITCH function 12 Introduction to DAX measures Common measure categories The SUM measure Adding measures to visuals COUNTROWS and DISINCTCOUNT functions DAX rules 13 The CALCULATE measure The syntax of CALCULATE Things of note about CALCULATE 14 The SUMX measure The SUMX measure X iterator functions Anatomy of SUMX 15 Introduction to time intelligence Importance of a calendar table A special lookup table The TOTALYTD measure Change year end in TOTALYTD 16 Hierarchy, groups and formatting Create a hierarchy to drill data Compare data in groups Add conditional formatting 17 Share reports on the web Publish to the BI online service Get quick insights Upload reports from BI service Exporting report data What is Q&A? Sharing your reports 18 Apply your learning Post training recap lesson

Power BI - introduction to intermediate (2 days) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry