Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010 or 2013 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment.You will:- Sign in, navigate, and identify components of the Office 365 environment.- Create, edit, and share documents with team members using Word Online, Excel Online, PowerPoint Online, and Microsoft SharePoint.- Collaborate and work with colleagues using the Team, Planner, and Yammer apps.- Use email and manage contacts with Outlook on the web.- Use instant messaging with Skype for Business.- Conduct online meetings with Skype for Business. This course is an introduction to Microsoft© Office 365© with Skype© for Business in a cloud-based environment. It can be used as an orientation to the full suite of Office 365 cloud-based tools, or the Skype for Business lessons can be presented separately in a seminar-length presentation with the remaining material available for later student reference. Getting Started Sign In to Office 365 Navigate the Office 365 Environment Collaborating with Shared Files Work with Shared Documents in SharePoint Edit Documents in Office Online Collaborate on the SharePoint Site Work with OneDrive for Business and Delve Using Productivity Apps Work with Productivity Apps in Combination Broadcast Messages with Yammer Collaborate with the Teams App Manage Tasks with the Planner App Using Outlook on the Web Send and Receive Email Manage Contacts Schedule Appointments Personalize Outlook on the Web Communicating with Skype for Business Overview of Skype for Business Use Instant Messaging Make Voice and Video Calls Using Skype for Business Meetings Initiate Meetings Use Meeting Controls and Options Customize Skype for Business Additional course details: Nexus Humans Office 365 Web Apps (with Skype for Business) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Office 365 Web Apps (with Skype for Business) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Developers System Administrators Solutions Architects Overview This course is designed to teach you how to: Design a microservices-based architecture that uses containers Use Amazon ECS to run and scale a microservices-based application Integrate Amazon ECS with other AWS services Running Container-Enabled Microservices on AWS is designed to teach you how to manage and scale container-enabled applications by using Amazon Elastic Container Service (ECS). This course highlights the challenges of running containerized applications at scale and provides guidance on creating and using Amazon ECS to develop and deploy containerized microservices-based applications. In the hands-on lab exercises you will use Amazon ECS to handle long-running services, build and deploy container images, link services together, and scale capacity to meet demand. You will also learn how to run container workers for asynchronous application processes. Module 1a: Overview of Microservices on AWS Welcome to Simple Mustache Service! The monolith What are microservices? How to implement a microservices infrastructure The six principles of microservices Module 1b: Containers and Docker Introduction to containers Comparing virtual machines with containers Docker Running containers Storing container images Hands-on lab: Building and running your first container Module 2: Continuous delivery for container-based microservices Compare and contrast different software development cycles Use AWS CodePipeline to code, build, and deploy a microservice Use AWS CodeCommit as a source control service Use Jenkins to perform a Docker build Use Postman to run and test microservices Use AWS CloudFormation to provision and deploy microservices Hands-on lab: Using the Amazon ECS Service Scheduler Module 3: High availability and scaling with Amazon Elastic Container Service High availability Cluster management and scheduling Monitoring Scaling a cluster Scaling services Hands-on lab: Continuous delivery pipelines for container-based microservices Module 4: Security for container-based microservices Implement security Apply best practices Automate security Evaluate compliance requirements Embed security into the CI/CD Hands-on lab: Extending Amazon ECS with Service Discovery and Config Management Additional course details: Nexus Humans Running Container Enabled Microservices on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Container Enabled Microservices on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of Microsoft Office, and who are now extending Microsoft 365 to a collaborative cloud-based environment. Overview In this course, you will work productively in the Microsoft 365 cloud-based environment. You will: Navigate Microsoft 365 and integrate the online apps. Use Microsoft Outlook on the Web. Use Microsoft Teams on the web. Store documents in SharePoint, OneDrive, and Teams. Work with files online. This course is an introduction to Microsoft 365 in a cloud-based environment. Using the Microsoft 365 suite of productivity apps online, users can easily communicate and collaborate through Microsoft Teams messaging and meeting functionality and Outlook email. When you create a team, the Microsoft SharePoint team site provides a central storage location for accessing and modifying shared documents. Each user also receives individual document storage through OneDrive for Business. Teams can provide a central hub for working with shared documents in the familiar apps?Word, PowerPoint, and Excel?as an alternative to installing the Microsoft 365 Desktop applications. Getting Started with Microsoft 365 for the Web Topic A:ÿSign In to Microsoft 365 Online Topic B:ÿNavigate the Microsoft 365 Web Environment Topic C:ÿIntegrate the Microsoft 365 Web Apps Using Outlook on the Web Topic A:ÿSend and Receive Email on the Web Topic B:ÿAccess the Outlook Calendar Online Using Teams on the Web Topic A:ÿAccess Teams Features Topic B:ÿCreate and Configure Teams and Channels Topic C:ÿChat and Post in Teams Topic D:ÿCall and Meet in Teams Storing Documents on the Web Topic A:ÿOrganize Documents in SharePoint Topic B:ÿOrganize Documents in OneDrive Topic C:ÿWork with Documents in Teams Topic D:ÿSelect a File Storage Location Working with Files Online Topic A:ÿEdit Documents in Microsoft 365 Online Topic B:ÿCollaborate on Files Online Topic C:ÿFind Shared Resources Online Additional course details: Nexus Humans Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This advanced course is appropriate for System Administrators, Technical Support Personnel, and Business Partners responsible for implementing LPARs on IBM Power Systems with AIX servers. Overview Discuss the advantages or value of PowerVM edition's featuresDefine micro-partitioning and shared processor LPARsDiscuss the benefits of simultaneous multithreadingDiscuss and configure the Integrated Virtual Ethernet (IVE)Install and configure the Virtual I/O ServerConfigure virtual network devices, such as virtual Ethernet and shared Ethernet adaptersConfigure virtual SCSI and virtual Fibre Channel storage adaptersConfigure virtual SCSI target devices on a virtual SCSI adapterDefine file-backed storage pools and file-backed virtual optical devicesIdentify single points of failure in virtualized environmentsConfigure multiple VIO servers for high availabilityConfigure advanced virtual networking optionsConfigure the shared Ethernet adapter failover featureConfigure advanced virtual SCSI optionsConfigure MPIO in a VIO server's client partitionManage the service events, configure call home, add, exchange FRUs, and discuss FSP failoverPerform PowerVM (VIOS) Maintenance This course explains the new features and benefits of virtualization including processor virtualization, Virtual I/O Server, and virtual devices, such as virtual Ethernet, virtual SCSI, and virtual Fibre Channel adapters. Course Outline Unit 1: Introduction to partitioning Exercise 1: Power Systems documentation overview Unit 2: HMC V8 enhancements Exercise 2: HMC enhanced interface Unit 3: Processor virtualization Exercise 3: Processor virtualization configuration Unit 4: Virtual Ethernet Exercise 4: Virtual Ethernet adapter configuration Unit 5: Virtual I/O Server and Shared Ethernet Adapter Exercise 5: Virtual I/O Server configuration Unit 6: Virtual SCSI devices Exercise 6: Client partition configuration Unit 7: Virtual network configuration with dual VIOS Exercise 7: SEA failover setup Unit 8: Virtual SCSI configurations with dual VIOS Exercise 8: Dual VIO server configuration with MPIO in the client partition Unit 9: Virtual Fibre Channel devices Exercise 9: Virtual Fibre Channel adapter configuration Unit 10: HMC Service Management Exercise 10: Manage service events Unit 11: PowerVM advanced systems maintenance Exercise 11: PowerVM system maintenance Exercise 12: (Optional) File-backed virtual SCSI devices Additional course details: Nexus Humans AN30 IBM Power Systems for AIX - Virtualization I - Implementing Virtualization training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN30 IBM Power Systems for AIX - Virtualization I - Implementing Virtualization course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Content Collaboration, with little or no previous Content Collaboration experience. Potential students include networking administrators, engineers, and architects interested in learning how to deploy or manage Citrix Content Collaboration. Overview Understand Enterprise File Synchronization, Sharing, and Citrix Content Collaboration architecture How to navigate the Citrix Content Collaboration administration interface and build StorageZones How to manage Citrix Content Collaboration users in an Active Directory environment Different StorageZone deployment considerations and scenarios In this course, you?ll learn about how to use Citrix Content Collaboration to share, sync, and secure content for your organization. You?ll understand the Content Collaboration architecture, StorageZone configurations and deployment options available, how to manage and administer your Content Collaboration environment, Citrix Files applications, and how single sign-on, and how to use the User Management Tool for Content Collaboration Content Collaboration Architecture Overview Introduction to Enterprise File Sync and Sharing (EFSS) including its use cases, legal, and data security considerations Review Content Collaboration architecture, components and storage features Management and Administration Getting Started in Content Collaboration How to configure and manage users, folders, permissions and administrative settings Additional cloud-based features and integrations Storage Zone Deployments and Configuration Overview of Storage Zones architecture and deployment options for customer-managed storage including proof-ofconcept, high-availability, and multi-site deployments Review system, networking, and hosting requirements including steps for server preparation, installation and configuration Manage, monitor, and upgrade Storage Zone deployments for optimal performance Single Sign-on and User Management Overview of SAML 2.0 protocol and single-sign on use cases,security and benefits Single Sign-on settings for Content Collaboration and supported identity provider configurations User provisioning with User Management Tool (UMT) and task scheduling for automated updates synchronization with Active Directory Citrix Files Applications Citrix Files application system requirements, configuration and settings Compare features and functionalities for various use case applications and workflows Lifecycle product version considerations Additional course details: Nexus Humans CSF-202: Citrix Content Collaboration Enterprise Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CSF-202: Citrix Content Collaboration Enterprise Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to recognize and manage their emotions, behaviors and impulses and apply these skills to the world around them. Overview Upon successful completion of the Developing Emotional Intelligence course, participants will have the tools to gain control over emotions, navigate challenging situations, and communicate empathetically. In this course, students will develop the skill of emotional intelligence to help maximize personal and professional success. Module One: Getting Started Getting Started Module Two: Introduction to Emotional Intelligence Defining Emotional Intelligence The Importance of EI Who Needs It? What Are Emotions? EQ vs. IQ Practical Illustration Module Three: The Components of EI Self-Management Self-Awareness Social Skills Internal Motivation Empathy Practical Illustration Module Four: Tools to Gain Control Journaling Meditation and Mindfulness Identifying Emotional Triggers Breathing Techniques Taking a Break Practical Illustration Module Five: Verbal Communication Skills Active Listening Asking Questions Consider Your Audience Choosing Your Words Be Authentic Practical Illustration Module Six: Nonverbal Communication Skills Body Language Tone Matters Facial Expressions Eye Contact Distance and Personal Space Practical Illustration Module Seven: Managing Relationships With Others Building Rapport Respond, Don?t React Show Gratitude Finding Common Ground Setting Boundaries Practical Illustration Module Eight: Overcoming Obstacles Recognizing and Admitting Failure Disagreeing Constructively Staying Cool Under Pressure Be Open to Perspectives The Power of Forgiveness Practical Illustration Module Nine: Application to Business Practices Working as a Team Setting Business Goals Interviewing for Successful Hires Giving and Receiving Feedback Customer Experience and Rapport Practical Illustration Module Ten: Benefits of Being Emotionally Aware Strong Interpersonal Relationships Able to Manage Change Reduced Stress and Anxiety Improved Decision Making Boosts Employee Morale Practical Illustration Module Eleven: Making an Impact Creating a Powerful First Impression Maintaining Your Composure Inspiring Leadership Gaining Self-Confidence Patience and Practice Practical Illustration Module Twelve: Wrapping Up Words from the Wise Additional course details: Nexus Humans Developing Emotional Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developing Emotional Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for Data Warehouse Administrator, Database Administrator, Database Designer, Support Engineer, and Technical Administrator. Overview Upon successful completion of this course, students will be able to Install Oracle Grid Infrastructure for a Standalone Server, Configure ASMLIB and create ASM disk groups, Apply the latest patch set updates to the Grid Infrastructure software, Install Oracle Database software, Use Oracle Restart to manage components, Prepare the Linux operating system for Oracle software installation, Upgrade Oracle Database, Create a container database, Install Oracle Grid Infrastructure for an Independent Server, Create an Oracle Database using DBCA, and Install the latest patch set updates to the Oracle database software. This Oracle Database: Deploy, Patch and Upgrade Workshop gives you detailed information to help you install Oracle Database software. In this course, you will be introduced to Oracle Database Cloud Service. Oracle Database Overview Oracle Database Introduction Oracle Database Architecture Overview Oracle Database Instance Configurations Oracle Database Memory Structures Process Structures Database Storage Architecture Logical and Physical Database Structures Container and Pluggable Database Overview Installing Oracle Grid Infrastructure for a Standalone Server Overview of Oracle Grid Infrastructure for a Standalone Server System Requirements for Oracle Grid Infrastructure Configuring Storage for Oracle Automatic Storage Management (ASM) Installing Oracle Grid Infrastructure for a Standalone Server Upgrading Oracle Grid Infrastructure for a Standalone Server Installing Oracle Database Software Planning Your Installation System Requirements for Oracle Database Preparing the Operating System Using 4 KB Sector Disks Setting Environment Variables Checking the System Requirements Using the Oracle Universal Installer (OUI) Performing a Silent Mode Installation Creating an Oracle Database by Using DBCA Planning the Database Storage Structure Choosing non-CDB or CDB Types of Databases (based on workload) Choosing the Appropriate Character Set Understanding How Character Sets are Used Setting the NLS_LANG Initialization Parameter Using the Database Configuration Assistant (DBCA) Using Oracle Restart Oracle Restart Overview Oracle Restart Process startup Controlling Oracle Restart Choosing the Correct SRVCTL Utility Oracle Restart Configuration Using the SRVCTL Utility Obtaining Help for the SRVCTL Utility Starting Components by Using the SRVCTL Utility Introduction to Upgrading to Oracle Database Upgrade Methods Data Migration Methods Supported Releases for Direct Upgrade Overview of Upgrade Process Performing a Rolling Upgrade Upgrading a CBD Preparing to Upgrade to Oracle Database Developing a Test Plan Performance Testing Requirements for Databases Using Oracle Label Security or Oracle Database Vault Requirement for Databases Using Oracle Warehouse Builder Using the Pre-Upgrade Information Tool Backing Up the Database Installing the Oracle Database Software Preparing the New Oracle Home Upgrading to Oracle Database Upgrading by Using the Database Upgrade Assistant (DBUA) Manually Upgrading to Oracle Database Migrating a non-CDB to a CDB Performing Post-Upgrade Tasks Migrating to Unified Auditing Performing Post-Upgrade Tasks Following a Manual Upgrade Migrating Data by Using Oracle Data Pump Data Pump Overview Migrating by Using Data Pump Importing by Using a Network Link
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Students taking this course are database administrators or prospective database administrators who have experience working with Access for Microsoft 365 and need to learn advanced skills. Overview In this course, you will manage an Access database and add complex database features to improve its usability, efficiency, performance, and security. You will: Share data across applications. Use action, unmatched, and duplicate queries to manage data. Create complex reports and forms. Use macros to improve user interface design. Use VBA to extend database capabilities. Perform database management tasks such as backup, compacting, repairing, performance analysis, checking object dependencies, and documenting. Implement security strategies and distribute a database to multiple users. You've covered many of the basic functions of Microsoft© Access©, and now you're ready to learn advanced Access features such as database management, advanced form design, packaging a database, encrypting a database, preparing a database for multiple-user access, and more. Knowledge of these features separates database professionals from the casual database users or occasional designers.This course is the third part of a three-course series that covers the skills needed to perform basic database design and development in Access.Microsoft© Access© for Office 365?: Part 1 : Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports.Microsoft© Access© for Office 365?: Part 2 : Focuses on optimization of an Access database, including optimizing performance and normalizing data; data validation; usability; and advanced queries, forms, and reports.Microsoft© Access© for Office 365?: Part 3 (this course): Focuses on managing the database and supporting complex database designs, including import and export of data; using action queries to manage data; creating complex forms and reports; macros and Visual Basic for Applications (VBA); and tools and strategies to manage, distribute, and secure a database.This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Importing and Exporting Table Data Topic A: Import and Link Data Topic B: Export Data Topic C: Create a Mail Merge Lesson 2: Using Queries to Manage Data Topic A: Create Action Queries Topic B: Create Unmatched and Duplicate Queries Lesson 3: Creating Complex Reports and Forms Topic A: Create Subreports Topic B: Create a Navigation Form Topic C: Show Details in Subforms and Popup Forms Lesson 4: Creating Access Macros Topic A: Create a Standalone Macro to Automate Repetitive Tasks Topic B: Create a Macro to Program a User Interface Component Topic C: Filter Records by Using a Condition Topic D: Create a Data Macro Lesson 5: Using VBA to Extend Database Capabilities Topic A: Introduction to VBA Topic B: Use VBA with Form Controls Lesson 6: Managing a Database Topic A: Back Up a Database Topic B: Manage Performance Issues Topic C: Document a Database Lesson 7: Distributing and Securing a Database Topic A: Split a Database for Multiple-User Access Topic B: Implement Security Topic C: Convert an Access Database to an ACCDE File Topic D: Package a Database with a Digital Signature