• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5027 Courses

Red Hat System Administration II (RH134)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Red Hat System Administration II (RH134)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-304T00 - Microsoft Azure Architect Design

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities

AZ-304T00 - Microsoft Azure Architect Design
Delivered OnlineFlexible Dates
Price on Enquiry

Dignity and Privacy

5.0(5)

By Wimbledon Training Services

The course will start by defining dignity and privacy within the healthcare sector, and will explain how the two are quite often linked. It will then go on to give you a range of useful professional tips about setting up the right working relationship with your service users, and discuss some of the issues that can arise when dignity and privacy are not respected.

Dignity and Privacy
Delivered Online On Demand
£30

Basic Fire Safety Awareness for Care Homes

5.0(5)

By Wimbledon Training Services

This course explains, in brief, why fires occur and what actions you must take to help prevent them starting and the actions you must take when they do. By completing this course you will be making your workplace a safer environment. This course is a variation on the Basic Fire Awareness course that contains information that is specific to employees of care and residential homes.

Basic Fire Safety Awareness for Care Homes
Delivered Online On Demand
£30

Principles of Communication

5.0(5)

By Wimbledon Training Services

This course covers some of the different ways of communication, how to identify barriers to communication and how to reduce these, making sure the person you are communicating with understands what you are communicating, how to get help with communication issues and much more.

Principles of Communication
Delivered Online On Demand
£30

Nutrition and Hydration

5.0(5)

By Wimbledon Training Services

This course will start by defining the various terms used when talking about nutrition and hydration in care environments, the basic elements of nutrition and eating a healthy balanced diet, identify the reasons why vulnerable people might suffer with dehydration and the tools you can use to identify people that are at risk of malnutrition and the steps you can take to deal with this condition.

Nutrition and Hydration
Delivered Online On Demand
£30

Mental Health Awareness

5.0(5)

By Wimbledon Training Services

This course explains the difference between mental health and mental illness. It covers the symptoms of a number of the most common mental illnesses so you will know what to look out for or what to expect if you are working with someone with one of these conditions. As well as providing some practical advice on how you can work effectively with those affected by these conditions.

Mental Health Awareness
Delivered Online On Demand
£30

Mental Capacity Act and Deprivation of Liberty Safeguards (MCA and DOLS)

5.0(5)

By Wimbledon Training Services

This course describes in detail the many facets and procedures of the Mental Capacity Act. This includes who the act affects, when it applies, how to assess capacity and the procedures that can be put in place in the home or workplace to ensure best practices are followed and people are treated fairly at all times.

Mental Capacity Act and Deprivation of Liberty Safeguards  (MCA and DOLS)
Delivered Online On Demand
£30

Learning Disability Awareness

5.0(5)

By Wimbledon Training Services

This course will start by giving you an overview of some of the common types and causes of learning disabilities and how they affect people. It will touch on how a person centred approach to care will get the best results and look at how management must perform, and at the needs of the individual. I will also discuss overcoming the stigma attached to learning disabilities and much more.

Learning Disability Awareness
Delivered Online On Demand
£30

Infection Control

5.0(5)

By Wimbledon Training Services

This course will start by defining infection prevention and control and explaining the impact of good and bad infection control. It then goes into detail about the legislation that applies to infection control, the different types of microorganisms, how bacteria are transmitted, the chain of infection, and much more.

Infection Control
Delivered Online On Demand
£30