• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27121 Courses

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for programmatic developers looking to write programmatic customizations to both business logic and UI layers using Apex and Visualforce. You should have a good understanding of core object-oriented programming concepts and experience building declarative solutions on the Salesforce Platform. This course is also a great foundation builder if you're looking to earn your Salesforce Platform Developer I credential. IMPORTANT: Students are expected to follow the steps detailed in the Computer Set-up Guide for this class if you'll be using your own computer when attending a virtual or in-person class. Overview Learn modern tools for developing on the Salesforce Platform using Visual Studio Code, the Salesforce Extension Pack, and the Salesforce CLI. Write business logic customizations using Apex triggers and classes; those customizations will use SOQL and DML. Design programmatic solutions that take advantage of declarative customizations. Describe how your trigger code works within the basics of the Save Order of Execution. Describe some of the fundamental aspects of designing programs on a multi-tenant platform. Write Visualforce markup and code to customize the user interface. Use the built-in testing framework to test Apex and Visualforce. Learn how to customize and design applications programmatically on the Salesforce Platform. In this 5-day class, our platform experts will introduce you to Apex (Salesforce?s programming language) and Visualforce markup, so you can customize your Salesforce applications using code and explore how Apex interacts with declarative customizations on the platform. Learn how to retrieve, manipulate, and store data programmatically in data objects (sObjects), write and test custom logic, write Visualforce pages to customize your user interface, and deploy your solutions to another environment. Get an overview of the declarative automation tools available on the platform and a brief introduction to the Lightning Component framework. Plus, explore the nuances of working on a multi-tenant platform so you can extend the platform to meet business demands. Declarative Automation Create Formula Fields Create Roll-Up Summary Fields Understand Record Types Review Other Automation Tools Build a Data Model on the Salesforce Platform Programming with Apex Describe Key Aspects of Apex That Differentiate It from Other Languages, Such as Java and C# Describe Why Apex Transactions and Governor Limits Must Be Considered When Writing Apex Execute Simple Apex Use the sObject Data Type, the Primitive Data Types, and Basic Control Statements in Apex Using SOQL and SOSL to Retrieve Your Org?s Data Write a Basic Query Using Salesforce?s Query Language, SOQL Process the Result of a Query in Apex Create a Query Dynamically at Run-Time Use SOQL to Query Parent-Child Relationships Describe a Relationship Query Write a Query That Traverses a Child-to-Parent Relationship Write a Query That Traverses a Parent-to-Child Relationship Use SOSL to Search Data Using DML to Manipulate Your Org?s Data List the Differences Between the Ways You Can Invoke DML Operations Write Apex to Invoke DML Operations and Handle DML Errors Deployment What Is Deployment? Deploy Code Using Change Sets Use the Ant Migration Tool Review Managed and Unmanaged Packages Explore Salesforce DX Trigger Essentials Describe What a Trigger Is Used For Describe the Syntax of a Trigger Definition Use Trigger Context Variables Apex Class Essentials Describe How Apex Classes Are Used Define an Apex Class Determine What Data an Apex Class Can Access The Save Order of Execution, Apex Transactions, and Platform Events Describe Key Points in the Order of Execution Describe How Triggers Fit Into and Can Be Impacted by the Order of Execution Describe the Lifecycle of an Apex Transaction Describe the Memory Lifecycle for Static Attributes Use Platform Events for Immediate Error Logging Apex Testing Describe the Apex Testing Framework Create Test Data Write and Run an Apex Test Test Best Practices Strategies for Designing Efficient Apex Solutions Describe Best Practices for Writing Code That Is Easy to Maintain and Extend Write Triggers and Classes That Assume Batches of Data as Input Write Code That Works Efficiently with the Database, Both in Querying and Using DML Trigger Design Strategies List Declarative Mechanisms You Can Use to Implement Complex Business Logic, What Types of Problems They?re Best Used for, and Their Limitations Describe Ways in Which You Can Use Declarative Functionality to Improve Your Programmatic Solutions Working with Visualforce Create a Visualforce Page Reference a Standard Controller Launch a Visualforce Page Using a Custom Button Display Data from a Record in a Visualforce Page Reference Custom Controllers and Controller Extensions Work with List Controllers Visualforce Development Considerations and Testing Describe Common Limit Issues and Security Concerns Describe Strategies for Testing Visualforce Controllers Write Tests for Controller Constructors Write Tests for Action Methods, Getters, Setters, and Properties Lightning Components Create and Surface an Aura Component Create and Surface a Lightning Web Component Additional course details: Nexus Humans Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Sound & Music for Visual Media (Non-Qualification course)

5.0(8)

By Black & Gold Audio

This is a non – qualification course where learners will explore the world of music composition and sound recording for Film, TV & Games. Students will learn how to create, arrange and use music for a visual narrative exploring various genres including epic, horror, thriller, comedy and romance. Along side the music composed for a visual, the recording of sound (field & foley recordings) will be undertaken for the ‘onscreen’ SFX synchronisation. The use of Logic Pro X (DAW) as both a composition and synchronisation tool will be explored, as well as the use and techniques of microphones and field recording devices.  Day: Saturdays (6 weeks) Times: 10am - 3.30pm  Who is this course for?  Those that are interested in Sound and Music for visual media and have an interest in exploring composition and recording for TV, Film & Games. Students are not required to have previous knowledge of playing an instrument, using a DAW or recording with microphones but previous experience would be an advantage  What will I learn?  This will include course objectives. •Understand the history of media sound & music •Understand and use a DAW to compose music •Understand and use compositional techniques to support visual narrative. •Understand and use Microphones and techniques in the recording process •Understand sound design and synchronisation to support visual narrative. How will I learn? The aim of the course is to build an understanding of these specialist areas and use some of the techniques explored in a short visual clip of your choice. The work is completed within the sessions through recording and composition on the equipment and is supported by a vast amount of learning resources supplied by the tutor. Practicing composition and recording at home would also be an advantage if you have the equipment, but not a necessity. 

Sound & Music for Visual Media (Non-Qualification course)
Delivered In-Person in TruroFlexible Dates
Price on Enquiry

First Aid & Trauma Course for Equestrians

By NR Medical Training

In the world of equestrian sports and care, unique challenges and risks are ever-present. That's why NR Medical Training presents our tailored Equestrian First Aid and Trauma course, designed especially for riders, horse trainers, stable staff, vets, and anyone involved in the equine field. Taught by experienced Paramedics and EMTs who have seen and managed everything on the course. Spanning a comprehensive 2-day workshop, this hands-on, face-to-face course provides real-world solutions to real-world problems. Whether it's handling a sudden injury during a riding session or managing a complex trauma situation, our course offers you the skills, insights, and confidence to act appropriately.

First Aid & Trauma Course for Equestrians
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

Python Introduction

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is aimed at students new to the language who may or may not have experience with other programming languages. Overview Learn how Python works and what it's good for. Understand Python's place in the world of programming languages Learn to work with and manipulate strings in Python. Learn to perform math operations with Python. Learn to work with Python sequences: lists, arrays, dictionaries, and sets. Learn to collect user input and output results. Learn flow control processing in Python. Learn to write to and read from files using Python. Learn to write functions in Python. Learn to handle exceptions in Python. Learn to work with dates and times in Python. In this Python training course by Webucator, Inc, students learn to program in Python. Python Basics Running Python Hello, World! Literals Python Comments Data Types Variables Writing a Python Module print() Function Named Arguments Collecting User Input Getting Help Functions and Modules Defining Functions Variable Scope Global Variables Function Parameters Returning Values Importing Modules Math Arithmetic Operators Modulus and Floor Division Assignment Operators Built-in Math Functions The math Module The random Module Seeding Python Strings Quotation Marks and Special Characters String Indexing Slicing Strings Concatenation and Repetition Common String Methods String Formatting Built-in String Functions Iterables: Sequences, Dictionaries, and Sets Definitions Sequences Unpacking Sequences Dictionaries The len() Function Sets *args and **kwargs Flow Control Conditional Statements The is and is not Operators Python's Ternary Operator Loops in Python The enumerate() Function Generators List Comprehensions File Processing Opening Files The os and os.path Modules Exception Handling Wildcard except Clauses Getting Information on Exceptions The else Clause The finally Clause Using Exceptions for Flow Control Exception Hierarchy Dates and Times Understanding Time The time Module The datetime Module Running Python Scripts from the Command Line The sys Module sys.argv

Python Introduction
Delivered OnlineFlexible Dates
Price on Enquiry

BizTalk Server 2021 Developer Deep Dive

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for experienced BizTalk Server Developers who have at least one year of hands-on experience developing BizTalk Server applications. Overview In this 5-day course, you will learn how to apply best practices and design patterns to build smarter BizTalk Server applications. Furthermore, this course provides extensive coverage of BizTalk Server's extensibility, including such topics as: custom functoids, custom pipeline components, and invoking external .NET methods. This course is designed specifically for experienced BizTalk Server developers and focuses on best practices & pattern-based design while pulling back the curtain on some of BizTalk Server's eccentricities. Review of BizTalk Server Fundamentals The BizTalk Server Architecture Inner Workings of the Messaging Engine Messaging Engine Deep Dive Two-way Messaging Without Orchestrations Designing and Testing Schemas Schema Design Enabling Unit Testing for BizTalk Projects Data Translation and Transformation Custom Data Transformation Creating Custom Pipeline Components Working with Message Interchanges Debatching Message Interchanges Advanced Concepts of WCF Adapters Connecting to External Systems Using WCF LOB Adapters in BizTalk Server Publishing and Consuming WCF and RESTful Services Overview of Service Integration Using WCF Implementing WCF Services Preprocessing Messages with IIS Modules Consuming Services Advanced Orchestration Communication Patterns Orchestration Engine Deep Dive Splitting and Aggregating Messages using Orchestrations Orchestration Communication Bridging the Synchronous/Asynchronous Gap Across Multiple Channels Correlating Messages in Orchestration Instances Building Convoy Orchestrations Handling Orchestration Faults and Exceptions Exception Handling in Orchestrations Implementing Transactions and Compensation Creating Transactional Processes Designing Custom Tracking Models for BizTalk Applications Introduction to Business Activity Monitoring Enabling Business Activity Monitoring Extending BAM Beyond BizTalk Building Declarative Logic Using the Business Rules Engine Concepts of Declarative Logic Fundamentals of BizTalk BRE Integrating Policies with BizTalk Advanced Concepts of the Business Rules Engine Advanced Business Rule Concepts Working with Advanced Facts Integrating Across Business Boundaries Using Parties, Roles, and EDI Port Binding Option Review Role-Based Integration What is EDI? Enabling EDI-Based Messaging

BizTalk Server 2021 Developer Deep Dive
Delivered OnlineFlexible Dates
Price on Enquiry

How to become a First Aid at Work Instructor

5.0(11)

By Trainmetodo

FAW, EFR, First Aid, CPR, HSE First Aid At Work

How to become a First Aid at Work Instructor
Delivered Online On Demand
FREE

CRM: Customer Relationship Management with Customer Service Training

By Training Tale

CRM (Customer Relationship Management) Online Do you want to get a comprehensive understanding of Customer Relationship Management? Then you are in the right place. Our CRM Course (Customer Relationship Management), focuses on strategies and tools to optimize interactions with customers. Participants of the CRM Course (Customer Relationship Management) learn to leverage CRM systems, analyse customer data and implement effective communication strategies. The CRM Course (Customer Relationship Management) covers customer retention, acquisition, and satisfaction. Our CRM Course (Customer Relationship Management) also emphasises the role of technology in enhancing relationships. Moreover, the CRM Course (Customer Relationship Management) include CRM implementation, customer segmentation, and the integration of sales. How to do marketing and customer service is also a part of this CRM Course (Customer Relationship Management). Participants of the CRM Course (Customer Relationship Management) will gain practical insights into building long-lasting customer connections. Why Choose the CRM (Customer Relationship Management) Course from Us Self-paced CRM course, access available from anywhere. Easy to understand, high-quality study materials. CRM Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the CRM course. Course Included Main Course: CRM (Customer Relationship Management) Free Courses Course 01: Level 2 Customer Service [ Note: Free PDF certificate as soon as completing the CRM: CRM course] CRM (Customer Relationship Management) Online Training Course Curriculum of CRM Module 01: Introduction to Customer Relationship Management (CRM) Module 02: CRM Fundamentals Module 03: CRM Strategies Module 04: Data Analysis in CRM Module 05: CRM Databases Module 06: Deepening Customer Relationship Module 07: Handling Customer Complaints Module 08: Future of CRM Assessment Method of CRM After completing each module of the CRM (Customer Relationship Management) Online Training, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification of CRM After completing the MCQ/Assignment assessment for the CRM (Customer Relationship Management) Online Training course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? CRM (Customer Relationship Management) Online Training This CRM: CRM Course (Customer Relationship Management) is designed for anyone who wants to build strong customer relationships and improve their business prospects. Requirements CRM (Customer Relationship Management) Online Training There are no specific requirements for this CRM: CRM course because it does not require any advanced knowledge or skills. Career path CRM (Customer Relationship Management) Online Training Through this CRM: CRM Course (Customer Relationship Management) completion, you can get jobs like: CRM Analyst (£25,000 - £35,000) Manager (£30,000 - £50,000) Customer Service Manager (£25,000 - £50,000) Marketing Manager (£30,000 - £60,000) Sales Manager (£30,000 - £60,000) Certificates Certificate of completion Digital certificate - Included

CRM: Customer Relationship Management with Customer Service Training
Delivered Online On Demand15 hours
£12

OO220 - Operations Orchestration 10.x Flow Development

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is recommended for:OperatorsDevelopersAdministrators Overview After completing this course, you should be able to:Run and manage automated workflows using HP Operations Orchestration (OO) 10.xPerform a wide range of system administration, monitoring, and management tasks using OO CentralAuthor, maintain, document, and package new automated workflows using the OO Studio applicationTest and debug the flows locally and remotelyWork with Looping and Iteration operationsApply parallel processing methods to your flows in HP Operations Orchestration (OO)Use responses, rules, and transitions to control flow runUse XML operations and XML filters for processing XML content in OOWork with JavaScript Object Notation (JSON) operationsUse the file system content in the OO libraryAdd email notifications to your flowsExecute scriptlet methods in OO to manage flow data and flow executionInstall, configure, and update OO This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. Additional course details: Nexus Humans OO220 - Operations Orchestration 10.x Flow Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OO220 - Operations Orchestration 10.x Flow Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OO220 - Operations Orchestration 10.x Flow Development
Delivered OnlineFlexible Dates
Price on Enquiry