• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

30937 Courses

Communication Manager Course

5.0(14)

By Training Express

Effective communication lies at the heart of every successful organisation, shaping relationships, enhancing collaboration, and driving clear understanding across teams and stakeholders. This Communication Manager Course is designed to elevate your ability to convey ideas with clarity, confidence, and professionalism. Whether refining basic communication skills or mastering advanced techniques, you will gain a deeper insight into verbal, non-verbal, and digital interactions that influence daily business conversations. Throughout the course, you will explore essential areas such as telephone etiquette, the subtle language of body movements, and the art of impactful communication in various settings. Each module builds upon the previous, equipping you with the knowledge to manage communications smoothly and with tact. Perfectly suited for professionals aiming to enhance their communication strategy, this course offers a focused and flexible approach to help you excel in managing messages that truly resonate. Key Benefits Accredited by CPD Instant e-certificate Fully online, interactive course Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Curriculum Module 01: Basic Communication Skills Module 02: Advance Communication (I) Module 03: Advance Communication (II) Module 04: Telephone Etiquette Module 05: Body Language and Effective Communication Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing an online module. For each test, the pass mark will be set to 60%. Certificate Once you've successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we do recommend that you renew them every 12 months. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Communication Manager training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Communication Manager training. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included

Communication Manager Course
Delivered Online On Demand1 hour
£15

Ushering The Team Back To The Workplace

By Dickson Training Ltd

Most organisations and businesses are trying to navigate the best way back to a functional working framework. But two things need to happen - 1. The working practices need to be efficient, sustainable and compatible for meeting the demands and needs of the organisation; it’s clients, it’s workforce and it’s Leaders 2. The culture needs to be welcoming, authentic and supportive otherwise there will be disenfranchisement and potentially a churn of staff and loss of talent What has been proven to be a very successful approach to mitigate the dangers of demotivated team members and poor efficiency levels is a bespoke ‘Ushering the Team Back to the Workplace’ workshop. Programme Outline Below is a template of an actual Programme that has been delivered very successfully for clients such as the NHS; Claranet; Jotun Paints & Workspace. This, however, can be modified to suit any group or size. It will be designed to reflect the Organisation’s preferred Hybrid working framework and communication systems. The options of having the innovative Real Play technique to help handle delicate conversations is especially effective. The biggest gain is to reconnect the relationships via the activities and exercises, which would be selected carefully. Key commitments and buy-in is always the priority outcomes - which this programme will help deliver in just 1 day. The objectives include: Making the transition back to working as a collaborative team Enhancing the Leadership skills of the team Reviewing/establishing the Hybrid working protocols Galvanising the Team spirit Maintain inclusivity among full-time; part-time and Region based team members Energising and motivational Fun! Exercise – Round the Bend The team are to follow the instructions delivered as they walk (and jump) through the route – always keeping a safe distance apart. The instructions become more complicated as they progress. Debriefing points: Dealing with Change Attention to Detail Adapting approach Optimising results Exercise - Number Crunch (3 x Cohorts of 12/13) The team must be effectively led and motivated to work as one unified group to reach their objective of visiting each numbered location within a very tight deadline. Debriefing points: Support and co-ordination Strategy and planning Adapting approach Optimising results Tutorial – Team Dynamics Tuckman model Phases of Development towards Maturity Exercise - Juggling (3 x Cohorts of 12/13) The group(s) will be invited to optimise the number of ‘clients’ (juggling balls) they can manage at one time. This involves devising a sequence between the group to achieve maximum results without making any mistakes. We introduce different balls which represent different degrees of complexity, challenging the group’s preparation and approach to a variety ‘customers’ needs. Debriefing points: Ensuring effective communication Clarifying the approach for dealing with the unexpected Setting expectations and reviewing delivery Treating every colleague with care and respect Tutorial - Email Etiquette The primary standards – best practices ABSURD model Preparation and planning Top Tips World Cafe The team are split into 5-6 sub-groups – each with a specific review focus:- What recommendations do you have to engage the team back into the Workplace? How do we ensure the framework is efficient? What are the best ways to optimise team working strategically when most/all team members are in the office? What potential barriers are there? How do we accommodate for the Regional team members? What are the benefits to bringing the team back to the workplace? Each session has 2 – 3 rounds with each table’s ‘host’ sharing feedback for applying to the Team Action Plan – or Charter. Debriefing points: Each Syndicate’s recommendations and capture the key actions they generate 'Real Play' We offer an innovative solution to bring real Leadership/team scenarios to life. We use actors who improvise scenarios which have been specified by the group. The group is split the group into 2 sub-groups, one with the Actor, the other with the Trainer. Each group has a brief and has to instruct their Trainer/Actor on how to approach the scenario supplied. The Actor and Trainer perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers Assign 24 x ‘Directors’ (4 for each Player – Phil & Julia – for each Real Play. Potential Real Play Scenarios: Engaging with a team member as to how the new working plans will be applied. Overcoming concerns to the new working practices/framework Addressing issues where a team member feels excluded from the teamworking practices/culture Debrief the Programme Individual Action Plans Team Priorities for application into the workplace

Ushering The Team Back To The Workplace
Delivered in Bardsey + 3 more or UK Wide or OnlineFlexible Dates
Price on Enquiry

BA01 - Business Analysis Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA01 - Business Analysis Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Managing a Global Team

4.9(9)

By Sterling Training

Our teams are increasingly built from colleagues from around the world, each of whom has their own unique culture and communication style. We can help you embrace, enjoy and harness the diversity in teams for incredible outcomes! This course includes: The impact on the team of language and cultural differences Communication techniques for an effective global team The importance of clarity and commitment The difference in planning and scheduling across cultures Different perceptions of power and leadership Leveraging the diversity in your team

Managing a Global Team
Delivered in Southampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

COSHH Regulations & Risk Assessments Course

5.0(14)

By Training Express

** What You Get In This Total Package ** Course 01: Control of Substances Hazardous to Health Training with FREE Hardcopy & PDF Certificate Course 02: RIDDOR Training with FREE PDF Certificate Course 03: PUWER with FREE PDF Certificate Unlimited Retake Exams Lifetime Access of all the Courses Instant Access to the Courses COSHH, RIDDOR, PUWER courses teache you everything on the topic thoroughly from scratch so you can claim a certificate of achievement for free to showcase your achievement in professional life. These courses is a comprehensive, instructor-guided course, designed to provide a detailed understanding of the nature of the related sector and your key roles within it. To become successful in your profession, you must have a specific set of skills to succeed in today's competitive world. In this in-depth training course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills. The training materials of this course are available online for you to learn at your own pace and fast-track your career with ease. Course 01: COSHH (Control of Substances Hazardous to Health) Training Course 02: RIDDOR Training Course 03: PUWER Key Features of the COSHH, RIDDOR, PUWER Course : Instant e-certificate and hard copy dispatch by next working day Fully online, interactive course with audio voiceover Developed by qualified professionals in the field Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases *** Additional Gifts *** Free Life Coaching Course *** (Offer Ends Soon) *** Course Curriculum of COSHH (Control of Substances Hazardous to Health) Training The detailed curriculum outline of our COSHH (Control of Substances Hazardous to Health) Training course is as follows: COSHH Explained COSHH Regulations Health Problems Related to Hazardous Substances Identifying Hazardous Substances COSHH Risk Assessments Control Measures and Monitoring Implementing Control Measures Course Curriculum of RIDDOR Training The detailed curriculum outline of our RIDDOR Training course is as follows: Health and Safety at Work and the Laws Managing for Health and Safety Risk Assessment and Common Risks RIDDOR Course Curriculum of PUWER The detailed curriculum outline of our PUWER course is as follows: Provision and Use of Work Equipment Regulations Selection and Conformity of Work Equipment Safe Functionality of Work Equipment Monitoring and Evaluation of Work Equipment Maintenance of Work Equipment Accreditation All of our courses, including this COSHH, RIDDOR, PUWER course, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed your COSHH, RIDDOR, PUWER course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we do recommend that you renew them every 12 months. Assessment At the end of the course, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven't, there's no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself. Who is this course for? Anyone with a knack for learning new skills can take this COSHH, RIDDOR, PUWER course. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions. This course is a must for any professional who is responsible for handling or working with hazardous chemicals in the workplace, such as: Construction workers Cleaning professionals Welders Gas Engineers Career path Food business Beauty industry Engineering industry Welding industry Woodworking industry Automobile industry Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the hard copy certificates for Free! The delivery charge of the hard copy certificate inside the UK is £3.99 each.

COSHH Regulations & Risk Assessments Course
Delivered Online On Demand1 hour
£15

AWS Media Essentials for IT Business Decision Makers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for Business Leaders, including managers/supervisors in the following roles: Developer Architect Video Operator Overview In this course, you will learn to: Articulate the essential terms and concepts fundamental to video compression and distribution Describe the four fundamental stages of video streaming workflows: ingest, process, store and deliver Explain the importance of security in the AWS Cloud and how it is applied in video streaming workflows Analyze video streaming workflow diagrams using AWS services, based on simple to complex use cases Describe some of the key variables that influence workflow decisions Recognize how other AWS services for compliance, storage, and compute, interact with AWS Media Services in video streaming workflows and the functions they perform Describe strategies to test or prototype workflows to mitigate risk and cost impacts and optimize video streaming workflows Use the AWS Management Console to build and run simple video streaming workflows for live and video-on-demand content Recognize the automation and data analytics available for Media Services when used with AWS AI and explore media-specific use cases for these services Identify the next steps in exploring migration to the cloud for one or more Media Services This course covers the media and cloud fundamentals that will empower you to develop a cloud migration strategy for media workflows in support of business goals. The course covers important concepts related to video processing and delivery, the variables that can impact migration decisions, and real-world examples of hybrid and cloud use cases for AWS Media Services. It also introduces security, artificial intelligence, and analytics concepts to help you consider how AWS Media Services fit into your overall cloud strategy. Module 1: Important video concepts Video Metrics Video Compression Video Distribution Major Protocols Used in Video Streaming Module 2: Anatomy of streaming workflows Ingest Process Store Deliver Module 3: Using AWS services in media workflows video-on-demand (VOD) Introduction to AWS Media Services Security Variables Impacting Workflow Design VOD Simple Use Cases VOD Advanced Use Cases Lab 1: Build and run a simple video streaming workflow for VOD content Module 4: Using AWS services in media workflows live streaming Challenges of Live Streaming Live Streaming Simple Use Cases Live Streaming Advanced Use Cases Lab 2: Build and run a simple video streaming workflow for live content Module 5: Optimizing Workflows Cost Considerations Mitigating Risk Monitoring and Automation Exploring Migration Options Additional course details: Nexus Humans AWS Media Essentials for IT Business Decision Makers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Media Essentials for IT Business Decision Makers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Media Essentials for IT Business Decision Makers
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

WM676 IBM Integration Bus V10 Application Development II

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This intermediate course is designed for integration specialists and senior-level developers with experience in IBM Integration Bus application development. Overview After completing this course, you should be able to:Use event driven message processing to control the flow of messages by using message aggregation, message collections, message sequences, and time-sensitive nodesTransform data by using Microsoft .NET and XML stylesheetsAnalyze and filter information in complex XML documentsExtend DFDL message modelsUse message sets and the Message Repository Manager (MRM) parserProvide a message flow application as a web serviceRequest a web service from within a message flowDescribe how to implement WS-Addressing and WS-Security standards in IBM Integration BusCreate an integration serviceCreate and implement an IBM MQ request and response service definitionCreate and implement a database service definitionConfigure security-enabled message processing nodesCreate a decision service that implements business rules to provide routing, validation, and transformationExpose a set of integrations as a RESTful web serviceUse a global cache to store static dataRecord and replay data that a message flow application processesImplement publish and subscribe with IBM Integration BusDescribe the workload management options for adjusting the message processing speed, and controlling the actions that are taken on unresponsive flows and threadsConstruct user-defined patternsDescribe how IBM Integration Bus integrates with other IBM products such as IBM WebSphere Enterprise Service Bus and IBM DataPower Appliances This course focuses on using IBM Integration Bus to develop, deploy, and support platform-independent message flow applications and integration services. Course Outline Course introduction Using event driven processing nodes Exercise: Implementing message aggregation Transforming data with Microsoft .NET Transforming data with XSL stylesheets Analyzing XML documents Modeling complex data with DFDL Exercise: Extending a DFDL model Working with message sets and the MRM domain Supporting web services Exercise: Implementing web services Developing integration solutions by using integration services Exercise: Creating an integration service Connecting a database by using a discovered service Connecting IBM MQ by using a discovered service Exercise: Creating IBM MQ and database services Creating a decision service Exercise: Creating a decision service Developing integration solutions by using a REST API Using the global cache Implementing message flow security Exercise: Implementing IBM Integration Bus runtime security Implementing publish/subscribe Monitoring message flow events Exercise: Recording and replaying message flow data Managing the workload Creating patterns for reusability Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM676 IBM Integration Bus V10 Application Development II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM676 IBM Integration Bus V10 Application Development II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM676 IBM Integration Bus V10 Application Development II
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry