• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3193 Courses

Diploma in Office Admin and Customer Service

By iStudy UK

Learn the ways of an Office Admin and Customer Service provider Customers are always important for any business which is why Customer Service is essential. Not only the customers, but the Administrative side of a company is also essential for a company to run smoothly. If you are interested in Office Administration and Customer Service then this course will be beneficial to you. Office administration involves a set of day to day activities related to financial planning, maintaining personnel records, processing of payroll, record keeping, maintaining files, billing, distribution of data, logistics are part of office administration. It involves the main task of ensuring that resources are available for smooth functioning like coordinating repairs of office equipment required for work. While customer service will make sure all the Customers are taken care of with all their queries. During this course you will about both on how to be a capable and efficient Office Admin and an engaging Customer Service provider. This course gives you the benefit of both profession and you be able learn and kickstart your career in Office Administration or Customer Service. Course Highlights Diploma in Office Admin and Customer Service is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Diploma in Office Admin and Customer Service into 97 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 3 days, 18 hours hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Diploma in Office Admin and Customer Service Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Diploma in Office Admin and Customer Service is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Diploma in Office Admin and Customer Service is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Admin Support Module One - Getting Started FREE 00:30:00 Module Two - Getting Organized (I) FREE 01:00:00 Module Three - Getting Organized (II) 01:00:00 Module Four - Managing Time 01:00:00 Module Five - Getting It All Done On Time 01:00:00 Module Six - Special Tasks 01:00:00 Module Seven - Verbal Communication Skills 01:00:00 Module Eight - Non-Verbal Communication Skills 01:00:00 Module Nine - Empowering Yourself 01:00:00 Module Ten - The Team of Two 01:00:00 Module Eleven - Taking Care of Yourself 01:00:00 Module Twelve - Wrapping Up 00:30:00 Administrative Management Module One - Getting Started FREE 01:00:00 Module Two - Why Your Office Needs Administrative Procedures FREE 01:00:00 Module Three - Gathering the Right Tools 01:00:00 Module Four - Identifying Procedures to Include 01:00:00 Module Five - Top Five Procedures to Record 01:00:00 Module Six - What to Include in Your Binder (I) 01:00:00 Module Seven - What to Include in Your Binder (II) 01:00:00 Module Eight - Organizing Your Binder 01:00:00 Module Nine - What Not to Include in the Procedure Guide 01:00:00 Module Ten - Share Office Procedure Guide 01:00:00 Module Eleven - Successfully Executing the Guide 01:00:00 Module Twelve - Wrapping Up 01:00:00 Organisational Skills Module One - Getting Started FREE 00:30:00 Module Two - Remove the Clutter FREE 01:00:00 Module Three - Prioritize 01:00:00 Module Four - Scheduling Your Time 01:00:00 Module Five - To Do Lists 01:00:00 Module Six - Paper and Paperless Storage 01:00:00 Module Seven - Organization in Your Work Area 01:00:00 Module Eight - Tools to Fight Procrastination 01:00:00 Module Nine - Organizing Your Inbox 01:00:00 Module Ten - Avoid the Causes of Disorganization 01:00:00 Module Eleven - Discipline is the Key to Stay Organized 01:00:00 Module Twelve - Wrapping Up 00:30:00 Administrative Skills Developing Diploma- Activities 00:00:00 Customer Relations and Dealings Module One - Getting Started 00:30:00 Module Two - The Right Attitude Starts with You 01:00:00 Module Three - Stress Management (Internal Stressors) 01:00:00 Module Four - Stress Management (External Stressors) 00:30:00 Module Five - Transactional Analysis 01:00:00 Module Six - Why are Some Customers Difficult 01:00:00 Module Seven - Dealing with the Customer Over the Phone 01:00:00 Module Eight - Dealing with the Customer In Person 01:00:00 Module Nine - Sensitivity in Dealing with Customers 01:00:00 Module Ten - Scenarios of Dealing with a Difficult Customer 01:00:00 Module Eleven - Following up With a Customer Once You Have Addressed Their Issue 01:00:00 Module Twelve - Wrapping Up 00:30:00 Customer Service: Telephone Etiquette Module One - Getting Started 00:30:00 Module Two - Aspects of Phone Etiquette 01:00:00 Module Three - Using Proper Phone Language 01:00:00 Module Four - Eliminate Phone Distractions 01:00:00 Module Five - Inbound Calls 01:00:00 Module Six - Outbound Calls 01:00:00 Module Seven - Handling Rude or Angry Callers 01:00:00 Module Eight - Handling Interoffice Calls 01:00:00 Module Nine - Handling Voicemail Messages 01:00:00 Module Ten - Methods of Training Employees 01:00:00 Module Eleven - Correcting Poor Telephone Etiquette 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Word Module One - Getting Started FREE 00:30:00 Module Two - Opening Word FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Document 01:00:00 Module Five - Basic Editing Tasks 01:00:00 Module Six - Basic Formatting Tasks 01:00:00 Module Seven - Formatting Paragraphs 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Styles 01:00:00 Module Ten - Formatting the Page 01:00:00 Module Eleven - Sharing Your Document 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Powerpoint Module One - Getting Started FREE 00:30:00 Module Two - Opening PowerPoint FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Presentation 01:00:00 Module Five - Working with Text 01:00:00 Module Six - Formatting Text and Paragraphs 01:00:00 Module Seven - Adding Pictures 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Transitions and Animations 01:00:00 Module Ten - Setting Up Your Slide Show 01:00:00 Module Eleven - Showtime! 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Excel Module One - Getting Started FREE 00:30:00 Module Two - Opening Excel FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Worksheet 01:00:00 Module Five - Viewing Excel Data 01:00:00 Module Six - Building Formulas 01:00:00 Module Seven - Using Excel Functions 01:00:00 Module Eight - Using Quick Analysis 01:00:00 Module Nine - Formatting Your Data 01:00:00 Module Ten - Using Styles, Themes, and Effects 01:00:00 Module Eleven - Printing and Sharing Your Workbook 01:00:00 Module Twelve - Wrapping Up 01:00:00 Mock Exam Mock Exam- Diploma in Office Admin and Customer Service 00:30:00 Final Exam Final Exam- Diploma in Office Admin and Customer Service 00:30:00

Diploma in Office Admin and Customer Service
Delivered Online On Demand4 days
£25

Trade Supplier Level 2

By Rachel Hood

Ensuring an efficient flow of goods and services between manufacturers and their skilled trade customer base.

Trade Supplier Level 2
Delivered OnlineFlexible Dates
Price on Enquiry

Python Programming Bible | Networking, GUI, Email, XML, CGI

4.5(3)

By Studyhub UK

Introducing the 'Python Programming Bible | Networking, GUI, Email, XML, CGI' - your comprehensive, all-in-one resource for mastering Python! Are you an aspiring developer looking to dive into the ocean of Python programming or a seasoned coder seeking to level up your Python game? Look no further! Our course is expertly designed to take you from the basics to the complexities of Python, including Networking, GUI, Email, XML, and CGI. If you've ever dreamt of not just learning Python but truly mastering it, this is the course for you. This program is designed to provide a solid foundation and sharpen your skills in one of the most in-demand programming languages, while also introducing you to its many applications. This course starts with the basics of Python, providing a gentle yet thorough introduction and setup that caters to beginners as well as those looking to refresh their Python knowledge. As we study deeper into the heart of Python, we dive into objects, classes, and the power of regular expressions. But it doesn't stop there! You'll also become comfortable with concepts like CGI programming, which is an important building block for creating dynamic web pages. Navigating from core programming, we transition into the intricacies of managing databases and executing multithreading in Python. You'll gain the confidence to handle complex data management tasks, understand how Python interacts with databases, and efficiently manages multiple tasks simultaneously. The XML section allows you to get hands-on with parsing, data extraction, and manipulation, while the GUI section unveils the art of creating beautiful, user-friendly interfaces using Python. The course is enriched with a diverse set of resources, including real-world projects, quizzes, and interactive coding exercises. This is more than just a course, it's your passport to a new realm of opportunities, unlocking a world where Python programming is your strength, not just a skill.  So whether you're a student aiming to get a head start on your peers, a professional looking to diversify your skills, or an enthusiast wanting to dive deeper into the Python universe, the Python Programming Bible is the starting point for your journey to becoming a Python expert. Enrol today and step into a future of endless opportunities with Python! Learning Outcomes: Upon completion of the Python Programming Bible course, you should be able to: Understand and implement Python basics and advanced concepts. Build object-oriented programs with Python. Utilise regular expressions for pattern-matching tasks. Develop dynamic web pages using CGI programming. Interact with databases efficiently using Python. Apply multithreading for better utilisation of resources. Process and manipulate data using XML in Python. Design and create user-friendly GUIs with Python. Who is this course for? This Python Programming Bible course is ideal for the following: Beginners aiming to learn Python from scratch. Professionals looking to broaden their programming skills. Students pursuing a degree in Computer Science. Web developers looking to integrate Python into their toolkit. Data enthusiasts aiming to handle data with Python. Career Path: This Python Programming Bible course will help you to develop your knowledge and skills to pursue different careers, such as: Python Developer: (£35,000 - £70,000). Data Analyst: (£27,000 - £55,000). Web Developer: (£24,000 - £60,000). Data Scientist: (£45,000 - £90,000). Machine Learning Engineer: (£50,000 - £90,000). Software Developer: (£30,000 - £70,000). Certification After studying the course materials of the Python Programming Bible | Networking, GUI, Email, XML, CGI there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Prerequisites This Python Programming Bible | Networking, GUI, Email, XML, CGI does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Python Programming Bible | Networking, GUI, Email, XML, CGI was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Course Curriculum Section 01: Introduction & Setup Introduction 00:02:00 Setup on Mac OS X 00:03:00 Setup On Linux/Ubuntu 00:03:00 Setup On Windows 00:03:00 Run Code Online 00:03:00 Section 02: Basics Comments 00:02:00 Variables & Variable Types 00:05:00 Lists 00:04:00 Tuples 00:03:00 Dictionary 00:06:00 Data Type Conversion 00:02:00 Arithmetic Operators 00:05:00 Comparison Operators 00:03:00 Assignment Operators 00:03:00 Bitwise Operators 00:10:00 Logical Operators 00:07:00 Membership Operators 00:02:00 Identity Operators 00:02:00 Operator Precedence 00:03:00 Decision Making 00:09:00 Loops 00:06:00 Loop Control Statements 00:05:00 Numbers 00:05:00 Strings 00:12:00 Lists In Depth 00:05:00 Tuples In Depth 00:06:00 Dictionary In Depth 00:08:00 Date & Time 00:07:00 Functions 00:11:00 Modules 00:05:00 File Inputs & Outputs 00:13:00 Handling Exceptions 00:07:00 Section 03: Classes/Objects Simple Example 00:04:00 Creating Instance Objects 00:01:00 Accessing Attributes 00:04:00 Constructor New & Init Method 00:06:00 Destroying Objects 00:02:00 Class Inheritance 00:04:00 Overriding Methods 00:03:00 Overloading Methods 00:01:00 Overloading Operators 00:04:00 Data Hiding 00:03:00 Section 04: Regular Expressions Match Function 00:05:00 Search Function 00:02:00 Advanced Expressions 00:05:00 Search & Replace 00:03:00 Section 05: CGI Programming Basic CGI Programming 00:08:00 Get Method 00:06:00 Post Method 00:05:00 Cookies 00:05:00 Section 06: Database Setup Database 00:02:00 Connect To Database 00:05:00 Create Table 00:03:00 INSERT Operation 00:04:00 READ Operation 00:06:00 UPDATE Operation 00:02:00 DELETE Operation 00:02:00 Simple Network Example 00:04:00 Simple Client 00:04:00 Section 07: Multithreading Initiate a New Thread 00:07:00 Create Thread 00:06:00 Synchronise Threads 00:03:00 Multithreaded Priority Queue 00:09:00 Section 08: XML Parse an XML File 00:10:00 Section 09: GUI Introduction 00:02:00 Button Preview 00:03:00 Canvas 00:04:00 Checkbutton 00:02:00 Entry 00:02:00 Frame 00:04:00 Label 00:02:00 List Box 00:02:00 Menu button 00:03:00 Menu 00:08:00 Message 00:02:00 Radio button 00:05:00 Scale 00:03:00 Scrollbar 00:04:00 Text 00:03:00 Top-level 00:02:00 Spinbox 00:02:00 Paned Window 00:03:00 Message Box 00:02:00 Label Frame 00:02:00 Section 10: Resource Resource 00:00:00 Assignment Assignment - Python Programming Bible | Networking, GUI, Email, XML, CGI 00:00:00

Python Programming Bible | Networking, GUI, Email, XML, CGI
Delivered Online On Demand6 hours 8 minutes
£10.99

CompTIA Security+ Certification SY0-601: The Total Course

By Packt

This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.

CompTIA Security+ Certification SY0-601: The Total Course
Delivered Online On Demand19 hours 38 minutes
£59.99

VMware Horizon 8: Troubleshooting Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for New or junior administrators and operators; system managers accountable for staffing and training Horizon operators and administrators. Experienced system operators, administrators, and integrators responsible for managing and maintaining VMware Horizon solutions Overview By the end of the course, you should be able to meet the following objectives: Implement a structured approach to troubleshooting Resolve common issues that occur in a VMware Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for best end-user experience Discuss Horizon Connection Server advanced configurations List troubleshooting techniques for Horizon Connection Server common issues Interpret Horizon 8 Connection Server logs Identify Unified Access Gateway configuration and certificate issues List troubleshooting steps for Unified Access Gateway common issues Describe BLAST configuration verification using logs and settings Describe BLAST optimization recommendations for different use cases Describe Horizon 8 Connections and how to troubleshoot related issues Describe Horizon 8 certificates List troubleshooting steps for common issues with Horizon 8 certificates Leverage Horizon infrastructure troubleshooting steps to resolve issues  This five-day course builds your skills in resolving common issues that occur in a VMware Horizon© environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators and provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon© 8 infrastructure related issues. This workshop teaches the required skill and competence for troubleshooting VMware Horizon© Connection Server?, VMware Unified Access Gateway?, protocols, connections, and certificates Course Introduction Introductions and course logistics Course objectives Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods Documenting the steps to resolving the problem Command-Line Tools and Backup Options Using command-line tools Backing-up and restoring VMware Horizon databases Troubleshooting Horizon Linked Clone Desktops Only applicable for Horizon 7.x environments Describe the components that make up a VMware Horizon desktop Explain how the View Agent Direct-Connection plug-In is useful for diagnosing problems Highlight the best practice for optimizing a VMware Horizon desktop Troubleshoot common problems with VMware Horizon desktops Troubleshooting Instant Clones Discuss how instant clones are created Discuss what gets logged when an instant clone is created Discuss the keywords to look for in the logs when troubleshooting instant clones Discuss how to troubleshoot problems with instant clones Windows Client Correctly configure the Windows Client Identify the correct log level for gathering logs Enable the required SSL configuration level for the environment Ports and Protocols Discuss the key ports on a Horizon Environment Discuss protocols used in the Horizon Environment Understand the benefit of optimizing Blast Become familiar with the optimization features for Blast Implement GPO changes for Blast Become familiar with the causes for Black Screens Discuss how to troubleshoot Black Screen problems Identify problems encountered when applying GPOs Discuss how to troubleshoot GPO-related problems Horizon Connection Server Troubleshooting Discuss Horizon Connection Server general troubleshooting techniques Identity Horizon Connection Server common issues through logs Describe AD LDS replication Discuss Horizon Connection Server replication common issues Review and Interpret Horizon Connection Server logs Compare successful and unsuccessful logs from everyday infrastructure administration tasks Unified Access Gateway Troubleshooting List and identify common Unified Access Gateway deployment issues Monitor the Unified Access Gateway deployment to identify health and issues Identify and troubleshoot Unified Access Gateway certificate issues Monitor, test, and troubleshoot network problems Discuss general Unified Access Gateway troubleshooting processes BLAST Configuration Verification Discuss BLAST Codecs and Encoder Switch settings. Describe how to verify BLAST configuration using logs and settings BLAST Optimization List general BLAST optimization recommendations Summarize BLAST tuning recommendations that apply to WAN connections Summarize BLAST tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe recommended tuning options to increase display protocol quality for all use cases and applications. VMware Horizon Connections Troubleshooting Explain Horizon connections Describe the role of Primary and Secondary protocols in Horizon connections Describe HTML client access connections Describe Horizon connections load balancing Describe timeout settings, supported health monitoring string, and suitable load balancer persistence values Identify troubleshooting steps for failing Horizon load balancer connections List troubleshooting steps for Horizon connections VMware Horizon Certificates Troubleshooting List Horizon certificate functions Describe Horizon certificates scenarios. Discuss potential challenges related to certificates in Horizon Describe the troubleshooting approach to Horizon certificate issues VMware Horizon Challenge Lab Leverage Horizon infrastructure troubleshooting steps to resolve issues

VMware Horizon 8: Troubleshooting Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Aria Automation: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Aria Automation architecture and use cases in cloud environments Describe the key services of VMware Cloud Automation Services™ Manage VMware Aria Automation entities on VMware and third-party virtual and cloud infrastructures Install VMware Aria Automation with VMware Aria Suite Lifecycle Configure and manage cloud accounts, projects, flavor mappings, image mappings, network profiles, storage profiles, volumes, tags, and services Create, modify, manage, and deploy VMware Aria Automation Templates Customize services and virtual machines with cloudConfig and cloudbase-init Configure and manage VMware Aria Automation Consumption Configure and manage ABX actions, custom properties, event broker subscriptions, and VMware Aria Automation Orchestrator workflows Connect to a Kubernetes cluster and manage namespaces Use VMware Aria Automation Config to configure and deploy systems Use logs and CLI commands to monitor and troubleshoot VMware Aria Automation During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10? on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware Aria Automation Consumption? can aggregate content in native formats from multiple clouds and platforms into a common catalog.This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config? as a configuration management tool. Course Introduction Introductions and course logistics Course objectives VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Workspace ONE Access? Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process Authentication and Authorization Identify the steps to integrating Workspace ONE© Access with Active Directory Describe the features of Workspace ONE Access Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments Tags Configure tags Describe functions of tags Manage tags Storage Configuration Configure storage profiles Use tags and storage profiles Integrating NSX With VMware Aria Automation List the capabilities and use cases of VMware NSX© Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation? accounts Integrate VMware Cloud Director? account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Integrate VMware Cloud on AWS cloud account Using VMware Aria Automation Consumption Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Create a VMware Aria Automation template with Kubernetes components Using VMware Aria Automation Config for Configuration Management Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration VMware Aria Automation Troubleshooting and Integration Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware Aria Operations for Logs Describe integration with VMware Aria Operations

VMware Aria Automation: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and implement Fibre Channel, zoning, and N-Port Virtualization (NPV) features on Cisco UCS Describe and implement Fibre Channel over Ethernet (FCoE) on Cisco UCS Describe Cisco UCS policies for service profiles Describe Cisco Adapter Fabric Extender (FEX) and Single Root I/O Virtualization Describe and implement Role-Based Access Control (RBAC) on Cisco UCS Describe and implement external authentication providers on Cisco UCS Manager Describe and implement key management on Cisco UCS Manager Describe Cisco UCS Director Describe and implement Cisco Intersight Describe the scripting options for Cisco UCS Manager Describe and implement monitoring on Cisco UCS Manager The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System? (Cisco UCS©) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight?; and more. Implementing Cisco UCS Storage Area Network (SAN) SAN Introduction Cisco UCS Fabric Interconnect Fibre Channels modes Named VSANs Cisco UCS Fibre Channel and FCoE Storage Connectivity Describing Cisco UCS Policies for Service Profiles Storage Policies and Profiles Basic Input Output System (BIOS) Policies Boot Policy Intelligent Platform Management Interface (IPMI) Policies Scrub Policies Maintenance Policies Describing Cisco Adapter FEX and Single Root I/O Virtualization Cisco FEX Overview Cisco Adapter FEX Single Root I/O Virtualization Implementing RBAC on Cisco UCS RBAC in Cisco UCS Users, Roles, and Privileges Functions of Organizations and Locales Effective Rights of a User Implementing External Authentication Providers Options for External Authentication Providers Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco UCS Director Cisco UCS Director Overview Policies, Virtual Data Centers, and Catalogs Cisco UCS Director Virtualization Support Managing Compute with Cisco UCS Director Cisco UCS Manager Orchestration Self-Service Portal Reporting and Monitoring in Cisco UCS Director Implementing Cisco Intersight Cisco UCS Director Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS PowerTool Cisco UCS Python Software Development Kit (SDK) Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco Intersight Cisco Intersight Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS Manager PowerTool Cisco UCS Python SDK Implementing Monitoring on Cisco UCS Manager Logging Sources in Cisco UCS Manager Port Monitoring Capabilities of Cisco UCS Manager Simple Network Management Protocol (SNMP) Security Ramifications Cisco UCS Manager Call Home Feature Lab outline Configure Pod-Specific Device Aliases Configure Zoning Configure VSANs in Cisco UCS Manager Configure Unified Ports on Cisco UCS Fabric Interconnects Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE Configure RBAC Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP) Configure a Trusted Point and Key Ring in Cisco UCS Manager Configure Cisco UCS with Cisco Intersight Configure Cisco UCS Manager Using Scripting Implement Syslog and Call Home Additional course details: Nexus Humans Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)
Delivered OnlineFlexible Dates
Price on Enquiry