• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

34160 Courses

ICCC-CT-Installing and Configuring Cisco Cube/Gateways

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer In this 3 Day Cisco Course, students will learn how to deploy Voice Gateways/CUBE and setup Cisco Unified Communication Manager (CUCM) to deploy SIP Trunking. The course starts out with an overview of Cisco gateways and their uses. Next, students learn about MGCP and SIP and how to implement each protocol. Students will then learn how to use Cisco CUBE to connect CUCM, Gateways and Service Providers together. This course details how to connect a Cisco environment to a Service Provider using a Cisco CUBE. Introduction to Voice Gateways Cisco UC Networks and the Role of Gateways Gateway Call Routing and Call Legs Configuring Gateway Voice Ports DSP Functionality, Codecs, and Codec Complexity Router Requirements for CUBE SIP Protocol Overview Gateway Dial Plans VoIP Call Legs Dial Plan Implementation Configuring (CUCM) Cisco Unified Communication Manager 12.5 Cisco UCM Audio Codec Preference List Cisco UCM Region Configuration Device Pool Configuration Annunciator Configuration Conference Bridge Configuration Media Termination Point Configuration Music on Hold Server Configuration Music on Hold Service (IP Voice Media Streaming App) Parameter Settings Music on Hold Service (Duplex Streaming) Parameter Settings Media Resource Group Configuration Media Resource Group List Configuration UC Service Configuration Service Profile Configuration End User Configuration SIP Trunk Security Profile Configuration used by SIP trunk to Cisco UBE SIP Profile Configuration used by SIP trunk to Cisco UBE SIP Trunk to Cisco UBE Configuration Route Pattern Configuration Configuring Cisco Unified Border Element (CUBE) Deploying Cisco VCUBE CUCM to CUBE Integration Configuration Steps to connecting to a SIP Trunk Provider Interworking Security and Call Admission Control Media Manipulation, Enhancement & Optimization SIP UA Translation Rules VoIP Dial Peer SIP Registration SIP attributes of CUBE Transcoding services Creating and configuring Sip Trunks CUBE Configuration CUBE Call Flow CUBE Dial-Peers Call Routing CUBE Advanced Call Routing Media Manipulation External/PSTN Call Recording Call Admission Control Multiple Non-Authenticated SIP Trunks on a CUBE Multiple Authenticated/Registered SIP Trunks on a CUBE Configuring High Availability High availability on ISR G2 High availability on ISR 4k High availability on ASR Cisco Unified Border Element (CUBE) Security Five Layers of Security in CUBE SIP TLS Support with SRTP Monitoring and Troubleshooting Cisco CUBE Dialed Number Analyzer (DNA) for CUBE SIP Profile Test Tool Troubleshooting Serviceability

ICCC-CT-Installing and Configuring Cisco Cube/Gateways
Delivered OnlineFlexible Dates
Price on Enquiry

ICM-WA-CT-Installing and Configuring Meraki MR Wireless Aps

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting

ICM-WA-CT-Installing and Configuring Meraki MR Wireless Aps
Delivered OnlineFlexible Dates
Price on Enquiry

The Confident Birth Workshop - CubCare

5.0(24)

By Cubcare

The key to a confident birth experience is knowledge and education. This workshop will guide you through the process.

The Confident Birth Workshop - CubCare
Delivered OnlineFlexible Dates
FREE

Microsoft Intune Overview

By Nexus Human

Duration 3.25 Days 19.5 CPD hours This course is intended for This course is intended for IT administrators with a minimum 2-5 years of experiencing working with Microsoft Windows Server, Windows 10, and Office 365 licensing. The course will utilize a pre-provisioned lab environment which includes Microsoft 365 E5 licenses and Enterprise Mobility and Security E5 licenses for each student. Powershell management topics will be discussed where applicable in the respective topics. This course will address Windows devices only enrolled in Intune. Configuring and Licensing Intune Endpoint Manager - quick discussion, portal access Discuss which licenses include Intune Discuss Microsoft Intune device-only subscription Discuss Azure Active Directory basic, P1, P2 licensing Intune setup and overview of capabilities Supported configurations Logging in and using Intune Admin portal via Azure Portal and via Endpoint manager site Configure a domain name (needed to support labs though may be done already for E1B/district) Add users and groups in Azure Portal Configure Azure AD connect and discuss AAD Connect Health Assigning licenses manually, via Powershell, and via AAD groups Set the MDM authority and enable device enrollment Add Apps to Intune - covered in detail in a later topic Configuring device profiles - covered in detail in a later topic Company Portal discussion - covered in detail in a later topic Configure app policies - covered in detail in a later topic Windows device management What is co-management - brief discussion on Endpoint Manager with Configuration Manager Registering, joining, hybrid join to Azure AD Enrollment method capabilities Azure AD joined Azure AD joined with Autopilot (User driven mode) Azure AD joined with Autopilot (Self deploying mode) Autopilot pre-provisioned deployment (formally known as white-glove) Device group tags for profile deployment Troubleshooting Autopilot Policy conflicts Known issues Using Powershell to connect to and manage Intune Software deployment Add apps to Intune Windows Store apps Microsoft Store for Business apps LOB apps - Sideloading Adding Win32 apps Running Powershell Scripts on devices Assigning Apps Monitor Apps Discovered Apps Configure Apps App Configuration Policies Office app policys Custom OMA-URI Policies Troubleshooting Managing devices Windows 10 Feature Updates Update rings to manage updates Mapping drives to SMB shares Discuss OneDrive for Business Manage Enterprise Wireless - Windows Configuration Designer, provisioning packages Implementing Conditional Access - device based, app based Printer management Universal Print Deploying printer settings Remote administration Intune Device Management Inventory Fresh Start Full Scan Remote Lock Restart Sync devices Bulk device actions Teamviewer integration requirements Intune Reporting Accessing Reports Exporting Reports using Graph

Microsoft Intune Overview
Delivered OnlineFlexible Dates
Price on Enquiry

Learning Disability Nursing Level 1

5.0(1)

By Empower UK Employment Training

Embark on a journey to become a proficient Learning Disability Nurse. This course offers a deep dive into autism, therapeutic approaches, child development, and effective communication. Learn to create impactful care plans and support the well-being of individuals with learning disabilities.

Learning Disability Nursing Level 1
Delivered Online On Demand24 minutes
£5

Keto Lifestyle Guide

5.0(1)

By Course Gate

Transform your health with our Keto Lifestyle Guide. Explore the science, meal planning, and practical strategies to master and sustain a ketogenic diet for lasting results.

Keto Lifestyle Guide
Delivered Online On Demand2 hours 23 minutes
£11.99

Working with Elected Members (In-House)

By The In House Training Company

It is important for Officers to understand the roles and responsibilities, processes and procedures involved when working with Elected Members. They also need to appreciate the significance of Elected Members as the decision-makers in local government. Officers have a responsibility to work and communicate with Elected Members effectively. This very successful course is designed to help Officers with this. Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. To provide managers with the knowledge and understanding they need to have productive working relationships with Elected Members and provide appropriate support. By the end of the course participants will: Understand the roles, responsibilities, processes and procedures in place for working with Elected Members Be able to identify the best way to approach potentially sensitive issues Understand the skills and behaviours required for working effectively with Members Be able to deploy their influencing skills more successfully Review their learning and have an action plan to take back and implement at work Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. 1 Introduction Welcome and introductions Objectives and programme overview 2 Working in a political environment What is political awareness? Contact and experience with Members Importance of the role of Members 3 Why be an Elected Member? Perceptions of what Elected Members are and do Values of Members and their motivations for doing what they do 4 Political decision-making in local government Current challenges and drivers affecting the organisation / the council Roles and responsibilities of Officers and Members Centrality of Members' strategic role 5 (Option) A day in the life of an Elected Member An Elected Member gives a talk about what they do 6 Having a beneficial relationship between Officers and Members 7 Member / Officer communication Discussion of the formal processes, service procedures, etc (whether enshrined in a protocol, Memorandum of Understanding, etc) Response times and requirements Procedures required by Heads of Service [if appropriate] 8 Influencing styles and strategies Different forms of power and how they impact Developing an appropriate 'influencing style' Exploring strategies for improving communication and influencing at work 9 Review and evaluation Review and evaluation of learning Personal action plans

Working with Elected Members (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Supported loving Network

By Supported Loving

This time for our network meeting we are taking it back old school style! Back to our roots in Choice Support's meeting room where it all began back in 2017. The programme is still in production but I wanted to make sure we all got the date saved in the diary - you can expect interesting and inspiring work going across all 2000 (!!) of you. A fun and engaging mixture of presentations, practical stuff and discussion.  Also we thought lets go truly original and go back to a shared lunch- please do bring something to share (homemade cakes are always welcome). 

Supported loving Network
Delivered In-PersonFlexible Dates
FREE

S4220 SAP Production Planning in SAP S/4HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Data Consultant / Manager Help Desk / COE Support Program / Project Manager Solution Architect System Architect Technology Consultant Trainer Overview Please refer to overview This course will provide you with a deep understanding of the production planning process, how to configure it, and how to apply the concepts of demand management and material requirements planning in SAP S4/HANA. SAP S/4HANA Production Planning Overview Outlining Production Planning in SAP S/4HANA Considering Prerequisites for Production Planning in SAP S/4HANA Master Data for SAP S/4HANA Production Planning Outlining Master Data for SAP S/4HANA Production Planning Prerequisites and Tools for Advanced Planning in SAP S/4HANA Outlining Advanced Planning: PP/DS in SAP S/4HANA Reviewing Master Data for Advanced Planning Activating Advanced Planning Evaluating Alerts with the Alert Monitor Planning Production with the Product View Demand Management in SAP S/4HANA with Planning Strategies Applying Planning Strategies for Make-to-Order Production Applying Planning Strategies for Make-to-Stock Production Advanced Production Planning in SAP S/4HANA Exploring Steps in PP/DS Material Requirements Planning Exploring Heuristics and Functions in PP/DS Applying the PP/DS Planning Run Detailed Scheduling in SAP S/4HANA Exploring Concepts and Principles for Detailed Scheduling Applying transactional Tools for Detailed Scheduling Applying Apps for Detailed Scheduling Using Detailed Scheduling in the Planning Run Using the PP/DS Optimizer Additional course details: Nexus Humans S4220 SAP Production Planning in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4220 SAP Production Planning in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4220 SAP Production Planning in SAP S/4HANA
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry