• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

34166 Courses

Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Audience for this course This course is designed for system administrators responsible for creating OpenShift Enterprise instances, deploying applications, creating process customizations, managing instances and projects. Prerequisites for this course Have taken Red Hat Enterprise Linux Administration I and II (RH124 and RH134), or equivalent Red Hat Enterprise Linux© system administration experience Be certified as a Red Hat Certified System Administrator (RHCSA), or equivalent Red Hat Enterprise Linux system administration experience Be certified as a Red Hat Certified Engineer (RHCE©) Overview Learn to install, configure, and manage OpenShift Enterprise by Red Hat instances - OpenShift Enterprise Administration (DO280) prepares the system administrator to install, configure, and manage OpenShift Enterprise by Red Hat© instances. OpenShift Enterprise, Red Hat's platform-as-a-service (PaaS) offering, provides pre-defined deployment environments for applications of all types through its use of container technology. This creates an environment that supports DevOps principles such as reduced time to market and continuous delivery. - In this course, students will learn how to install and configure an instance of OpenShift Enterprise, test the instance by deploying a real world application, and manage projects/applications through hands-on labs. - Course content summary - Container concepts - Configuring resources with the command line interface - Building a pod - Enabling services for a pod - Creating routes - Downloading and configuring images - Rolling back and activating deployments - Creating custom S2I images This course will empower you to install and administer the Red Hat© OpenShift© Container Platform, with hands-on, lab-based materials that show you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. This course is based on Red Hat© Enterprise Linux© 7.5 and Openshift Container Platform 3.9. OpenShift is a containerized application platform that allows your enterprise to manage container deployments and scale your applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). 1 - INTRODUCTION TO RED HAT OPENSHIFT ENTERPRISE Review features and architecture of OpenShift Enterprise. 2 - INSTALL OPENSHIFT ENTERPRISE Install OpenShift Enterprise and configure a master and node. 3 - EXECUTE COMMANDS Execute commands using the command line interface. 4 - BUILD APPLICATIONS Create, build, and deploy applications to an OpenShift Enterprise instance. 5 - PERSISTENT STORAGE Provision persistent storage and use it for the internal registry. 6 - BUILD APPLICATIONS WITH SOURCE-TO-IMAGE (S2I) Create and build applications with S2I and templates. 7 - MANAGE THE SYSTEM Use OpenShift Enterprise components to manage deployed applications. 8 - CUSTOMIZE OPENSHIFT ENTERPRISE Customize resources and processes used by OpenShift Enterprise. 9 - COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in the course. 10 - NOTE: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us. Additional course details: Nexus Humans Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280)
Delivered OnlineFlexible Dates
Price on Enquiry

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere 6.5 Optimize and Upgrade

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere 6.5 Optimize and Upgrade
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Partners and customers interested in the Catalyst 9800 wireless controller Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe Cisco Catalyst 9800 Understand the Benefits for Catalyst 9800 Configure Catalyst 9800 Migrate to the Catalyst 9800 Troubleshoot the Catalyst 9800 Understand and Discuss WIFI6 Configuring Cisco Catalyst 9800 and Intro to WIFI6 v1.0 is a three-day course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course. Introduction Cisco Catalyst 9800 Overview Intent Based Networking (IBN) Cisco Catalyst Next Gen Wireless Architecture Cisco Catalyst 9800 Wireless ? Platform Support Cisco Catalyst 9800 Wireless Controller Appliances Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9 Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9 Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9 Cisco Catalyst 9800 use in Private and Public Cloud Environments Private Public Hybrid What is WiFi 6 and Why do we need it? Use Cases ? how WiFi 6 will change Buisness and Industry WIFI6 technical ? a leap from previous WiFi technologies Design Considerations Cisco WiFi6 Portfolio and Interoperability Configure WiFi6 on Cat 9800 Cisco Catalyst 9800 Series Embedded Controller for SDA SD-Access Everywhere Wireless Assurance with DNA Center Catalyst 9800 SD-Access Wireless Catalyst 9800 SD-Access Embedded Wireless Controllers High Availability Reducing downtime for Upgrades and Unplanned Events High Availability (Client SSO) High Availability (AP & Client SSO) Software Updates Software Updates SSO Patching Rolling Upgrades Wireless Controller SMU Rolling AP Update Image Upgrade Programmability and Telemetry Flexible management options with Cisco Catalyst 9800 Wireless Controllers Wireless Programmability ?Stack? Config vs Operational YANG data models Model Driven Telemetry Security and Threat Detection Intent-based wireless networks Security Security and Threat Mitigation Catalyst 9800 Wireless Controller Configuration Model New Configuration Model AireOS vs. Catalyst 9800 Config Model Catalyst 9800 Config Model Wireless Basic Setup Wireless Basic Configuration Model Adding Local Site Adding Remote Site Provisioning APs to Site Day 0 AP PnP Wireless Advanced Guided UI Configuration Workflow WLAN Profile Policy Profile AP Join profile RF Profile Static and Rule-Based AP Tagging Migration AireOS Config Translator Using the Tool Migration using Prime AireOS Config Translator on PI 3.5 Troubleshooting IOS-XE logging architecture Packet tracing and packet captures Embedded Packet Capture web interface Useful commands and tools Additional course details: Nexus Humans Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6)
Delivered OnlineFlexible Dates
Price on Enquiry

MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is either: a Dynamics 365 consultant who wants to learn Commerce, or a retail analyst with core Dynamics 365 experience who wants to apply their skills to the Dynamics product family. Overview After completing this course, students will be able to: Configure Dynamics 365 Commerce Headquarters Configure products, prices, discounts, loyalty, and affiliations Manage Point of Sale (POS) in Dynamics 365 Commerce Configure and Manage Dynamics 365 Commerce call centers Manage e-commerce Dynamics 365 Commerce functional consultants set up and use the application functionality in Dynamics 365 Commerce, and provide support for the application. The functional consultant typically has a strong understanding of unified commerce business operations, and experience configuring, deploying, maintaining, and using Microsoft Dynamics 365 Commerce. This four-day course covers the essentials for the role Module 1: Get started with Dynamics 365 Commerce Introduction to Unified Commerce platform Dynamics 365 Commerce architecture Deployment of Dynamics 365 Commerce Hardware and peripherals Module 2: Configure Commerce Headquarters Configure prerequisites and Commerce parameters Configure and maintain payment processing Configure Commerce Data Exchange (CDX) Configure delivery modes and charges Configure and work with statements Module 3: Products and Merchandising Product information management Merchandising in Dynamics 365 Commerce Product recommendations and product discovery Module 4: Retail Pricing Manage Pricing Manage discounts and promotions Module 5: Loyalty and customer experience Customer Management Loyalty and affiliations Module 6: Point of sale Introduction to POS Channel Setup Configure Cash and Shift management Worker Setup Point of Sale Setup Customer management at POS Transaction processing Inventory processing End of day processing Reporting Configure and work with Task management Test POS Maintain registers and devices Localization Module 7: Configure and work with call centers in Dynamics 365 Commerce Configure channel Configure Product Catalogs Configure Order Holds Create call center orders Configure call center directed selling Configure Returns and Refunds Configure continuity orders and installment billing Module 8: Work with E-Commerce in Dynamics 365 Commerce Describe e-commerce core capabilities Configure an E-Commerce Channel in Dynamics 365 HQ Configure an E-Commerce site Configure and manage E-Commerce site content Describe & Demonstrate digital asset management Configure business-to-business (B2B) site Configure Ratings and reviews functionality Demonstrate E-Commerce Order Processing Module 9: Manage order fulfillment and inventory in Dynamics 365 Commerce Configure and work with Stock replenishment Configure and work with Order fulfillment Module 10: Work with Dynamics 365 Fraud Protection Overview of Dynamics Fraud Protection Describe Dynamics Fraud Protection Services Configure and work with Dynamics Fraud Protection with Dynamics 365 Commerce Additional course details: Nexus Humans MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant
Delivered OnlineFlexible Dates
Price on Enquiry

AAT Bookkeeping Course | Online

By Osborne Training

AAT Bookkeeping Course Overview Are you looking to develop a career in Bookkeeping? As a successful Bookkeeper, you could earn on average more than £25,000 per year. (Source: National Career Service). And if you want to become a certified bookkeeper with AATQB (AAT Qualified Bookkeeper) status, then it is mandatory that you complete the AAT bookkeeping course to build a successful career in bookkeeping.  Bookkeeping Course Duration You can expect the AAT bookkeeping distance learning courses to take up to 6 months to complete for most students given that you attend classes and assessments regularly. Bookkeeping Courses Tutors Osborne Training tutors are highly qualified with extensive knowledge of bookkeeping. They helped thousands of students to achieve over 96% pass rate and to reach their career goal. They are industry recognised for bookkeeping courses in UK. Bookkeeping Courses from London Campus  Evening, Weekend and Daytime sessions for AAT Bookkeeping courses are offered from London campus. Why Osborne Training? Osborne Training tutors are expert and with many years of industry experience You get 24/7 Access to the State of the Art Virtual Learning Campus Free High quality study material Free exam preparation kit Flexible payment option available Expert Tutorial support from the tutor Student Discount Card from NUS* Exam Booking Service at our campus Various Campus around UK Free Tablet PC ( For Limited Period) Osborne Books are provided for AAT Bookkeeping Courses. Once you successfully complete the bookkeeping course, you will get a certificate from AAT to confirm your professional bookkeeping qualification achievement. Jobs available for Bookkeeper Senior Credit Controller Sales/Purchase Ledger Clerk Accounts senior Senior Bookkeeper In these roles, you could earn on average more than £25,000 annually. (Source: National Career Service) This AAT bookkeeping course is awarded by AAT and broken down into two levels, AAT Foundation Certificate in Bookkeeping  (also known as AAT Level 2 Bookkeeping) Bookkeeping Transactions Bookkeeping Controls Advanced Certificate in Bookkeeping Advanced Bookkeeping Final Accounts Preparation Indirect Tax Once you pass all 5 assessments successfully, you can gain AATQB status giving you competitive edge to build a successful career as a bookkeeper.

AAT Bookkeeping Course | Online
Delivered in Birmingham + 1 more or OnlineFlexible Dates
Price on Enquiry

Effective project leadership (In-House)

By The In House Training Company

The leadership role of the project manager is increasingly recognised as a key determinant in delivering success. These skills can often be critical in project situations, where tight budgets and deadlines demand the highest levels of team performance and where the working environment presents fresh challenges on a daily basis. This programme focuses on the leadership skills required of project managers and will benefit anyone involved in managing projects large or small wishing to extend or enhance those skills. The objectives of this programme are to help the participants: Understand the significance of leadership skills to the project manager and the impact of these skills on project performance Review the key skills needed to be an effective 'multi-dimensional' project leader and learn how to develop, adapt and apply them in practice Learn how to identify the preferred leadership style for the context and organisational culture of a project and how to develop personal style versatility Understand the role of the project leader in building an effective team and the skills required to promote and sustain team performance Gain a better understanding of the interpersonal skills needed to motivate individual team members and harness the full potential of the team DAY ONE 1 Introduction Aims and objectives Personal objectives 2 Project management and leadership What is a leader? How much can leadership be learned? The project environment and the impact of leadership skills The characteristics of high performance project teams and their leaders 3 Principles of effective leadership Some useful models and theories of leadership explored Types of leadership; choosing how to use leadership power Evaluating personal leadership style; how to develop style flexibility 4 Syndicate case study: Leadership in action Review of the role of leadership in a contemporary project Feedback and plenary discussion: effective project leadership 5 Team exercise: Leadership skills of the project manager Teams compete in performing a project simulation Project review and feedback Discussion of the outcome: role and skills of the project leader 6 Leadership skills for project managers The 3 dimensions of project leadership: inwards, outwards, and upwards The vital role of communication skills and how to develop them Developing a 'project vision': strategic thinking skills Understanding others; emotional intelligence skills Being a visible leader; behavioural and influencing skills Building effective relationships; the importance of trust and respect DAY TWO 7 Leading the project team The role of leadership in developing team performance Understanding individual strengths; recognising team role preferences Managing conflict and promoting positive team dynamics Setting standards, maintaining discipline and rewarding performance Harnessing team potential: building motivation within the team Promoting team learning; the team leader as coach / mentor 8 Leading through the organisation Gaining the support others; developing effective influencing skills Getting empowerment from key stakeholders Knowing when and how to take the initiative and lead Building and maintaining rapport with key partners Becoming an effective team player in leadership teams Becoming a business leader; leading colleagues and co-workers 9 Team exercise: Leadership and negotiation Teams engage in a negotiation exercise Exercise review and feedback Discussion of the outcome: negotiation skills of the project leader 10 Negotiation skills for project leaders Characteristics of effective negotiators Classic problem behaviours and mind-sets to avoid Getting to win-win; building partnership and trust 11 Leading more senior stakeholders The challenges and skills of leading and managing upwards Communicating with more senior stakeholders; building credibility Negotiating upwards: knowing when and how The role of networking skills; building and maintaining rapport Handling disagreements; the art of diplomacy Handling personality and style conflicts with more senior people

Effective project leadership (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Project planning and risk management (In-House)

By The In House Training Company

Many organisations find that project teams struggle to create and maintain effective plans. Estimates are often overly optimistic and risks go unmanaged until the inevitable happens. Resource managers also find it hard to forecast the likely loading on their departments and requests for support are not provided in a consistent format. This programme has been developed to address these needs in a very practical, hands-on format. Case study work can be based on simulations or on the organisation's current projects for maximum benefit to participants. The aim of this training is to develop and enhance participants' planning and risk management skills in order to maximise the success of project work undertaken by the organisation. The principal training objectives for this programme are to: Provide a structured, integrated approach to planning and risk management Demonstrate practical tools and techniques for each stage of planning Show how to organise and involve relevant people in the planning process Explain how to use the plan for forecasting and pro-active project control Identify ways to improve planning, both individually and corporately The course will emphasise the importance of participative planning techniques that improve the quality of plans whilst reducing overall time and cost of planning. The course will encourage discussion of internal procedures and practices and may be customised to include them if required. DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Projects and planning Why plan? The benefits of good planning / penalties of poor planning Planning in the project lifecycle; the need for a 'living' plan The interaction between target setting and the planning process Team exercise: planning the project 3 Planning the plan Defining the application and structure of the plan Impact of planning decisions during the project lifecycle Using available time to create an effective plan 4 Defining deliverables Assessing the context; reviewing the goals and stakeholders Developing the scope and defining deliverables; scope mapping Understanding customer priorities; delivering value for money Case study: defining the project deliverables 5 Creating the work breakdown Building the work breakdown structure Detailing the tasks and sub-tasks; structured brainstorming Defining task ownership; the task responsibility matrix 6 Creating and using a logical network Developing the logical network; task boarding Determining the critical path and calculating float Accelerating the plan; concurrent programming and risk Individual and group exercises DAY TWO 7 Developing resource schedules Deriving the Gantt chart from the network Developing the detailed resource schedules Calculating the expenditure profile ('S' curve) 8 Estimating task durations and costs Understanding estimates: effort, availability and duration Estimating tools and techniques Application of estimating techniques during the project lifecycle 9 Case study Developing the project plan Refining the project plan Team presentations and discussion 10 Managing risks and refining the plan Awareness of contractual issues associated with risk Identifying and evaluating risks; deciding ownership Managing risks: determining levels of provision and contingency Controlling risks: maintaining an up-to date risk register 11 Planning for pro-active control The earned value analysis (EVA) concept and its predictive value Deriving the measures needed for cost and delivery performance Practical issues associated with implementing EVA 12 Using and maintaining the plan Tracking progress and updating the plan Publishing and controlling the plan 13 Course review and transfer planning (Course sponsor present) Identify ways of implementing the techniques learnt Sponsor-led review and discussion of proposals Conclusion

Project planning and risk management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Mastering Market Insights: A Comprehensive Course on Market Research

By Xpert Learning

About Course Unlock key insights with our comprehensive guide to market research - propel your business towards unprecedented growth Our immersive online course on Market Research provides a comprehensive exploration into the intricate art and science of understanding consumer behaviour, trends, and market dynamics. Do you want to grow your business and take it to new heights? Achieving sustainable growth requires a deep understanding of your target audience and a keen awareness of industry trends. This marketing course equips you with the knowledge and skills required to understand your target customers and their needs. We start with a brief history and definition of 'market research' before we lay out the six steps of the market research process. This course examines the classifications of market research and explains how to identify research problems to set up the market research process. We show you how to develop and design a market research approach. We also trace the relationship between market problems and research design by distinguishing between exploratory, descriptive and causal research. The course goes over data analysis techniques and discusses how to deliver effective presentations of research findings to facilitate analysis and discussion. We cover qualitative and quantitative market research methods and provide examples to help you with questionnaire design with examples of open- and closed-end questions. We demonstrate data analysis techniques to help you leverage your research findings to make better business decisions. Finally, the course explains how to communicate research results while adhering to market research ethics. This course has no prerequisites and suits anyone interested in business and marketing. It is particularly useful for small business owners, entrepreneurs and marketers and helps you to create focused marketing campaigns that connect with your audience to boost customer engagement, brand loyalty and business success. Sign up to learn how to conduct market research that lets you understand consumer behaviour, spot gaps in the market and grow your business. Whether you're a budding marketer, a business owner, or a student of the commerce field, this course offers a comprehensive and practical guide to mastering market research. Enroll now to gain the knowledge and skills that can help shape business strategies, influence product development, and drive business success. What Will You Learn? Discuss the importance of market research in supporting marketing decision-making Identify the factors that influence the decision to conduct market research Outline the key components of a market research proposal Discuss the significance of problem identification in marketing research Analyse the key characteristics and advantages of qualitative research Recognise the factors that affect the sample size and accuracy in quantitative research Identify the key components and goals of a questionnaire Explain the importance of data validation and quality control Summarise the significance of the report and presentation as key components of marketing research Discuss the ethical principles of research methodology and the importance of integrity in market research Course Content Introduction to Market Research Introduction to Market Research The Market Research Process The Market Research Process Market Research Design Market Research Design Defining the Problem & Developing Research Approach Defining the Problem & Developing Research Approach Qualitative Market Research Qualitative Market Research Quantitative Market Research Quantitative Market Research Questionnaire Design Questionnaire Design Data Analysis Data Analysis Communicating Research Results Communicating Research Results Research Ethics Research Ethics Conclusion Conclusion A course by Xpert Learning Audience Marketers Current and aspiring product managers Business executives Consultants Entrepreneurs

Mastering Market Insights: A Comprehensive Course on Market Research
Delivered Online On Demand1 hour 30 minutes
£9.99