• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35710 Courses

Critical Care Nurse Skills Training for Hospitals and Ministries of Health

5.0(1)

By Generation Leader

We Deliver Neonatal, Paediatric & Adult Intensive Care Nurse Training Programmes Face to face clinical skills training is supported by our platform which provides relatable and impactful content that helps nurses develop their leadership skills, embed their learning and earn certified CPD. See course content. Available World-Wide Delivered by prominent nurse educators and senior current ICU doctors with global experience in public and private healthcare We take pride in uplifting capabilities, inspiring the nursing workforce and improving patient care Overview Theoretical knowledge, clinical skills & competencies NICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 7 topics within NICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 2. PICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 12 topics within PICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 3. AICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management: safe staffing levels, utilising skill mix, safe and effective patient care Ability to assess the complex patient in the ICU Rehabilitation and recovery planning for ICU patients Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 13 topics within adult critical care. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. Course Content The content helps nurses succeed in gaining essential skills to excel in day-to-day work activities, such as; communicating with colleagues and patients, conducting difficult conversations, knowing how to lead and motivate teams and problem solving. The content is mapped to the leadership requirements as stated by the UK Royal Colleges, including the Royal College of Nursing What is the role of leader? Building and Leading Successful teams CPDwatch Building and Leading Successful teams Building and Leading Successful teams Leading with Values and Ethics CPDwatch Leading with Values and Ethics Leading with Values and Ethics watch Leadership Insights on Leading with Executive Presence Leadership Insights on Leading with Executive Presence watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams watch Leadership Toolkit: Facilitating a Workshop Leadership Toolkit: Facilitating a Workshop watch Leadership Toolkit: Facilitating a Brainstorming Session Leadership Toolkit: Facilitating a Brainstorming Session watch Leadership Toolkit: Running a Team Debrief Leadership Toolkit: Running a Team Debrief watch The Characteristics of an Accountable Leader The Characteristics of an Accountable Leader Leading through Shared Vision CPDwatch Leading through Shared Vision Leading through Shared Vision watch Evaluating Your Management Style Evaluating Your Management Style watch The Adaptive Leader: Be an Iceberg The Adaptive Leader: Be an Iceberg The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader Leading through Problem Solving and Decision Making CPDwatch Leading through Problem Solving and Decision Making Leading through Problem Solving and Decision Making watch Leadership Insights on Leading Diversity Leadership Insights on Leading Diversity watch Leadership Insights on Judgment and Decisiveness Leadership Insights on Judgment and Decisiveness Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness Accountable Leadership CPDwatch Accountable Leadership Accountable Leadership watch Leadership Insights on Being Accountable Leadership Insights on Being Accountable watch Expert Insights on Networking & Building Relationships Expert Insights on Networking & Building Relationships watch Building Your Professional Network Building Your Professional Network watch Leadership Insights on Networking with your Peers Leadership Insights on Networking with your Peers watch Networking to Improve Leadership Effectiveness Networking to Improve Leadership Effectiveness watch Empowering Employees Empowering Employees read MIT Sloan Management Review on New Leader Transitions MIT Sloan Management Review on New Leader Transitions read All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence read MIT Sloan Management Review on The Adaptive Leader MIT Sloan Management Review on The Adaptive Leader read MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis read Executive Presence: The Art of Commanding Respect like a CEO, Second Edition Executive Presence: The Art of Commanding Respect like a CEO, Second Edition read MIT Sloan Management Review on Leader as Motivator MIT Sloan Management Review on Leader as Motivator listen The Accountable Leader: Developing Effective Leadership Through Managerial Accountability The Accountable Leader: Developing Effective Leadership Through Managerial Accountability listen From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership listen Strategic Connections: The New Face of Networking in a Collaborative World Strategic Connections: The New Face of Networking in a Collaborative World listen The Courage Way: Leading and Living with Integrity The Courage Way: Leading and Living with Integrity listen Executive Presence: The Art of Commanding Respect Like a CEO Executive Presence: The Art of Commanding Respect Like a CEO The importance of skillful communication Leading across Cultures CPDwatch Leading across Cultures Leading across Cultures watch Leadership Insights on Setting and Managing Priorities Leadership Insights on Setting and Managing Priorities watch Expert Insights on Collaboration Expert Insights on Collaboration Becoming a Successful Collaborator CPDwatch Becoming a Successful Collaborator Becoming a Successful Collaborator Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness watch Managing Conflict across Cultures Managing Conflict across Cultures watch Managing Conflict in High Performance Teams Managing Conflict in High Performance Teams watch Leadership Insights on Conflict Management Leadership Insights on Conflict Management The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader watch Leadership Insights on Leading Across Cultures Leadership Insights on Leading Across Cultures Leading Diversity CPDwatch Leading Diversity Leading Diversity Encouraging Team Communication and Collaboration CPDwatch Encouraging Team Communication and Collaboration Encouraging Team Communication and Collaboration Navigating Challenging Situations with Diplomacy and Tact CPDwatch Navigating Challenging Situations with Diplomacy and Tact Navigating Challenging Situations with Diplomacy and Tact Facing Virtual Team Challenges CPDwatch Facing Virtual Team Challenges Facing Virtual Team Challenges watch Leadership Insights on Problem Solving & Decision Making Leadership Insights on Problem Solving & Decision Making watch Leadership Insights on Leading through Disruption Leadership Insights on Leading through Disruption watch Leadership Insights on Leading through Motivation Leadership Insights on Leading through Motivation Leading Others through Conflict CPDwatch Leading Others through Conflict Leading Others through Conflict Cultivating Cross-functional Team Collaboration CPDwatch Cultivating Cross-functional Team Collaboration Cultivating Cross-functional Team Collaboration watch Running a Team Debrief Running a Team Debrief watch Leaders Have to Be Human Leaders Have to Be Human watch Collaborating Beyond the Team Collaborating Beyond the Team watch How the Power of Listening Can Reveal Your Team's Motivating Tensions How the Power of Listening Can Reveal Your Team's Motivating Tensions read Successful Time Management: How to be Organized, Productive and Get Things Done Successful Time Management: How to be Organized, Productive and Get Things Done read Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships read Conflict Management Conflict Management read Committed Teams: Three Steps to Inspiring Passion and Performance Committed Teams: Three Steps to Inspiring Passion and Performance read Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation read MIT Sloan Management Review on Problem Solving and Decision Making MIT Sloan Management Review on Problem Solving and Decision Making read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done read MIT Sloan Management Review on Negotiation MIT Sloan Management Review on Negotiation read 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent read MIT Sloan Management Review on Developing People MIT Sloan Management Review on Developing People read MIT Sloan Management Review on Cross-Functional Collaboration MIT Sloan Management Review on Cross-Functional Collaboration listen Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything How to create and lead change Contributing as a Virtual Team Member CPDwatch Contributing as a Virtual Team Member Contributing as a Virtual Team Member Leading Innovation CPDwatch Leading Innovation Leading Innovation Leading with Strategic Thinking CPDwatch Leading with Strategic Thinking Leading with Strategic Thinking watch Leadership Insights on Strategic Thinking Leadership Insights on Strategic Thinking Building and Leading Successful Teams CPDwatch Building and Leading Successful Teams Building and Leading Successful Teams watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams Creating a Successful Business Execution Culture CPDwatch Creating a Successful Business Execution Culture Creating a Successful Business Execution Culture watch How to Build Trust in a Team How to Build Trust in a Team watch Leadership Insights on Leading Innovation Leadership Insights on Leading Innovation watch Leadership Insights on Leading a Culture of Execution Leadership Insights on Leading a Culture of Execution watch Leadership Insights on Leading through Change Leadership Insights on Leading through Change Leading through the Challenge of Change CPDwatch Leading through the Challenge of Change Leading through the Challenge of Change watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively Facilitating Sustainable Change CPDwatch Facilitating Sustainable Change Facilitating Sustainable Change watch Disruptive Leadership Disruptive Leadership read Learning to Think Strategically Learning to Think Strategically read Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results read Demystifying Strategic Thinking: Lessons from Leading CEOs Demystifying Strategic Thinking: Lessons from Leading CEOs read MIT Sloan Management Review on Building and Leading Teams MIT Sloan Management Review on Building and Leading Teams read Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams read Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People read The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge read Choosing to Change: An Alternative Understanding of Change Management Choosing to Change: An Alternative Understanding of Change Management Why leaders should possess emotional intelligence Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Leadership Insights on Critical Thinking Leadership Insights on Critical Thinking watch Knowing When to Think Critically Knowing When to Think Critically Developing Your Critical Thinking and Cognitive Flexibility CPDwatch Developing Your Critical Thinking and Cognitive Flexibility Developing Your Critical Thinking and Cognitive Flexibility Leading through Setting and Managing Priorities CPDwatch Leading through Setting and Managing Priorities Leading through Setting and Managing Priorities watch Managing Priorities Managing Priorities watch Leadership Insights on Leading with Values & Ethics Leadership Insights on Leading with Values & Ethics The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader The Agile Leader CPDwatch The Agile Leader The Agile Leader watch Disruptive Leadership Disruptive Leadership Make The Time You Need: Get Organised CPDwatch Make The Time You Need: Get Organised Make The Time You Need: Get Organised watch Leadership Insights on Emotional Intelligence Leadership Insights on Emotional Intelligence Becoming an Emotionally Intelligent Leader CPDwatch Becoming an Emotionally Intelligent Leader Becoming an Emotionally Intelligent Leader Managing in a Crisis CPDwatch Managing in a Crisis Managing in a Crisis watch Planning Crisis Communications Planning Crisis Communications watch Crisis Management for Leaders Crisis Management for Leaders watch Take a Deep Breath and Manage Your Stress Take a Deep Breath and Manage Your Stress watch Being a Mindful Leader Being a Mindful Leader watch Overcome Emotional Feelings Overcome Emotional Feelings Managing Pressure and Stress to Optimise Your Performance CPDwatch Managing Pressure and Stress to Optimise Your Performance Managing Pressure and Stress to Optimise Your Performance watch Expert Insights on Managing Stress Expert Insights on Managing Stress watch Emotional Intelligence and Effective Leadership Emotional Intelligence and Effective Leadership watch Helping Your Team Work Helping Your Team Work watch Fair and Just Decision Making Fair and Just Decision Making read MIT Sloan Management Review on Setting and Managing Priorities MIT Sloan Management Review on Setting and Managing Priorities read Advances in Authentic and Ethical Leadership Advances in Authentic and Ethical Leadership read Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change read 50 Activities For Managing Stress 50 Activities For Managing Stress read Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life read Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others The significance of coaching in your career Developing Successful Coaching Relationships CPDwatch Developing Successful Coaching Relationships Developing Successful Coaching Relationships watch Working on Shared Goals through Teaming Working on Shared Goals through Teaming watch Initiating a Coaching Relationship Initiating a Coaching Relationship watch Coaches Build Self-Confidence Coaches Build Self-Confidence watch Be a Better Coach Be a Better Coach watch Coaching Team Members Coaching Team Members Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Delivering Results While Developing People Delivering Results While Developing People watch How to Increase Engagement How to Increase Engagement watch Leadership Insights on Coaching Leadership Insights on Coaching watch Leadership Insights on Developing Women Leaders Leadership Insights on Developing Women Leaders watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively watch Creating a Vision Creating a Vision watch Becoming A More Effective Delegator Becoming A More Effective Delegator read MIT Sloan Management Review on Leader as Coach Special Collection MIT Sloan Management Review on Leader as Coach Special Collection read Anytime Coaching: Unleashing Employee Performance, Second Edition Anytime Coaching: Unleashing Employee Performance, Second Edition read Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition read The Extraordinary Coach: How the Best Leaders Help Others Grow The Extraordinary Coach: How the Best Leaders Help Others Grow read Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People read 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done listen 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition

Critical Care Nurse Skills Training for Hospitals and Ministries of Health
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Train the Trainer

By Underscore Group

Develop more advanced training skills such as expert presentation, facilitation and coaching skills. Course overview Duration: 2 days (13 hours) This workshop is for people who want to take their personal skills as a trainer to the next level. It builds on the Underscore Level 1 Train the Trainer course.  In this Level 2 course delegates will develop more advanced training skills such as expert presentation, facilitation and coaching skills. In the modern world learning is often delivered in blended learning formats and this course will introduce delegates to the challenges of blended learning and how to introduce a range of delivery methods into programmes. Attendees will learn how to write more complex learning plans and integrate different methods and media into their plans. Objectives  By the end of the course you will be able to: Describe your Personal Training Style Explain how personality affects communication styles Use techniques to read delegates and adapt communications for greater impact Recognise the ‘games people play’ and how to deal with difficult behaviour Use techniques to establish credibility and enhance your reputation Identify the right approach to take when faced with a range of challenges Use advanced Presentation Skills Use facilitation and coaching skills for experiential workshops Use modern Training Methods and Media Deliver memorable training Note: Delegates attending this programme will be asked to complete an online psychometric in advance of attending the programme in order to help understand personal training styles Content Understanding your Personal Training Style Receive feedback from online Psychometric Understand personal training styles Understand personal communication and working style Understand the impact this has on audience Learn how to adapt your style for greater impact Growing your reputation as a trainer Your Training Persona Training Confidence Training Reputation Trainer Brand Understand the ‘Games People Play’ An introduction to Transactional Analysis (TA) for Trainers Using TA to:Contract for learningUnderstand Trainee AudienceUnderstand interpersonal stylesUnderstand working and thinking stylesWorking in groupsCreativity and innovation Developing deeper Trainer Skills Presentation Magic – making your presentations more effective Facilitation skills for workshops Coaching skills for classrooms and virtual training Delivering experiential workshops Modern Training Methods and Media Incorporating blended learning into your programmes Using Social Learning Using Videos Using Virtual Tools Using CBT and e-learning Pre-course work 1: Complete and online Psychometric Pre-course work 2: Deliver and record a 5-10-minute training session in your workplace on your phone and bring it with you Note: there is an option to have addition 1 hour coaching for delegates to support workplace learning after the course.

Advanced Train the Trainer
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Learning & Development Level 3

By Rachel Hood

Identifying learning and training needs, designing and sourcing training and learning solutions, delivering and evaluating training.

Learning & Development Level 3
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Fast Track [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Configure vCenter High Availability Create and configure virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Configure and manage a VMware Tools Repository Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource use Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use host profiles to manage VMware ESXi host compliance Monitor the vCenter, ESXi, and VMs performance in the vSphere client This five-day, extended hour course takes you from introductory to advanced VMware vSphere© 8 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure, and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 8, which includes VMware ESXi? 8 and VMware vCenter Server© 8. Course Introduction Introductions and course logistics Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Install an ESXi host vCenter Management Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vSphere tasks and events Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries Configure and Manage vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches Configure and Manage vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores Discuss vSphere support for NVMe and iSER technologies Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro Deploying and Configuring vSphere Cluster Use Cluster Quickstart to enable vSphere cluster services and configure the cluster View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to different types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize the use cases for various vSphere HA settings Configure a cluster enabled for vSphere DRS and vSphere HA Recognize when to use vSphere Fault Tolerance Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs ESXi Operations Use host profiles to manage ESXi configuration compliance Recognize the benefits of using configuration profiles Managing the vSphere Lifecycle Generate vCenter interoperability reports Recognize features of vSphere Lifecycle Manager Describe ESXi images and image depots Enable vSphere Lifecycle Manager in a vSphere cluster Validate ESXi host compliance against a cluster image and remediate ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control

VMware vSphere: Fast Track [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to R Programming

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Business Analysts, Technical Managers, and Programmers Overview This intensive training course helps students learn the practical aspects of the R programming language. The course is supplemented by many hands-on labs which allow attendees to immediately apply their theoretical knowledge in practice. Over the past few years, R has been steadily gaining popularity with business analysts, statisticians and data scientists as a tool of choice for conducting statistical analysis of data as well as supervised and unsupervised machine learning. What is R ? What is R? ? Positioning of R in the Data Science Space ? The Legal Aspects ? Microsoft R Open ? R Integrated Development Environments ? Running R ? Running RStudio ? Getting Help ? General Notes on R Commands and Statements ? Assignment Operators ? R Core Data Structures ? Assignment Example ? R Objects and Workspace ? Printing Objects ? Arithmetic Operators ? Logical Operators ? System Date and Time ? Operations ? User-defined Functions ? Control Statements ? Conditional Execution ? Repetitive Execution ? Repetitive execution ? Built-in Functions ? Summary Introduction to Functional Programming with R ? What is Functional Programming (FP)? ? Terminology: Higher-Order Functions ? A Short List of Languages that Support FP ? Functional Programming in R ? Vector and Matrix Arithmetic ? Vector Arithmetic Example ? More Examples of FP in R ? Summary Managing Your Environment ? Getting and Setting the Working Directory ? Getting the List of Files in a Directory ? The R Home Directory ? Executing External R commands ? Loading External Scripts in RStudio ? Listing Objects in Workspace ? Removing Objects in Workspace ? Saving Your Workspace in R ? Saving Your Workspace in RStudio ? Saving Your Workspace in R GUI ? Loading Your Workspace ? Diverting Output to a File ? Batch (Unattended) Processing ? Controlling Global Options ? Summary R Type System and Structures ? The R Data Types ? System Date and Time ? Formatting Date and Time ? Using the mode() Function ? R Data Structures ? What is the Type of My Data Structure? ? Creating Vectors ? Logical Vectors ? Character Vectors ? Factorization ? Multi-Mode Vectors ? The Length of the Vector ? Getting Vector Elements ? Lists ? A List with Element Names ? Extracting List Elements ? Adding to a List ? Matrix Data Structure ? Creating Matrices ? Creating Matrices with cbind() and rbind() ? Working with Data Frames ? Matrices vs Data Frames ? A Data Frame Sample ? Creating a Data Frame ? Accessing Data Cells ? Getting Info About a Data Frame ? Selecting Columns in Data Frames ? Selecting Rows in Data Frames ? Getting a Subset of a Data Frame ? Sorting (ordering) Data in Data Frames by Attribute(s) ? Editing Data Frames ? The str() Function ? Type Conversion (Coercion) ? The summary() Function ? Checking an Object's Type ? Summary Extending R ? The Base R Packages ? Loading Packages ? What is the Difference between Package and Library? ? Extending R ? The CRAN Web Site ? Extending R in R GUI ? Extending R in RStudio ? Installing and Removing Packages from Command-Line ? Summary Read-Write and Import-Export Operations in R ? Reading Data from a File into a Vector ? Example of Reading Data from a File into A Vector ? Writing Data to a File ? Example of Writing Data to a File ? Reading Data into A Data Frame ? Writing CSV Files ? Importing Data into R ? Exporting Data from R ? Summary Statistical Computing Features in R ? Statistical Computing Features ? Descriptive Statistics ? Basic Statistical Functions ? Examples of Using Basic Statistical Functions ? Non-uniformity of a Probability Distribution ? Writing Your Own skew and kurtosis Functions ? Generating Normally Distributed Random Numbers ? Generating Uniformly Distributed Random Numbers ? Using the summary() Function ? Math Functions Used in Data Analysis ? Examples of Using Math Functions ? Correlations ? Correlation Example ? Testing Correlation Coefficient for Significance ? The cor.test() Function ? The cor.test() Example ? Regression Analysis ? Types of Regression ? Simple Linear Regression Model ? Least-Squares Method (LSM) ? LSM Assumptions ? Fitting Linear Regression Models in R ? Example of Using lm() ? Confidence Intervals for Model Parameters ? Example of Using lm() with a Data Frame ? Regression Models in Excel ? Multiple Regression Analysis ? Summary Data Manipulation and Transformation in R ? Applying Functions to Matrices and Data Frames ? The apply() Function ? Using apply() ? Using apply() with a User-Defined Function ? apply() Variants ? Using tapply() ? Adding a Column to a Data Frame ? Dropping A Column in a Data Frame ? The attach() and detach() Functions ? Sampling ? Using sample() for Generating Labels ? Set Operations ? Example of Using Set Operations ? The dplyr Package ? Object Masking (Shadowing) Considerations ? Getting More Information on dplyr in RStudio ? The search() or searchpaths() Functions ? Handling Large Data Sets in R with the data.table Package ? The fread() and fwrite() functions from the data.table Package ? Using the Data Table Structure ? Summary Data Visualization in R ? Data Visualization ? Data Visualization in R ? The ggplot2 Data Visualization Package ? Creating Bar Plots in R ? Creating Horizontal Bar Plots ? Using barplot() with Matrices ? Using barplot() with Matrices Example ? Customizing Plots ? Histograms in R ? Building Histograms with hist() ? Example of using hist() ? Pie Charts in R ? Examples of using pie() ? Generic X-Y Plotting ? Examples of the plot() function ? Dot Plots in R ? Saving Your Work ? Supported Export Options ? Plots in RStudio ? Saving a Plot as an Image ? Summary Using R Efficiently ? Object Memory Allocation Considerations ? Garbage Collection ? Finding Out About Loaded Packages ? Using the conflicts() Function ? Getting Information About the Object Source Package with the pryr Package ? Using the where() Function from the pryr Package ? Timing Your Code ? Timing Your Code with system.time() ? Timing Your Code with System.time() ? Sleeping a Program ? Handling Large Data Sets in R with the data.table Package ? Passing System-Level Parameters to R ? Summary Lab Exercises Lab 1 - Getting Started with R Lab 2 - Learning the R Type System and Structures Lab 3 - Read and Write Operations in R Lab 4 - Data Import and Export in R Lab 5 - k-Nearest Neighbors Algorithm Lab 6 - Creating Your Own Statistical Functions Lab 7 - Simple Linear Regression Lab 8 - Monte-Carlo Simulation (Method) Lab 9 - Data Processing with R Lab 10 - Using R Graphics Package Lab 11 - Using R Efficiently

Introduction to R Programming
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Install, Configure, Manage [V8]

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture™ concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences

VMware vSAN: Install, Configure, Manage [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Cisco Meeting Server Overview Cisco Meeting Server Deployment Cisco Meeting Server User Licensing Cisco Meeting Server Configuration Cisco Meeting Server Configuration with Cisco Unified Communication Manager (CUCM) Cisco Meeting Server Integration VCS/Expressway Cisco Meeting Server Integration with TMS Cisco Meeting Server Configuration with Lync/Skype for Business Cisco Meeting Server Recording and Streaming Cisco Meeting Manager (CMM) Deployment Cisco Meeting Server WebRTC using Expressway Proxy Cisco Meeting Server Customization Cisco Meeting Server Troubleshooting In this course, students will install and configure a Cisco Meeting Server version 2.x. Students will configure a multimode CMS Cluster and implement all the different components of a clustered solution. Student will also integrate CMS with Unified Communications Manager and VCS/Expressway. Students will also integrate Recording and Skype/Lync. Students will use the TMS and new Cisco Meeting Manager Schedule and monitor CMS. Cisco Meeting Server Overview What is Cisco Meeting Server Cisco Meeting Server Benefits Cisco Meeting Server vs Telepresence Server vs MCU Cisco Meeting Server Functions? Cisco Meeting Server Components Cisco Meeting Server Call Bridge Cisco Meeting Server Web Bridge Cisco Meeting Server Turn Server Cisco Meeting Server XMPP Server Cisco Meeting Server Database Cisco Meeting Server Scalability On-premises and Cloud Conferencing API Integration Cisco Meeting Server Deployment MMP CLI Cisco Meeting Server Prerequisites Cisco Meeting Server 2000 Deployments Installing the server Configuring the Fabric Interconnect modules Configuring the Cisco Meeting Server 2000 through the MMP Checking the installed software Configuring the Web Admin Interface Applying a License File Cisco Meeting Server 1000/VM Deployments Installing CMM via VMware Configuring VMware Network Management Configuring the VMware Instance using vSphere client Retrieving and activating VMware Licenses Accessing the Cisco Meeting Server 1000 Console Installing CMM via Hyper-V Single combined server deployment Single Split Server Deployment Deploying a Core Server Deploying an Edge Server Certificate Guidelines for Single Split Server Deployment Scalable and Resilient Server Deployments Cisco Meeting Server User Licensing Obtaining and Entering a License File Cisco Meeting Server Licenses Cisco User Licenses Personal Multiparty Plus Licensing Shared Multiparty Plus Licensing Cisco Meeting Server Capacity Units XMPP Licensing for Cisco Meeting Apps Cisco Meeting Server Capacity Units Cisco Meeting Server Configuration Transferring the License File to the Cisco Meeting Sever Creating a Cisco Meeting Server Administrator Account Setting up the Network Interface for IPv4 Adding additional Network Interfaces Configuring the Web Admin Interface Creating the certificate for the Web Admin Interface Configuring the Web Admin Interface for HTTS Access Configuring the Web Bridge Configuring the TURN server Configuring the Databases Deploying Web Bridges Deploying multiple Web Bridges Setting up the Web Bridges? certificates Setting up the Web Bridges via the API Web Bridge call flow Cisco Meeting App and WebRTC Client Enabling HTTP redirect and the Web Bridge Deploying the TURN Servers Dial plan configuration ? Overview Dial plan rules for incoming calls and outbound calls Outbound Dial Plan Rules Inbound Dial Plan Rules Forwarding Dial Plan Rules Dial plan configuration?SIP endpoints Cisco Meeting Server (CMS) Configuration with Cisco Unified Communication Manager (CUCM) CUCM and CMS Integration Setting up Escalated ad hoc calls Configuring the Meeting Server Setup Incoming Dial Plan Setup Administrator Account with API Permission Adding the Cisco Meeting Server as a Conference Bridge Creating a Media Resource Group Creating a Media Resource List Adding the Media Resource Group to a Device Pool or Device Setting up Scheduled and Rendezvous Calls Configure Outbound Dial Plan Dial Plan Configuring Cisco Unified Communications Server Configure Route Groups Configure Route Lists Configure Route Pattern Support for Active Control Participant List Indicators Selecting Layout Limitations Overview of ActiveControl and the iX protocol CUCM 8.x and earlier Third-party networks VCS-centric deployments Load Balancing Calls Configuring Call Bridges for Load Balancing Incoming Calls Creating Call Bridge Groups Enabling Load Balancing Fine Tuning Load Balancing Enable Load Balancing of Outbound SIP Calls Setup Outbound Dial Plan Rule for Load Balancing SIP Calls Supply the Call Bridge Group or Specific Call Bridge to Use for Outbound SIP Calls Cisco Meeting Server Integration VCS/Expressway Gateway Configuration Call Testing Inbound call from an endpoint registered to a VCS/Expressway Outbound call to an endpoint registered to a VCS/Expressway Calling non Cisco Meeting App users from H.323 endpoint Troubleshooting Cisco Meeting Server Integration with TMS TMS Integration Cisco Meeting Server Configuration with Lync/Skype for Business Configuring Cisco Meeting Server with SKYPE Dial plan configuration ? integrating Lync/Skype for Business Lync clients dialing into a call on clustered Meeting Servers Integrating SIP endpoints and Lync clients Adding calls between Lync clients and SIP video endpoints Lync Front End server configuration VCS configuration Meeting Server configuration Integrating Cisco Meeting App with SIP and Lync clients Integrating Lync using Lync Edge service Controlling the bandwidth for sharing content on Microsoft Lync and Skype for Business calls Direct Lync federation Calling into scheduled Lync meetings directly and via IVR Office 365 Dual Homed Experience with OBTP Scheduling Cisco Meeting Server Recording and Streaming Recording Meetings Recorder licensing Recording with Vbrick Prerequisites for the Meeting Server Configuring the Meeting Server to work with Vbrick Steps to configuring the Streamer Deploying streaming Streamer licensing Recording meetings Cisco Meeting Manager (CMM) Deployment Deploy Cisco Meeting Manager Cisco Meeting Manager Meetings Navigation List Meetings Edit Meetings Layout Recording Streaming Participants Find meetings Find participants Change layout for all participants in a meeting Start and stop recording Start and stop streaming Add participants Change layout for an individual participant Turn audio or video on or off View participant details Call statistics Cisco Meeting Server WebRTC using Expressway Proxy Configure Cisco Meeting Server for WebRTC Proxy Configure Cisco Expressway C Configure Turn on Cisco Expressway E Cisco Meeting Server Customization WebRTC App Customization Call Customization IVR Message Customization SIP/LYNC Call Message Customization Invitation Customization Cisco Meeting Server Troubleshooting Troubleshooting Cisco Meeting Server Connectivity Troubleshooting Web Bridge connectivity Troubleshooting Call Server issues Troubleshooting Conferencing issues

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry