• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

39945 Courses

Microsoft Power BI

5.0(2)

By Enliten IT

Microsoft Power BI training courses at Introduction and Intermediate levels. Click on the link below to view full details: Power BI courses

Microsoft Power BI
Delivered In-Person in Harlow + 1 more or UK WideFlexible Dates
FREE

From Essays to Research Papers: How a Plagiarism Checker Tool Can Help

By david hude

Introduction In today’s academic landscape, the integrity of one's work is more crucial than ever. With the prevalence of information readily available online, ensuring that your work is original can be challenging. This is where tools like a Plagiarism Checker come into play, offering invaluable assistance to students, researchers, and educators alike. These tools not only help in maintaining the authenticity of academic work but also bolster the credibility of the individual behind it. In this article, we'll explore the multifaceted role of plagiarism checker tools in academia, from essays to research papers. Understanding Plagiarism Definition of Plagiarism Plagiarism is the act of using someone else’s words, ideas, or expressions without proper acknowledgement. It’s a serious offence in academic and professional settings, leading to consequences ranging from loss of credibility to legal repercussions. Types of Plagiarism in Academic Writing Direct Plagiarism: Copying text verbatim without citation. Self-Plagiarism: Reusing one's previous work without acknowledgement. Mosaic Plagiarism: Borrowing phrases from a source without using quotation marks. Accidental Plagiarism: Unintentional failure to cite sources properly. Challenges Faced in Academic Writing Common Issues in Essay Writing Writing essays involves synthesizing information from various sources while presenting it in a unique voice. Common issues include unintentional plagiarism, inadequate citation, and difficulty in integrating sources seamlessly. Research Papers and Their Complexities Research papers require in-depth analysis, original research, and a comprehensive understanding of existing literature. Challenges include properly crediting sources, avoiding plagiarism, and maintaining originality. The Role of Plagiarism Checker Tools What is a Plagiarism Checker? A plagiarism checker is a tool designed to detect similarities between submitted text and existing content in its database. It scans documents and highlights matching phrases, helping users identify potential plagiarism. How Plagiarism Checkers Work Plagiarism checkers compare the text against a vast database of published works, websites, and academic papers. They use algorithms to detect similarities and provide a report detailing any matches found, indicating the percentage of copied content. Benefits of Using Plagiarism Checker Tools Ensuring Originality Plagiarism checker tools ensure that your work is original by detecting any unintentional copying from other sources. This helps in producing authentic and unique content. Enhancing Academic Credibility By verifying the originality of your work, plagiarism checkers enhance your academic credibility, demonstrating a commitment to integrity and scholarly excellence. Using Plagiarism Checker Tools for Essays How to Use a Plagiarism Checker for Essays Upload Your Document: Start by uploading your essay to the plagiarism checker. Run the Check: Initiate the plagiarism check and wait for the results. Review the Report: Analyze the report to identify any sections that need proper citation or rephrasing. Tips for Effective Essay Writing Plan Ahead: Outline your essay and plan your sources. Cite Properly: Use appropriate citation styles for references. Revise Thoroughly: Revise your essay to ensure clarity and originality. Utilizing Plagiarism Checker Tools for Research Papers Checking Research Papers for Plagiarism Prepare Your Draft: Ensure your research paper is ready for submission. Use a Plagiarism Checker: Upload and scan your paper. Address Plagiarism: Modify any flagged sections to enhance originality. Best Practices for Citing Sources Use a Consistent Style: Follow a specific citation style (APA, MLA, etc.). Credit All Sources: Ensure every piece of borrowed information is cited. Maintain a Reference List: Keep a comprehensive list of all references. Case Study: Impact of Plagiarism Checkers in Academia Real-Life Example of Plagiarism Detection In a notable case, a university discovered extensive plagiarism in student theses using plagiarism checkers. The tool identified significant matches with online sources, leading to disciplinary actions and highlighting the need for rigorous plagiarism checks. Lessons Learned from Case Studies Case studies reveal the importance of proactive plagiarism detection and the role of technology in maintaining academic integrity. They underscore the need for students and educators to use these tools regularly. Comparison of Popular Plagiarism Checker Tools Overview of Top Plagiarism Checkers Turnitin: Widely used in educational institutions for its comprehensive database and detailed reports. Grammarly: Combines grammar checking with plagiarism detection, ideal for writers and students. Copyscape: Popular for checking web content plagiarism, particularly useful for bloggers and online writers. Features and Pricing Turnitin: Offers extensive academic resources but can be expensive. Grammarly: Provides a user-friendly interface with moderate pricing. Copyscape: Cost-effective for simple plagiarism detection needs. The Future of Plagiarism Detection Advancements in Plagiarism Detection Technology Technological advancements are enhancing the accuracy and efficiency of plagiarism detection, with AI playing a pivotal role in identifying complex plagiarism patterns. The Role of AI in Plagiarism Checking AI-powered tools are capable of detecting paraphrasing and more nuanced forms of plagiarism, making them indispensable in the future of academic integrity. Academic Integrity and Ethics The Ethical Use of Plagiarism Checker Tools Using plagiarism checkers ethically involves ensuring that they are used to improve the originality of your work rather than to circumvent academic responsibilities. Encouraging Honest Academic Practices Educators should encourage the use of plagiarism checkers as a learning tool to promote honesty and diligence in academic work. Common Myths About Plagiarism Checker Tools Misconceptions and Clarifications “Plagiarism checkers are 100% accurate.”: While highly effective, they are not foolproof. “They can replace proper citation.”: Plagiarism checkers are a complement, not a substitute for proper citation practices. Addressing Fears and Concerns Concerns about privacy and the accuracy of plagiarism checkers can be mitigated by choosing reputable tools and understanding their limitations. Steps to Implement Plagiarism Checker Tools in Academia Integrating Tools into the Academic Workflow Institutions should incorporate plagiarism checkers into their academic processes, making them a standard part of assignment submission and evaluation. Training Students and Faculty Provide training on how to use plagiarism checkers effectively and ethically, ensuring everyone understands their role in upholding academic integrity. How New Assignment Help Utilizes Plagiarism Checker Tools Our Approach to Maintaining Originality At New Assignment Help, we use advanced plagiarism checker tools to ensure that every assignment is original and free from plagiarism. Our tools help students submit work with confidence, knowing it's unique. Benefits for Students Using New Assignment Help Students benefit from enhanced academic credibility, better grades, and a deeper understanding of proper citation practices by using our plagiarism detection services. Conclusion Plagiarism checker tools are invaluable in maintaining academic integrity and ensuring the originality of essays and research papers. As technology advances, these tools will continue to evolve, offering more sophisticated ways to detect and prevent plagiarism. Embracing these tools is essential for anyone serious about upholding academic standards and producing high-quality, credible work.

From Essays to Research Papers: How a Plagiarism Checker Tool Can Help
Delivered In-PersonFlexible Dates
FREE

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VBA in Excel - Part 1

By Underscore Group

Following on from the Macros course look at how you can write your own Visual Basic code within Excel to fully automate tasks and save time. Course overview Duration: 2 days (13 hours) Our VBA in Excel course is an introduction to using the Visual Basic for Applications language for programming in Excel. It looks at structures, syntax and coding standards. This course is designed for existing experienced users of Excel who can record and run macros and those who have dabbled in VBA but would like some formal training and help to put some structure to their code. Objectives  By the end of the course you will be able to: Write visual basic procedures Create event and general procedures Use commands from the Excel data model Use statements and functions Use a selection of debugging tools Create and use variables and constants Use different types of loops Create an Excel user form Content The VBA environment Project explorer Excel objects Modules Properties window Code window Code structure Code structure Navigating within your code Adding comments Using WITH Steps to creating a VBA procedure Procedures Sub procedures Event procedures Calling procedures The Excel data model Workbook commands Worksheet commands Excel selection methods Data manipulation commands Debugging Using breakpoints Stepping through code The immediate window The watch window The locals window points Variables and Constants Declaring variables Declaring multiple variables Variable data types Concatenation Scope of variables Constants Declaring constants Using constants Scope of constants Looping Do while loops Do until loops For next loops Conditional Statements IF statement SELECT CASE statement Comparison statements Logical operators Creating a User Form Form layout The control toolbox Naming conventions Adding objects Naming objects Captions Displaying the form Object properties Object properties Setting properties at design time Setting properties at run time Interconnectivity between the user form and Excel Comparing values Transferring information Running code

VBA in Excel - Part 1
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Introduction to R Programming

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Business Analysts, Technical Managers, and Programmers Overview This intensive training course helps students learn the practical aspects of the R programming language. The course is supplemented by many hands-on labs which allow attendees to immediately apply their theoretical knowledge in practice. Over the past few years, R has been steadily gaining popularity with business analysts, statisticians and data scientists as a tool of choice for conducting statistical analysis of data as well as supervised and unsupervised machine learning. What is R ? What is R? ? Positioning of R in the Data Science Space ? The Legal Aspects ? Microsoft R Open ? R Integrated Development Environments ? Running R ? Running RStudio ? Getting Help ? General Notes on R Commands and Statements ? Assignment Operators ? R Core Data Structures ? Assignment Example ? R Objects and Workspace ? Printing Objects ? Arithmetic Operators ? Logical Operators ? System Date and Time ? Operations ? User-defined Functions ? Control Statements ? Conditional Execution ? Repetitive Execution ? Repetitive execution ? Built-in Functions ? Summary Introduction to Functional Programming with R ? What is Functional Programming (FP)? ? Terminology: Higher-Order Functions ? A Short List of Languages that Support FP ? Functional Programming in R ? Vector and Matrix Arithmetic ? Vector Arithmetic Example ? More Examples of FP in R ? Summary Managing Your Environment ? Getting and Setting the Working Directory ? Getting the List of Files in a Directory ? The R Home Directory ? Executing External R commands ? Loading External Scripts in RStudio ? Listing Objects in Workspace ? Removing Objects in Workspace ? Saving Your Workspace in R ? Saving Your Workspace in RStudio ? Saving Your Workspace in R GUI ? Loading Your Workspace ? Diverting Output to a File ? Batch (Unattended) Processing ? Controlling Global Options ? Summary R Type System and Structures ? The R Data Types ? System Date and Time ? Formatting Date and Time ? Using the mode() Function ? R Data Structures ? What is the Type of My Data Structure? ? Creating Vectors ? Logical Vectors ? Character Vectors ? Factorization ? Multi-Mode Vectors ? The Length of the Vector ? Getting Vector Elements ? Lists ? A List with Element Names ? Extracting List Elements ? Adding to a List ? Matrix Data Structure ? Creating Matrices ? Creating Matrices with cbind() and rbind() ? Working with Data Frames ? Matrices vs Data Frames ? A Data Frame Sample ? Creating a Data Frame ? Accessing Data Cells ? Getting Info About a Data Frame ? Selecting Columns in Data Frames ? Selecting Rows in Data Frames ? Getting a Subset of a Data Frame ? Sorting (ordering) Data in Data Frames by Attribute(s) ? Editing Data Frames ? The str() Function ? Type Conversion (Coercion) ? The summary() Function ? Checking an Object's Type ? Summary Extending R ? The Base R Packages ? Loading Packages ? What is the Difference between Package and Library? ? Extending R ? The CRAN Web Site ? Extending R in R GUI ? Extending R in RStudio ? Installing and Removing Packages from Command-Line ? Summary Read-Write and Import-Export Operations in R ? Reading Data from a File into a Vector ? Example of Reading Data from a File into A Vector ? Writing Data to a File ? Example of Writing Data to a File ? Reading Data into A Data Frame ? Writing CSV Files ? Importing Data into R ? Exporting Data from R ? Summary Statistical Computing Features in R ? Statistical Computing Features ? Descriptive Statistics ? Basic Statistical Functions ? Examples of Using Basic Statistical Functions ? Non-uniformity of a Probability Distribution ? Writing Your Own skew and kurtosis Functions ? Generating Normally Distributed Random Numbers ? Generating Uniformly Distributed Random Numbers ? Using the summary() Function ? Math Functions Used in Data Analysis ? Examples of Using Math Functions ? Correlations ? Correlation Example ? Testing Correlation Coefficient for Significance ? The cor.test() Function ? The cor.test() Example ? Regression Analysis ? Types of Regression ? Simple Linear Regression Model ? Least-Squares Method (LSM) ? LSM Assumptions ? Fitting Linear Regression Models in R ? Example of Using lm() ? Confidence Intervals for Model Parameters ? Example of Using lm() with a Data Frame ? Regression Models in Excel ? Multiple Regression Analysis ? Summary Data Manipulation and Transformation in R ? Applying Functions to Matrices and Data Frames ? The apply() Function ? Using apply() ? Using apply() with a User-Defined Function ? apply() Variants ? Using tapply() ? Adding a Column to a Data Frame ? Dropping A Column in a Data Frame ? The attach() and detach() Functions ? Sampling ? Using sample() for Generating Labels ? Set Operations ? Example of Using Set Operations ? The dplyr Package ? Object Masking (Shadowing) Considerations ? Getting More Information on dplyr in RStudio ? The search() or searchpaths() Functions ? Handling Large Data Sets in R with the data.table Package ? The fread() and fwrite() functions from the data.table Package ? Using the Data Table Structure ? Summary Data Visualization in R ? Data Visualization ? Data Visualization in R ? The ggplot2 Data Visualization Package ? Creating Bar Plots in R ? Creating Horizontal Bar Plots ? Using barplot() with Matrices ? Using barplot() with Matrices Example ? Customizing Plots ? Histograms in R ? Building Histograms with hist() ? Example of using hist() ? Pie Charts in R ? Examples of using pie() ? Generic X-Y Plotting ? Examples of the plot() function ? Dot Plots in R ? Saving Your Work ? Supported Export Options ? Plots in RStudio ? Saving a Plot as an Image ? Summary Using R Efficiently ? Object Memory Allocation Considerations ? Garbage Collection ? Finding Out About Loaded Packages ? Using the conflicts() Function ? Getting Information About the Object Source Package with the pryr Package ? Using the where() Function from the pryr Package ? Timing Your Code ? Timing Your Code with system.time() ? Timing Your Code with System.time() ? Sleeping a Program ? Handling Large Data Sets in R with the data.table Package ? Passing System-Level Parameters to R ? Summary Lab Exercises Lab 1 - Getting Started with R Lab 2 - Learning the R Type System and Structures Lab 3 - Read and Write Operations in R Lab 4 - Data Import and Export in R Lab 5 - k-Nearest Neighbors Algorithm Lab 6 - Creating Your Own Statistical Functions Lab 7 - Simple Linear Regression Lab 8 - Monte-Carlo Simulation (Method) Lab 9 - Data Processing with R Lab 10 - Using R Graphics Package Lab 11 - Using R Efficiently

Introduction to R Programming
Delivered OnlineFlexible Dates
Price on Enquiry

Mentoring Programme

By UKSedation

After you've completed both parts of the course, you need a mentor to help you with at least 20 cases before independent practice. We are growing a list of mentors who may be able to help. At UK Sedation we have a team of mentors so you can contact us at info@uksedation.com This mentoring module is free to everyone who has been on our IV New Starter Courses and is designed to make life easy for you and your mentor. Log your sedation cases, complete case assessments, use controlled drugs logs and access handy documents, all fully online with our Mentoring Programme. Click to enrol or "start course" to begin! Course Includes 14 Lessons 1 Quiz About Instructor Rob Endicott Roy Bennett Dr Roy Bennett is the director of Mellow Dental Training, IACSD accredited trainer and mentor and former director of Portmans Dental Care. Dr Rob Endicott is an IACSD accredited trainer and mentor and is the ViceChair of the ADAS (Association of Dental Anaesthetists and Sedationists)

Mentoring Programme
Delivered Online On Demand
FREE

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. Course Introduction Introductions and course logistics Course objectives VMware cloud foundation overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe the VMware Cloud Foundation topology VMware Cloud Foundation+ and VMware Cloud Connectivity Describe the VMware Cloud Foundation+ architecture Identify the pre-requisites for VMware Cloud Foundation+ Describe VMware Cloud Foundation+ value added features Configure subscription-based licensing parameters Describe the vCenter Cloud Gateway functionality Identify the vCenter Cloud Gateway components Describe the vCenter Cloud Gateway architecture Connect the vCenter Cloud Gateway to VMware Cloud Describe the VMware Cloud platform Describe the VMware vSphere+ services used in VMware Cloud Foundation+ Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Describe the VMware Cloud Foundation bring-up process Identify the information required for the Planning and Preparation Workbook Complete the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Identify the configuration validation process performed by VMware Cloud Builder Describe the deployment of the management domain Post-Deployment Operations Complete the Onboarding Wizard Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources for VMware Cloud Foundation Perform the SDDC Manager backup and restore process Identify steps in the NSX backup and restore process Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Manage and secure a primary password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation Networking with NSX Describe network virtualization with NSX Recognize NSX operational planes Identify NSX components Describe logical switching Describe NSX Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX Identify NSX Edge functions Describe data plane preparation for NSX Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Managing Workload Domains Define workload domains List the types of workload domains Identify workload domain prerequisites Understand the scalability limits for workload domains Identify use cases for multiple clusters in a workload domain Create network pools Size network pools Commission hosts with SDDC Manager Create workload domains Scale workload domains Decommission hosts from a workload domain Remove workload domains Describe distinctive design decisions for VMware Cloud Foundation components vSphere with Tanzu in VMware Cloud Foundation Explain vSphere with Tanzu Define the role of the Spherelet Describe the supervisor cluster control plane Create vSphere with Tanzu namespaces Describe the role of NSX networking components in vSphere with Tanzu Discuss vSphere with Tanzu networking topology Describe control plane VM management networking requirements Plan appropriate IP address ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace VMware Cloud Foundation Storage Management Identify storage use cases in VMware Cloud Foundation Determine the most appropriate storage option for a workload domain Describe different vSphere-native storage design options Identify vSAN architecture and components Describe vSAN requirements for the management and workload domains Configure deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Configure storage policies for vSAN Explain storage policy failure tolerance rules Identify a virtual machine storage policy compliance status Explain how vSAN storage policies protect VMware Cloud Foundation components Availability and Business Continuity Explain the importance of external service availability Describe availability options native to VMware vSphere Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Learn the basics of public key infrastructure (PKI) Describe the purpose of certificate signing requests (CSRs) Describe available options in SDDC Manager for certificate authorities View certificates for VMware Cloud Foundation components Install and replace certificates for VMware Cloud Foundation components Configure the integrated Certificate Authorities in SDDC Manager Configure a certificate template in Microsoft Certificate Authority server Configure the OpenSSL certificate authority in SDDC Manager Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMware Cloud Foundation Lifecycle Management Describe VMware Cloud Foundation Life Cycle Management List the products managed by VMware Cloud Foundation Lifecycle management Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation Understand vSphere Lifecycle Manager features Understand how and when to use cluster images Describe the importance of Hardware Support Managers Describe the upgrade prerequisites Outline the upgrade precheck process Describe the order of upgrade for VMware Cloud Foundation components VMware Cloud Foundation Troubleshooting Use the SoS command-line tool to create log bundles, perform health checks, and check password validity List VMware Cloud Foundation services Identify VMware Cloud Foundation log files Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. Course Introduction Introductions and course logistics Course objectives Day 0 Operations: VMware Telco Cloud Infrastructure Installation Describe the challenges of the telco cloud Describe the key functions of the telco cloud List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure Describe the VMware Telco Cloud Infrastructure architecture Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture List the VMware Telco Cloud Infrastructure deployment options Describe the VMware Cloud Director architecture List the key VMware components that are part of VMware Cloud Director Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure Day 0 Operations: ETSI NFV Requirements for Cloud Platforms Compare physical and virtual infrastructures List the benefits and challenges of physical infrastructure Describe the types of virtual infrastructure Describe the advantages and components of the NFV infrastructure (NFVI) Explain the role of network virtualization in the NFVI List the requirements of NFVI for VMware Cloud Director Describe the networking options of VMware Cloud Director Describe the key networking use cases Describe requirements of VMware Telco Cloud Automation? for networking Describe the storage options of VMware Cloud Director Describe the key storage use cases Day 1 Operations: Virtualized Infrastructure Manager (VIM) Configuration Explain basic concepts related to VMware Cloud Director Describe the components of the VMware Cloud Director architecture Describe the basic configuration of the VMware Cloud Director architecture Describe virtual data centers or VDCs Explain the role of organization VDCs Describe the relationship between provider VDCs and organization VDCs Describe resources in VMware Cloud Director List the key resource organization Create resource pools Describe how vSAN integrates with VMware Cloud Director Day 1 Operations: Configuring VMware Cloud Director Providers Describe how compute resources are provided to VMware Cloud Director Describe how storage resources are provided to VMware Cloud Director Describe provider VDC requirements and best practices List the requirements of creating VDCs Describe the VNF on-boarding process Create provider VDCs Day 1 Operations: Configuring VMware Cloud Director Organizations Describe VMware Cloud Director organizations Create VMware Cloud Director organizations Navigate through the VMware Cloud Director HTML5 provider portal Describe the VMware Cloud Director organization VDC Navigate through the tenant portal List use cases for a VMware Cloud Director organization VDC List the organization VDC allocation models Describe the types of resources that can be allocated Describe how resources are allocated for an organization Examine the function and requirements of network pools Describe the network types available in VMware Cloud Director (external, organization, and vApp) Create and manage organization VDC networks Describe catalogs Manage an organization?s catalog Populate, share, and publish catalogs Describe vApps Manage access to vApps and catalogs Modify the configuration of vApps and their virtual machines (VMs) Manage organization VDC networking Create affinity and anti-affinity rules Day 1 Operations: Configuring VMware Cloud Director Security Describe role-based access Create custom security roles Describe the directory services in VMware Cloud Director Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director Explain the use of VMware Cloud Director with SSO Day 1 Operations: Configuring VMware Cloud Director Networking List networking options in VMware Cloud Director Describe key networking use cases in VMware Cloud Director Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall Describe an overview of VMware NSX-T? Data Center Explain the architecture of NSX-T Data Center Describe VMware Cloud Director supported features of NSX-T Data Center Describe the benefits and challenges of multisite networking List the requirements for multisite networking Describe the benefits and challenges of networking between VDCs List the requirements for networking between VDCs Configure cross-VDC networking Day 2 Operations: VMware Cloud Director Resource Management and Monitoring Identify the key resources that need to be managed with VMware Cloud Director List monitoring options with VMware Cloud Director Explain the resource management and monitoring architecture in VMware Cloud Director Monitor objects from the VMware Cloud Director portal Identify features of VMware vRealize© Operations Manager? Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director Integrate VMware Cloud Director with the Tenant App Configure the Tenant App for VMware Cloud Director Monitor objects with the Tenant App List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? List the steps to review historical virtual machine metrics in VMware Cloud Director Examine VMware Cloud Director logs Day 2 Operations: VMware Cloud Director Troubleshooting Identify the features of the VMware Telco Cloud Automation dashboards List the components of the VMware Telco Cloud Automation dashboards Explain the features of fault management in VMware Telco Cloud Director Describe the use of fault management in VMware Cloud Director Describe the use of performance management in VMware Cloud Director Describe the use of logs in VMware Cloud Director Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry