MS PowerPoint is really easy, but in this PowerPoint Training Courses, we cover most aspects in a fast-paced day, and attend the to more tricky aspects. This course is one-to-one to attend to specific aspects per delegate. Group training could be organised on request.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text
We run regular First Aid at Work public courses or we can bring our training to you. Includes complimentary annual refresher video training.
ACCA Qualification is designed to provide the accounting knowledge, skills and professional values which will deliver finance professionals who are capable of building successful careers across all sectors, whether they are working in the public or private sectors, practicing in accounting firms, or pursuing a career in business. The ACCA Qualification is your route to professional status. Making a decision to study ACCA courses at Osborne Training will be one of the biggest decision you would make for your career. Assessment is by external examination. You must pass all the exams to be ACCA qualified. Once you finish all exams successfully, you will be awarded with ACCA certificate. Paper F1 Accountant in Business Paper F2 Management Accounting Paper F3 Financial Accounting (INT) Paper F4 Corporate and Business Law (UK) Paper F5 Performance Management Paper F6 Taxation (UK) Paper F7 Financial Reporting (INT) Paper F8 Audit and Assurance (INT) Paper F9 Financial Management
MS Word Advanced Course summary This MS Word Advanced Course, Private 1-to-1, covers advanced MS Word tools. Ideal for delegates who create long documents, manuals and manuscripts. MS Word styles and formats, help making formatting documents consistent and easy to maintain. Who Should Attend the MS Word Advanced Course: Delegates should have a working knowledge of the concepts covered in the Introduction and Intermediate courses. What is MS Word: Microsoft Word, or simply Word, is a word processing software package developed by Microsoft. Is is bundled within the Microsoft Office suite. It covers simple text editor capability through to desktop publishing features, suitable to creates professional documents for any purpose MS Word Advanced Course description Session 1:Managing and Reviewing Documents Using Comments Tracking changes, version control Session 2: Styles Creating an Outline Style Principles, Style Themes, Creating, Modifying, Using Styles, Styles menus and Styles Group on the Home Ribbon. Session 3: Sections Formatting, page layouts, page numbering, headers and footers with sections Session 4:MS Word Tables and Text Boxes Inserting, Editing, Formatting and positioning MS Word Tables and Text Boxes Session 5: MS Word Reference Tools Table of Contents References within a Document Bibliography Index Tabls Reference Tables References to Other Documents Session 6: MS Word Templates Creating, saving and using custom templates Session 7: Templates and Building Blocks Using Building Blocks and Quick Parts, Fill-In Merge for Templates Session 8: Graphics Creating Graphics, Equations and Charts, Using WordArt, Using SmartArt Session 9: MS Word Time Saving Tools MS Word Time Saving Tools Using Language Tools Inserting Pre-Defined Text Using the Navigation Pane What is included in the MS Word Advanced Courses: MS Word Advanced Course Certificate on completion MS Word Advanced Course notes Practical MS Word Advanced Course exercises, MS Word Advanced Course Homework / MS Word Advanced Course Revision work After the course, 1 free session for questions online MS Word Advanced Course via Gotomeeting.com. Max group size, online and in classroom, on this MS Word Advanced Course is 4.
The Power of Self Esteem | Register here to attend a Taster 'You Yourself As Much As Anybody In The Entire Universe deserve Your Love and Affection' Self-esteem is our idea of our own basic worth, and it has its roots in our childhood. Early on, our self worth is associated with how others see us or it is linked with our achievements. No matter what we do in life, we can still feel disappointed because our self-esteem depends on others or on what we perceive as our successes or failures. Find out how you can change this! This taster event introduces you to a 2-day Course with MTL Licensed Facilitators, Champions and Coaches Issy Crocker & Pam Barmby which is taking place in March 2024. In a warm and supportive atmosphere the course teaches you simple and practical tools. Audio material summarizes each session, so you can continue to apply what you learned after the course is over. If you engage in Continuing Professional Development this course counts up to 18 CPD hours. You will receive a certificate after we receive your completed post-course evaluation. This course forms part of The More To Life Programme. Course Dates: Sat 2- Sun 3 March 2024 | 9am - 7pm (BST) Location: Wadsworth Community Centre, Billy Lane, Old Town, Hebden Bridge, West Yorkshire HX7 8RY If you want to find out more, contact: Issy.crocker@moretolife.org or phone 07832 288439 or pam.barmby@moretolife.org or phone 07484 215770 If you want to register for the course before attending the Taster, please complete this form https://form.jotform.com/230802833166352
Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric
Java Front-ends for desktop and mobile With Java FX Programming Java Front-ends for desktop and mobile With Java FX In this course we create attractive, functional Front-ends using JavaFX. Prerequisites: Delegates already have basic Java Skills. Duration: 2 consecutive days, the first date shows as the booking date Where: Online with Gotomeeting.com Download: Download Java JDK and Eclipse IDE. London classroom: on request locations, bring you own device Location: Online Interactive Instructor-led Webinar. Our Style: This is a very practical course giving you hands-on practice. Included: Course exercises, notes, examples, computers, evaluations Certification: PCWorkshops JavaFX Qualification Java Intermediate and Front-end Course Description Database Concepts Revision: DataBase SQL, database principles and JDBC GUI's with Java FX Building Java FX GUI's Course Contents: GUI's with JavaFX Building Java GUI's. Create a front-end form interface for an application. Working with nodes, labels, inputboxes, prgress bars, etc. Formatting your front-end. Import a Java package to interact with the front-end. Interact with a database via the front-end. Practical Examine the Java SE event model. What is an event. What is event handling. Develop event handlers. Develop Lambda-style event handlers. Practical Create a quotation app. Create a movie booking app. How to create your installer and upload your app Webservices Java Web services What are Web Services? Why Java Web Services? Web Services - Characteristics Web Services - Architecture Web Services - Examples and exercises What is included PCWorkshops Course Certificate on completion Java Course Notes Java Code Examples Practical Java Course exercises, Java Course Revision work After the course: 1-Hour personalised online revision session Book the Java Intermediate and Front-end Course Powered by Eventbrite About us Our experienced trainers are award winners. More about us FAQ's Client Comments