Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Networking is one of the most important skills that one should have for success. Networking is like branding yourself and making others informed that you're capable. Without proper networking, your potential and capabilities remain unknown to others. So, it's important to master the skills of networking to kickstart a better career. This Personal / Business Networking Skills For Maximum Success Course is designed to teach you the strategies and techniques of effective networking so that you can succeed in your personal and professional life. What you'll learn Powerful Networking Tools & Strategies - Unique! Learn How the Law Of Reciprocity Can Work For You Learn the Power of the 'Likeability Factor' Hot / Targeted Places to Network Best Online Networking Strategies For Success Mentors - The Power To Transform Your Life! Who is this Course for? This course a perfect fit for anyone who is looking for learning the skills of networking and effective communication. Requirements Basic / Simple Computer Skills. English speaking knowledge. This course fully compatible with any kind of device. Whether you are using a Windows computer, Mac, smartphone or tablet, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time, without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course and will be equipped with the necessary knowledge and skills required to succeed in this sector. All of our courses are CPD and IAO accredited, so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Personal / Business Networking Skills For Maximum Success! Why Is Networking Powerful? FREE 00:05:00 Networking Paradigm Shifts FREE 00:03:00 You've Got To GIVE To GET 00:08:00 The Power Of 'Likeability' 00:09:00 Making The Connection 00:06:00 Great Places To Network 00:08:00 The Power Of Mentors 00:06:00
This practical workshop covers the unique challenges of working with complex trauma cases and gives you clear guidance on the most effective ways to help Accredited CPD: 6 hours Length: 1 day (9.30am - 4.00pm) Absolutely jam-packed with techniques/information and resources. Ros is superlative. A calm, confident and articulate trainer...J YAP, THERAPIST Why take this course Clients suffering from Complex PTSD (C-PTSD) or who have experienced trauma in a shutdown or dissociative state, can present unique challenges to practitioners working with them – but with the right knowledge and skills we can help sufferers move forward in their lives. In this hands-on, experiential workshop you will learn more about what makes trauma ‘complex’, why shutdown or dissociation are often experienced by sufferers, and how to best work with such presentations using the Human Givens framework of understanding. You will also have the chance to collaborate with other experienced practitioners and clinicians during exercises designed to further your understanding, add to your existing skillsets, and bring wider context to an often-misunderstood area of work. During this intensive day of live, in-person training, experienced psychotherapist Ros Townsend will introduce you to a framework within which you can set your understanding of complex trauma presentations and discover the opportunities that we have to help clients move forward from their difficulties. You will learn more about the neurobiology of the automatic survival options that we have available to us, especially dissociative and ‘shutdown’ states, and leave with an understanding of how to use this knowledge to inform your work, giving you greater confidence to work creatively and flexibly with such presentations. From understanding the symptoms that are now recognised as distinguishing C-PTSD, to adapting existing HG techniques and strategies and introducing new tools and skills, this course will explore how we, as clinicians, can approach such complex presentations without getting lost in the complexity ourselves. Using case histories and discussion you will have the chance to understand more about the unique challenges that such work presents and to leave feeling more confident in your ability as a therapist to work effectively and contextually with these. Such a thought-provoking and informative day. Complex PTSD is a real buzz word at present, this took the mystery out of it in a clear and understandable way – highly recommend...MELISSA DERRICOURT What will you learn What Complex PTSD (C-PTSD) is What other symptoms a client may present with in addition to those meeting the criteria for ‘classic’ PTSD How to effectively work with these within the Human Givens framework of understanding Vital tools for psycho-education – both adding to your own understanding and to pass on to clients Why individuals enter into a dissociative or ‘shutdown’ state The difference between ‘freeze’ and ‘shutdown’ Why anger can present when an individual comes out of a ‘shutdown’ state How to help a client deal effectively with anger if it does arise The crucial role of the pattern-matching processes in the brain in post-traumatic stress symptoms – and how the kinds of templates stored can subtly differ in more complex trauma How to adapt existing techniques – such as rewind and deconditioning molar memories – to work creatively with such presentations The Dos and Don’ts when working with Guided Imagery in complex presentations How to refine your Guided Imagery skillset to powerfully benefit clients who have experienced trauma in a shutdown state Why any work that we do must be informed by the innate ability we all have to recover from trauma How to avoid negatively reframing trauma and making symptoms worse The most effective ways to help clients towards recovery and post-traumatic growth Under careful guidance from the tutor, you will: Explore and discuss the different survival options available to us as humans in traumatic situations Learn more about the neurobiology of these states – including our passive survival responses Develop a new framework of understanding within which to set your work with all kinds of trauma Understand more about why ‘shutdown’ or ‘dissociation’ are often associated with complex presentations Understand why addictions and self-harming behaviours are often a part of the picture Work collaboratively with peers and colleagues to extend and develop your own skillsets and knowledge Explore how guided imagery can be adapted and used to most powerfully benefit clients suffering in this way You will leave with: The confidence to work creatively and flexibly with a wider range of presentations A clear understanding of a framework within which you can work and continue to develop and adapt your tools and skillsets An appreciation of the importance of taking your time with such work and proceeding at a pace right for each individual client An understanding of how to support clients in moving forward from the use of faulty coping strategies – such as addiction and self-harm Greater confidence in creating metaphors that work powerfully for clients An understanding of how helping a client to meet their emotional needs is particularly key to recovery in the most complex cases Throughout the day there will be plenty of opportunity for you to ask questions and to engage in collaborative work and discussion with the tutor and with experienced colleagues and practitioners. Important note Working with Complex PTSD requires specific skills and experience and thus is only suitable for practitioners either already working in this area and looking to extend their skillset or those who are already practicing as therapists and wish to begin working in this area. If you are an experienced practitioner from another modality, we recommend you familiarise yourself a little with the HG approach before you attend, see: About HG therapy, benefits of the approach, and what is RIGAAR. Who is this course suitable for? Any qualified therapist working with distressed or traumatised people. In order to take full benefit from the course, you will ideally have already taken our Guided Imagery and Visualisation for therapeutic change and Rewind Technique workshops. NB If you are an experienced practitioner from another modality, we recommend you familiarise yourself a little with the HG approach before you attend, see: About HG therapy, benefits of the approach, and what is RIGAAR. Any qualified practitioner in the field of psychiatry, psychology, psychotherapy or counselling can attend; again you would benefit most by having previously attended our Guided Imagery and Visualisation and Rewind Technique workshops and familiarising yourself a little with the HG approach to therapy. Course Programme This intense 1-day training proceeds through a blend of talks, skill-developing exercises, discussions and deconstruction of real-life case-studies. There is also plenty of opportunity for networking and discussion during the breaks. The training runs from 9.30am–4.00pm. From 8.30am Registration (Tea and coffee served until 9.25am) 9.30am What is complex trauma? A framework for understanding 11.00am Discussion over tea/coffee 11.30am Adapting our toolkit: working creatively with complex presentations 1.00pm Lunch (included) 1.45pm Self-efficacy: supporting a client to become an active agent in life 2.45pm Discussion over tea/coffee 3.00pm Reframing: adding context in complex cases 3.30pm Serving clients well 4.00pm Day ends This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
Networking: Networking Course Online Many people avoid or are afraid of networking in business. Whether you do not have the time, do not see the point, or are too shy to talk to new people, this Networking: Networking Course will help you understand why networking is important in business and teach you the essential skills to get started. Networking: Networking Course is not a difficult process; with a little practice and knowledge, you can boost your confidence, prepare for a networking event, hold a successful conversation, and maintain a mutually beneficial network of connections. The Networking: Networking Course covers basic knowledge of networking and gradually shares expertise. This Networking: Networking Course will provide you with a comprehensive understanding of networking, including key concepts, strategies for using it. You will also learn how to successfully start, carry and end a conversation. Special Offers of this Networking: Networking Course This Networking: Networking Course includes a FREE PDF Certificate. Lifetime access to this Networking: Networking Course Instant access to this Networking: Networking Course Get FREE Tutor Support from Monday to Friday in this Networking: Networking Course Main Course: Networking Skills Course Courses with Networking: Networking Course Course 01: GDPR Training Course 02: Cyber Security Course Course 03: Communication Skills Course [ Note: Free PDF certificate as soon as completing the Networking: Networking Course] Networking: Networking Course Online Industry Experts Designed this Networking: Networking Course into 04 detailed modules. Detailed course curriculum of the Networking: Networking Course: Module 01: An Overview of Networking Module 02: Preparing to Network Module 03: Overall Process of a Conversation Module 04: Following Up Connections Assessment Method of Networking: Networking Course After completing each module of the Networking: Networking Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Networking: Networking Course After completing the MCQ/Assignment assessment for this Networking: Networking Course, you will be entitled to a Certificate of Completion from Training Tale. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Networking: Networking Course Online Networking: Networking Course is ideal for anyone who wants to learn more about how to network successfully. The Networking: Networking Course is written at an introductory level and will help learners of all disciplines understand how to build confidence, start and maintain a conversation and sustain a network of useful contacts. Requirements Networking: Networking Course Online Students who intend to enrol in this Networking: Networking Course must meet the following requirements: Networking: Good command of the English language. Networking: Must be vivacious and self-driven Networking: Basic computer knowledge. Networking: A minimum of 16 years of age is required Career path Networking: Networking Course Online This Networking: Networking Course qualification will assist candidates to gain skills that will enable them to be considerably more successful in people-facing roles such as field sales professionals and account managers. Certificates Certificate of completion Digital certificate - Included
Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Personal and Networking Skills Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Personal and Networking Skills Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Personal and Networking Skills Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Personal and Networking Skills Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Personal and Networking Skills? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Personal and Networking Skills there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Personal and Networking Skills course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Personal and Networking Skills does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Personal and Networking Skills was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Personal and Networking Skills is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Personal and Networking Skills Why Is Networking Powerful? 00:05:00 Networking Paradigm Shifts 00:03:00 You've Got To GIVE To GET 00:08:00 The Power Of 'Likeability' 00:09:00 Making The Connection 00:06:00 Great Places To Network 00:08:00 The Power Of Mentors 00:06:00
Overview By enroling in IT Administration and Networking, you can kickstart your vibrant career and strengthen your profound knowledge. You can learn everything you need to know about the topic. The IT Administration and Networking course includes all of the most recent information to keep you abreast of the employment market and prepare you for your future. The curriculum for this excellent IT Administration and Networking course includes modules at all skill levels, from beginner to expert. You will have the productivity necessary to succeed in your organisation once you have completed our IT Administration and Networking Program. So enrol in our IT Administration and Networking course right away if you're keen to envision yourself in a rewarding career. Description Enroling in this IT Administration and Networking course can improve your IT Administration and Networking perspective, regardless of your skill levels in the IT Administration and Networking topics you want to master. If you're already a IT Administration and Networking expert, this peek under the hood will provide you with suggestions for accelerating your learning, including advanced IT Administration and Networking insights that will help you make the most of your time. This IT Administration and Networking course will act as a guide for you if you've ever wished to excel at IT Administration and Networking. Why Choose Us? This course is accredited by the CPD Quality Standards. Lifetime access to the whole collection of the learning materials. Online test with immediate results. Enroling in the course has no additional cost. You can study and complete the course at your own pace. Study for the course using any internet-connected device, such as a computer, tablet, or mobile device. Will I Receive A Certificate Of Completion? Upon successful completion, you will qualify for the UK and internationally-recognised CPD certificate and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £4.99 and Hardcopy Certificate for £9.99. Who Is This Course For? This IT Administration and Networking course is a great place to start if you're looking to start a new career in IT Administration and Networking field. This training is for anyone interested in gaining in-demand IT Administration and Networking proficiency to help launch a career or their business aptitude. Requirements The IT Administration and Networking course requires no prior degree or experience. All you require is English proficiency, numeracy literacy and a gadget with stable internet connection. Learn and train for a prosperous career in the thriving and fast-growing industry of IT Administration and Networking, without any fuss. Career Path This IT Administration and Networking training will assist you develop your IT Administration and Networking ability, establish a personal brand, and present a portfolio of relevant talents. It will help you articulate a IT Administration and Networking professional story and personalise your path to a new career. Furthermore, developing this IT Administration and Networking skillset can lead to numerous opportunities for high-paying jobs in a variety of fields. Order Your Certificate To order CPD Quality Standard Certificate, we kindly invite you to visit the following link: Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00 Mock Exam Mock Exam- IT Administration and Networking 00:30:00 Final Exam Final Exam- IT Administration and Networking 00:30:00
Networking in a Virtual World It's easy for meetings and discussions in a virtual environment to become routine, sterile, predictable, or downright boring. Unlike traditional meetings where it's easier to establish rapport, develop relationships and have more personal conversations, the virtual world makes these important personal interactions more difficult, if not impossible. This course will offer practical suggestions and ideas to help groups and project teams establish and maintain rapport as well as keep virtual meetings more interesting and fun. Networking and interacting during virtual meetings can be challenging, but if groups and teams make an effort to incorporate a few basic relationship tactics, those boring virtual meetings can become a thing of the past. What You Will Learn At the end of this program, you will be able to: Identify the typical challenges and limitations of virtual meetings and how to successfully overcome these obstacles Recognize communication options that could help with online interaction during meetings and calls Explain the importance of proactive facilitation techniques to help keep virtual meetings interactive, interesting and fun Incorporate training, coaching, and peer review opportunities into virtual meetings to enhance participant engagement while at the same time developing personnel Getting Started Challenges and realities of a virtual world Various communication options The necessities of effective facilitation and communication Training opportunities Coaching opportunities Peer review opportunities Summary and Next Steps
Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.