• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

53656 Courses

Insights Discovery® – Sales Effectiveness

5.0(1)

By CP Training Services

We use the Insights Discovery® Personality profiling model, which adds a simple visual methodology that supports effective communication. Revitalise and inspire your sales team to a higher level of performance. Help your sales people be more effective at every stage of the sale. Build customer relationships quickly and effectively... Our Sales Effectiveness programme is ideal if you want to; assess the strengths and challenges of your sales people understand your sales team's style and how it impacts on customer relationships develop your sales team's interpersonal skills Insights Discovery - How it Works: Through Insights Discovery® and our own, in-house Insights Discovery® licenced practitioner, we use the Insights Discovery model to understand an individual’s unique preferences. Our Insights Discovery-based people development programmes are simple and deeply insightful. They provide immediate impact and enable positive, lasting change. Insights Discovery® is: Simple: easy to understand so everyone can apply what they learn. Universal: it speaks to everyone at all levels. Deeply Insightful: take you places you never expected. Positive: the supportive language is so engaging it empowers people to change. Fun! The memorable colour energy system that really sticks Using Insights Discovery® as part of a wider programme: Insights Discovery® is at the heart of everything that we do. This simple framework of four colour energies can be used to develop highly-tailored solutions to meet your unique business needs. Example solutions: Increasing communication and collaboration: learn how your team, department or organisation can work together more effectively in a series of Insights Discovery® Workshops. Improving personal effectiveness: as part of a programme of coaching, Insights Discovery can be used to identify areas of strength and help create a development plan tailored to each individual. Developing leaders and sales people: use an understanding of preferences to assess individual and collective strengths and enhance crucial business skills. Explore the concept of change and gain an understanding of the process Understand how different personality types respond to change Engage the wider organisation by building relationships with staff Motivate teams through change

Insights Discovery® – Sales Effectiveness
Delivered In-Person in Upminster or UK WideFlexible Dates
Price on Enquiry

Swim Sharks Academy

By Baby Sharks

School age children can enroll onto our Beginners, Intermediate or Advance Level swimming lessons. At the majority of these lessons, the teacher is in the water for best teaching practice and support. At Beginners Level, an assistant may help in the water. At more Advance Level, the teacher may instruct and supervise the group lesson from poolside. Nervous swimmers are introduced to move around the pool with buoyancy aids in a group. Your teacher will help your child to develop confidence and submerge the face in the water from the first lesson.

Swim Sharks Academy
Delivered In-Person in Dinnington + 2 moreFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

NPORS Ride On Road Roller Training

5.0(3)

By Vally Plant Training

NPORS Ride On Roller Training The aim of the NPORS Ride On Roller Training is to provide both theoretical and practical training in the safe and efficient use of the ride on roller . On successful completion of the ride on road roller training you will be issued with the NPORS identity card with or without the CSCS logo. Discounts are available for multiple bookings NPORS Ride on road Roller Training or testing can be carried out on your site nationwide or at our Training Centre in Gloucestershire Ride On Roller Experienced Worker Test Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Ride On Roller Experienced Test Price Match Promise. When you choose us, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Road Roller Experienced Worker Test, we’ll match it—ensuring you receive top-quality training at the best possible rate. Click for our terms and conditions Your skills, our commitment—always at the best price. NPORS Ride On Roller Test is for operators who have received some form of training in the past or alternatively has been operating the Ride On Road Roller for a period of time. If you are unsure if you qualify to go down the test route please contact us to discuss this in more detail. Turn your Ride On Roller red card to blue with our hassle free Roller NVQ, for more information CLICK HERE Ride On Roller Course Content The course time is spent on developing skills and knowledge associated with the road roller. Topics covered include:- Site Safety Awareness. Operating Safety Code. Introduction to machine / Control Familiarisation. Pre-Start Checks and Refuelling. General Operating. Set the roller for compaction duties Explain actions required for hazards underground and overhead services Recognise compacted/uncompacted areas Conditions that may cause instability of the roller Safety procedures when working up to unsupported edges. Park and shut down procedures. NPORS Multi-Choice Theory Test. NPORS Practical Skills Test. Variations Pedestrian Roller Ride on articulated Ride on rigid Ride on heavy duty Ride on vibrating Dead weight Ride on articulated/vibrating Ride On Road Roller Training Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of Ride On Road Rollers and the construction industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical road roller training area to simulate an actual working environment. Our Ride On Roller training and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS Roller Tester to your site nationwide, to reduce the amount of time away from work Frequently Asked Questions 1. Who should take the Ride On Road Roller Training? This training is ideal for individuals who need to operate ride-on road rollers, both novices and experienced operators. 2. What does the Ride On Road Roller Training cover? The course includes site safety awareness, machine control familiarization, pre-start checks, operating techniques, recognizing hazards, compaction procedures, and safety protocols. 3. How long is the Ride On Road Roller Training? For novices, the course lasts 3 days. Experienced operators can take a 1-day test. 4. What certification do I receive upon completion? Participants receive an NPORS card, either the traditional card valid for 5 years or the NPORS card with CSCS logo, valid for 2 years initially. 5. Are there any prerequisites for the Ride On Road Roller Training? Candidates should understand English. For the NPORS card with CSCS logo, a CSCS Health & Safety test must have been completed within the last two years. More courses: Refine your skills with our Lift Supervision Training, Slinger Signaller Training, Telehandler Training, Cat & Genny Training, Scissor Lift, Slinger Signaller, Abrasive Wheels Training, Lorry Loader Training and Telehandler Training. Elevate your expertise for safer and more efficient operations in construction and logistics. Join us today to advance your career prospects. For those looking for a “NPORS Scissor Lift Training near me,” our widespread operations make it convenient for you to access Vally Plant Trainings top-quality training no matter where you are in the UK

NPORS Ride On Road Roller Training
Delivered In-Person in Tewkesbury or UK WideFlexible Dates
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

Access to Payroll | Sage Payroll Courses

By Osborne Training

Payroll courses in London | Online Courses | Distance Learning Course Overview: Broken down into practical modules this course is a very popular and well-received introduction to moving from manual payroll to computerised payroll, and it incorporates all the new government requirements for RTI reporting Payroll is a vital role within any organisation. A career in payroll means specialising in a niche field with excellent progression opportunities. What support is available? Free high-quality course materials Tutorial support Highly equipped IT lab Student Discount with NUS card Exam fees and exam booking service Personalised individual study plan Specialist Career Management service State of the Art Virtual Learning Campus Free Sage Payroll Software Duration 6 Weeks Study Options Classroom Based - Osborne Training offers Daytime and Weekend sessions for Payroll Training Course from London campus. Online Live - Osborne Training offers Live Online sessions for Sage Payroll Training Classes through the Virtual Learning Campus. Distance Learning - Self Study with Study Material and access to Online study Material through Virtual Learning Campus. Benefits for Trainees Sage Payroll Qualifications open new doors to exciting careers, as well as extending payroll skills if you are currently employed. State of the Art Virtual Learning Campus Start your own payroll bureau Work in small businesses A payroll career can lead to great things Update your knowledge of Sage payroll Improve your employability prospects A career path into payroll Ideal Continuing Professional Development course Gain a qualification to boost your CV Option to gain IAB accredited qualification Start your training immediately without having to wait for the new term to begin Certification You will receive a certificate from Osborne Training once you finish the course. You have an option to get an IAB Certificate subject to passing the IAB exam or Sage certified exam. Syllabus Advanced processing of the payroll for employees Preparation and use of period end HMRC forms and returns preparation of internal reports Maintaining accuracy, security and data integrity in performing payroll tasks. Deductions - Pension schemes and pension contributions Processing the payroll -complex income tax issues Processing Payroll Giving Scheme Processing Statutory Adoption Pay (SAP) Advanced Income tax implications for company pension schemes Student Loan repayments Processing Holiday Payments Processing Car Benefit on to the Payroll System Attachment of Earnings Orders & Deductions from Earnings Orders Leavers with complex issues Advanced processing of statutory additions and deductions Recovery of statutory additions payments - from HMRC Completing the processing of the payroll Complex Reports and payments due to HMRC Introduction to Auto-enrolment Cost Centre Analysis Advanced, routine and complex payroll tasks Calculation of complex gross pay

Access to Payroll | Sage Payroll Courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Discipline and Grievance

By Underscore Group

Our course empowers you to handle workplace issues effectively and fairly. Learn best practices, procedures, and communication skills to maintain a harmonious and compliant workplace. Course overview Duration: 1 day (6.5 hours) This course will enable participants to manage disciplinary and grievance issues effectively. The emphasis is on the use of a structured approach where positive action and problem-solving is highlighted as a priority. The course will build knowledge, skill and confidence in handling these areas objectively, fairly and appropriately in line with policies/procedures, best practice and legal requirements. Objectives  By the end of the course you will be able to: Describe the purpose of disciplinary and grievance procedures and how these relate to relevant laws and other procedures Know your role as managers in fairly and consistently applying the procedures at the informal and formal stages Explain the grounds for disciplinary or grievance action and the need to collect, assess and present evidence Describe the structure and roles of disciplinary meetings Explain of the basis for reaching fair and reasonable decisions and possible remedies and penalties Describe the grounds and procedure for appeals Content Disciplinary Procedures Employment Contract – what an employee and employer expect and how to manage when broken. Natural Justice – ensuring ‘fair play’. Misconduct v Capability - what is the difference and which process should be used to manage both. Informal v Formal Action – understanding the processes for both informal and formal disciplinary actions. Suspensions – when, why and how to suspend an employee. Investigations – how to undertake a robust investigation and what to include in the report. Disciplinary Meeting – how to conduct the meeting, the different roles involved. Appeals – understanding how people can appeal and the process to appeal. Grievance Procedures What the law requires – what are the legal requirements for handling a grievance. Informal v Formal Action – understanding the processes for both informal and formal grievance procedures. Conducting the hearing – how to undertake a robust hearing and who should be involved. Appeals - how can people appeal and what is the process.

Discipline and Grievance
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Project Planning and Control

By Underscore Group

Learn how to use Microsoft Project to create and resource robust project plans and how to maintain and track throughout the project lifecycle. Course overview Duration: 1 day (6.5 hours) Our Project Planning and Control course gives you the essential skills to use Microsoft Project to build, resource and monitor project schedules. It looks at initial setup, building plans, using a work breakdown structure and managing resources through to baselining and progressing your schedule. This course is designed for new or existing users of Microsoft Project, and no previous experience of Project is required. Knowledge of planning techniques would be an advantage. Objectives  By the end of the course you will be able to: Create project schedules Build a Work Breakdown Structure Create relationships Set baselines Manage resources Set deadlines and task properties Print and report on your project Update and track project schedules Content Creating a new project Project defaults Project start date Setting default hours per day/week Setting daily working times Project timeline Building a project Creating a work breakdown structure Adding tasks and durations Estimated durations Setting milestones Recurring tasks Linking, Baselining and Resourcing Setting start dates and dependencies Task Inspector Resourcing Assigning resources Filtering available resources Baseline Setting a baseline Removing a baseline Managing resources Resource properties Dealing with over allocations Tasking information Constraint dates Setting deadline Assigning task specific calendars Task types Updating your project Completing work Completing work per resource Updating tasks Updating the project Rescheduling work Change highlighting Printing and reporting Setup and Printing Visual reports Using the Timeline Creating Dashboard reports

Project Planning and Control
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry