Duration 5 Days 30 CPD hours This course is intended for Cisco Unified Communications system channel partners and resellers. • System and technical support engineers. • Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: • Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. • Apply advanced scripting principles using the expression editor and custom functions and implement silent monitoring and recording. • Understand Cisco Finesse administration and how to set up reason/wrap-up codes, desktop layout, custom variables, and workflow applications and implement Finesse IP Phone Agent. • Understand and implement VoiceXML applications and configure access to an external database via the VXML Server. • Understand the concepts behind translation routing to include when, why, and how to implement translation routing in a Cisco Unified CCE or traditional ICM environment. • Implement Cisco Unified CCE Options including Cisco Outbound dialing, Courtesy Callback, Agent Greeting/Whisper announcements, and Mobile Agent. • Understand advanced CUIC reporting concepts including administration, importing reports, and custom reporting. Helps prepare learners to implement more advanced functions and options in the Cisco Unified CCE environment. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Implementing Business Rules Lesson 1: Advanced Scripting and Routing Lesson 2: ICM Scripting Variables, Expressions, Formulas and Functions Lesson 3: Silent Monitoring and Recording Lesson 4: Advanced CVP Configurations Using Finesse Administration Lesson 1: Finesse Overview Lesson 2: Finesse Administration Lesson 3: Finesse IP Phone Agent Using CVP VoiceXML Applications Lesson 1: Basic VoiceXML Functionality Lesson 2: Using Call Studio Lesson 3: ICM Scripting for VoiceXML Applications Translation Routing Lesson 1: Traditional Translation Routing Lesson 2: Translation Routing to CVP Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Courtesy Callback Lesson 3: Agent Greeting/Whisper Announcements Lesson 4: Mobile Agent CUIC Reporting for the Advanced User Lesson 1: CUIC Overview Lesson 2: CUIC Administration Lesson 3: Importing and Using CVP Reports Lesson 4: Custom Reporting
Duration 3 Days 18 CPD hours This course is intended for Security architects Design engineers Network engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks. Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications. Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation. Describe how to configure access for non-supplicant devices in an 802.1X deployment. Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X. The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco© Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X?based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. Describing Cisco Identity-Based Networking Services Cisco IBNS Overview Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS Compare Cisco IBNS and Cisco ISE Solutions Explore Cisco IBNS Architecture Components Explore Cisco TrustSec Describing 802.1X EAP Authentication Explore the IEEE 802.1X Standard Explore 802.1X and EAP Explain EAP Methods Describe the Role of RADIUS in EAP Communications Configuring Devices for 802.1X Operation Identify 802.1X Components and Topologies Configure Cisco Catalyst Switch for 802.1X Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch Configure Cisco WLC for 802.1X Configure Cisco ISE for 802.1X Configure Supplicants for 802.1X Operation Configuring Access for Non-Supplicant Devices Configure Cisco IBNS for Non-Supplicant Devices Explore IBNS 2.0 for Non-Supplicant Devices Configure Cisco Central Web Authentication for Guests Designing Cisco IBNS Networks with Cisco ISE and 802.1X Cisco ISE Architectural Components Introducing the Cisco ISE Bring Your Own Device (BYOD) Process Identify Cisco ISE Deployment Options Identify Component Compatibilities with 802.1X Review 802.1X Design Considerations
Duration 2 Days 12 CPD hours This course is intended for Develop for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7.1x in an on-premises environment. Potential students include administrators, engineers, and architects designing or deploying Citrix Virtual Apps and Desktops workloads on Microsoft Azure. Overview Prepare the Azure environment for secure integration with Citrix Virtual Apps and Desktops Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services Integrate Citrix Cloud and Citrix Virtual Apps and Desktops with Microsoft Azure Active Directory Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azur Students learn to deploy and manage the Citrix Virtual Apps and Desktops apps and desktops in Microsoft Azure. Students gain the skills to plan the machine catalog and virtual machine design based in Microsoft?s public cloud and get hands-on practice deploying those machines using Machine Creation Services. Students will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, students will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix Virtual Apps and Desktops sites. Citrix Virtual Apps and Desktops on Azure Overview Defining IAAS Citrix Virtual Apps and Desktops Azure Deployment Models Azure Fundamentals Review Azure Management Azure Locations Citrix Virtual Apps and Desktops Integration with Azure Active Directory Active Directory Basics Active Directory Usage Connecting On-premises Active Directory to Azure Azure Role Based Access Control Connecting to Microsoft Azure Azure Connectivity Cloud Connectors in Azure Creating Citrix Virtual Apps and Desktops Host Connections to Azure Deploying Apps and Desktops using Machine Creation Services Master Image Preparation Machine Creation Services in Azure Considerations for Deploying onto Azure Providing Access to End Users StoreFront Locations Citrix ADC Locations Multiple Citrix Virtual Apps and Desktops Zones in Azure Regions Maintaining Infrastructure and VDAs in Microsoft Azure Maintaining Infrastructure Maintaining Resources Power Management Plan for a Successful POC Planning your next steps
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore
This course presents the role of the care worker using demonstrations of good and bad practices. It includes information on Core Values, Code of Conduct, and Continual Professional Development. This subject forms Standard 1 of the Care Certificate.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application
Instructor training enables companies to have their own AITT Forklift Instructor. On completion they are able to instruct and examine operators on company premises. Also it could be an opportunity for an individual to embark upon a rewarding career as a recognised AITT instructor. The course complies with the approved code of practice issued by the Health & Safety Executive. We offer the AITT Instructor training course at our training centre in Warrington, Cheshire. We use all the best tools and equipment to assist trainee development. Our Instructor’s Mike Hammett and Stephen McCann have a lot of experience in this course, both have very good success rates and offer alot of after care too! Once an Instructor has passed their AITT Instructor training course they can always come back and receive professional advice. We always go the extra mile! AITT Accredited Novice Course: The Instructor training course caters for candidates seeking to become an AITT Registered Instructor. Previous fork lift experience is strongly recommended and candidates must have a current counterbalance certificate dated within 36 months prior to the course start date. Refresher courses are available prior to the instructor course extending the duration by one day to 11 days. Objectives: On successful completion of the course the candidate will be qualified to teach and train on all Industrial Counterbalance and Reach trucks for which they are certificated to use as operators. Target Group: The employer should carefully select the correct person for the job as an instructor. They should be literate and numerate with good presentation skills. The AITT recommend that candidates have a minimum of 12 months operating experience before attending the course. During the course candidates will be progressively assessed in all key areas. Candidates therefore must have a good knowledge of each subject and are provided with some excellent materials to assist them on completion of the course. AITT Instructor Training Course Duration: 3 or 5 days for Re-qualification or Re-Registration courses. 5 days for Assimilation Courses. 10-12 days for the Novice AITT instructor training course. Contents: Principles of instruction. Instructional techniques. HASAWA 1974/PUWER 1998/LOLER 1998/L117. Setting up courses. Administering the tests etc. All original documentation supplied by examining body and HSE. Prices are available on request and should you require any further information please do not hesitate to contact us. We also offer In-House Instructor training to suit companies needs and these are of five day durations, please contact for further details. Please feel free to download our Course Syllabus’s below and decide which course best meets your needs. See Mike at work demonstrating a lesson of De-stacking from High Level. In-House Courses: These courses are aimed at companies wishing to use their own Instructors to train staff. IN-HOUSE BASIC INSTRUCTOR COURSE PDF AITT Instructor Training Courses: On completion of these courses candidates will be registered as an AITT Instructor and be able to train on anything they are currently qualified to operate. Courses vary depending on experience and current qualifications so please have a look at the following courses to see which suits best. More information is available at www.aitt.co.uk.
(4-6yrs) Mini Movers is an introduction to more structured ballet dance and movement based class. The session includes Ballet and an introduction to JazzPops. TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
Duration 3 Days 18 CPD hours This course is intended for Application developers who want to build cloud-native applications or redesign existing applications that will run on Google Cloud Platform Overview This course teaches participants the following skills: Use best practices for application development. Choose the appropriate data storage option for application data. Implement federated identity management. Develop loosely coupled application components or microservices. Integrate application components and data sources. Debug, trace, and monitor applications. Perform repeatable deployments with containers and deployment services. Choose the appropriate application runtime environment; use Google Container Engine as a runtime environment and later switch to a no-ops solution with Google App Engine flexible environment. Learn how to design, develop, and deploy applications that seamlessly integrate components from the Google Cloud ecosystem. This course uses lectures, demos, and hands-on labs to show you how to use Google Cloud services and pre-trained machine learning APIs to build secure, scalable, and intelligent cloud-native applications. Best Practices for Application Development Code and environment management. Design and development of secure, scalable, reliable, loosely coupled application components and microservices. Continuous integration and delivery. Re-architecting applications for the cloud. Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK How to set up and use Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK. Lab: Set up Google Client Libraries, Cloud SDK, and Firebase SDK on a Linux instance and set up application credentials. Overview of Data Storage Options Overview of options to store application data. Use cases for Google Cloud Storage, Cloud Firestore, Cloud Bigtable, Google Cloud SQL, and Cloud Spanner. Best Practices for Using Cloud Firestore Best practices related to using Cloud Firestore in Datastore mode for:Queries, Built-in and composite indexes, Inserting and deleting data (batch operations),Transactions,Error handling. Bulk-loading data into Cloud Firestore by using Google Cloud Dataflow. Lab: Store application data in Cloud Datastore. Performing Operations on Cloud Storage Operations that can be performed on buckets and objects. Consistency model. Error handling. Best Practices for Using Cloud Storage Naming buckets for static websites and other uses. Naming objects (from an access distribution perspective). Performance considerations. Setting up and debugging a CORS configuration on a bucket. Lab: Store files in Cloud Storage. Handling Authentication and Authorization Cloud Identity and Access Management (IAM) roles and service accounts. User authentication by using Firebase Authentication. User authentication and authorization by using Cloud Identity-Aware Proxy. Lab: Authenticate users by using Firebase Authentication. Using Pub/Sub to Integrate Components of Your Application Topics, publishers, and subscribers. Pull and push subscriptions. Use cases for Cloud Pub/Sub. Lab: Develop a backend service to process messages in a message queue. Adding Intelligence to Your Application Overview of pre-trained machine learning APIs such as Cloud Vision API and Cloud Natural Language Processing API. Using Cloud Functions for Event-Driven Processing Key concepts such as triggers, background functions, HTTP functions. Use cases. Developing and deploying functions. Logging, error reporting, and monitoring. Managing APIs with Cloud Endpoints Open API deployment configuration. Lab: Deploy an API for your application. Deploying Applications Creating and storing container images. Repeatable deployments with deployment configuration and templates. Lab: Use Deployment Manager to deploy a web application into Google App Engine flexible environment test and production environments. Execution Environments for Your Application Considerations for choosing an execution environment for your application or service:Google Compute Engine (GCE),Google Kubernetes Engine (GKE), App Engine flexible environment, Cloud Functions, Cloud Dataflow, Cloud Run. Lab: Deploying your application on App Engine flexible environment. Debugging, Monitoring, and Tuning Performance Application Performance Management Tools. Stackdriver Debugger. Stackdriver Error Reporting. Lab: Debugging an application error by using Stackdriver Debugger and Error Reporting. Stackdriver Logging. Key concepts related to Stackdriver Trace and Stackdriver Monitoring. Lab: Use Stackdriver Monitoring and Stackdriver Trace to trace a request across services, observe, and optimize performance.
Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities