This accredited qualification is ideal for anyone who requires training in conflict management. It is appropriate for a wide range of sectors and is suitable for anyone who has a customer facing role, dealing with service users or the public. It is also a useful qualification for individuals who would like a better understanding of how to prevent conflict situations from arising and feel more confident in being able to deal with situations if they arise. Subjects covered include the role of communication and the assessment of risks in conflict situations and follow up practices after such events. How long will it take me to achieve this qualification? This qualification is usually achieved by taking a 2 day course. How is the qualification assessed? The qualification is assessed through a 1 hour, 30-question, multiple-choice question examination. Candidates must achieve a score of at least 20 out of 30 in order to pass.
About UX Academy: UX Academy provides live online hands-on training to help you take the next step in your career no matter what level you’re at. Offering Beginner, Intermediate UX courses, Product Design, Strategy and Voice Design developed in collaboration with Amazon.
Duration 5 Days 30 CPD hours This course is intended for Cisco Unified Communications system channel partners and resellers. • System and technical support engineers. • Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: • Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. • Apply advanced scripting principles using the expression editor and custom functions and implement silent monitoring and recording. • Understand Cisco Finesse administration and how to set up reason/wrap-up codes, desktop layout, custom variables, and workflow applications and implement Finesse IP Phone Agent. • Understand and implement VoiceXML applications and configure access to an external database via the VXML Server. • Understand the concepts behind translation routing to include when, why, and how to implement translation routing in a Cisco Unified CCE or traditional ICM environment. • Implement Cisco Unified CCE Options including Cisco Outbound dialing, Courtesy Callback, Agent Greeting/Whisper announcements, and Mobile Agent. • Understand advanced CUIC reporting concepts including administration, importing reports, and custom reporting. Helps prepare learners to implement more advanced functions and options in the Cisco Unified CCE environment. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Implementing Business Rules Lesson 1: Advanced Scripting and Routing Lesson 2: ICM Scripting Variables, Expressions, Formulas and Functions Lesson 3: Silent Monitoring and Recording Lesson 4: Advanced CVP Configurations Using Finesse Administration Lesson 1: Finesse Overview Lesson 2: Finesse Administration Lesson 3: Finesse IP Phone Agent Using CVP VoiceXML Applications Lesson 1: Basic VoiceXML Functionality Lesson 2: Using Call Studio Lesson 3: ICM Scripting for VoiceXML Applications Translation Routing Lesson 1: Traditional Translation Routing Lesson 2: Translation Routing to CVP Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Courtesy Callback Lesson 3: Agent Greeting/Whisper Announcements Lesson 4: Mobile Agent CUIC Reporting for the Advanced User Lesson 1: CUIC Overview Lesson 2: CUIC Administration Lesson 3: Importing and Using CVP Reports Lesson 4: Custom Reporting
Duration 3 Days 18 CPD hours This course is intended for Security architects Design engineers Network engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks. Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications. Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation. Describe how to configure access for non-supplicant devices in an 802.1X deployment. Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X. The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco© Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X?based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. Describing Cisco Identity-Based Networking Services Cisco IBNS Overview Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS Compare Cisco IBNS and Cisco ISE Solutions Explore Cisco IBNS Architecture Components Explore Cisco TrustSec Describing 802.1X EAP Authentication Explore the IEEE 802.1X Standard Explore 802.1X and EAP Explain EAP Methods Describe the Role of RADIUS in EAP Communications Configuring Devices for 802.1X Operation Identify 802.1X Components and Topologies Configure Cisco Catalyst Switch for 802.1X Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch Configure Cisco WLC for 802.1X Configure Cisco ISE for 802.1X Configure Supplicants for 802.1X Operation Configuring Access for Non-Supplicant Devices Configure Cisco IBNS for Non-Supplicant Devices Explore IBNS 2.0 for Non-Supplicant Devices Configure Cisco Central Web Authentication for Guests Designing Cisco IBNS Networks with Cisco ISE and 802.1X Cisco ISE Architectural Components Introducing the Cisco ISE Bring Your Own Device (BYOD) Process Identify Cisco ISE Deployment Options Identify Component Compatibilities with 802.1X Review 802.1X Design Considerations
Duration 2 Days 12 CPD hours This course is intended for Develop for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7.1x in an on-premises environment. Potential students include administrators, engineers, and architects designing or deploying Citrix Virtual Apps and Desktops workloads on Microsoft Azure. Overview Prepare the Azure environment for secure integration with Citrix Virtual Apps and Desktops Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services Integrate Citrix Cloud and Citrix Virtual Apps and Desktops with Microsoft Azure Active Directory Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azur Students learn to deploy and manage the Citrix Virtual Apps and Desktops apps and desktops in Microsoft Azure. Students gain the skills to plan the machine catalog and virtual machine design based in Microsoft?s public cloud and get hands-on practice deploying those machines using Machine Creation Services. Students will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, students will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix Virtual Apps and Desktops sites. Citrix Virtual Apps and Desktops on Azure Overview Defining IAAS Citrix Virtual Apps and Desktops Azure Deployment Models Azure Fundamentals Review Azure Management Azure Locations Citrix Virtual Apps and Desktops Integration with Azure Active Directory Active Directory Basics Active Directory Usage Connecting On-premises Active Directory to Azure Azure Role Based Access Control Connecting to Microsoft Azure Azure Connectivity Cloud Connectors in Azure Creating Citrix Virtual Apps and Desktops Host Connections to Azure Deploying Apps and Desktops using Machine Creation Services Master Image Preparation Machine Creation Services in Azure Considerations for Deploying onto Azure Providing Access to End Users StoreFront Locations Citrix ADC Locations Multiple Citrix Virtual Apps and Desktops Zones in Azure Regions Maintaining Infrastructure and VDAs in Microsoft Azure Maintaining Infrastructure Maintaining Resources Power Management Plan for a Successful POC Planning your next steps
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore
Our Level 2 Award in Moving People Safely (RQF) has been designed specifically for those who work or intend to work in a profession that requires assisting and moving people. It is perfect for those who work in a variety of health and social care settings, such as care homes.
The aim of this course is to provide an overview of Agile approaches to product development. It explains what Agile is and when and why to use it. The scope of the programme includes: The course emphasises the collaborative nature of Agile and the flexibility it offers to customers. The principal training objectives for this programme are to help participants understand: Why and when to use Agile How to use Agile The roles involved in Agile development The cultural factors to take into account How to manage Agile developments 1 Introduction (Course sponsor and trainer) Why this programme has been developed Review of participants' needs and objectives 2 Background to Agile Issues with traditional approaches to product development How Agile helps Roots of Agile Agile lifecycles Product v project 3 How Agile works The Agile Manifesto Agile principles Process control: defined v empirical Different Agile methods The Scrum framework DSDM Atern 4 Managing Agile When to use Agile Managing Agile projects Team organisation 5 Agile techniques Daily stand-ups User stories Estimating MoSCoW prioritisation 6 Course review and action planning (Course sponsor present) Are there opportunities to use Agile? What actions should be implemented to adopt Agile? Conclusion
Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities