1 Day Emergency First Aid Description: The 1 Day Emergency First Aid at Work course is nationally recognised. It meets the standards required to help comply with Health and Safety (First aid) regulations. This one-day course will help you meet your regulatory requirements if your risk assessment indicates that first aid training covering emergency protocols only, is sufficient for your workplace.It is especially suited for nominated first aiders in smaller or a low risk working environment. Cardio Pulmonary Resuscitation and care of the unconscious requires physical effort. Learners should be capable of working with casualties at floor level. Learners receive an Emergency First Aid guide book, a training dressing and a CPR barrier protection device. The HSE strongly recommend that all First Aiders undertake annual refresher training of at least 3 hours per year. Syllabus Care of the unconscious casualty Method of resuscitation Wound & bleeding Bandaging What to do in an emergency Accident reporting Other work related accidents/illnesses Scenarios Cost: £107.00 + VAT
With us, learn Classic, Hybrid & volume lashes (with pre made fans) unlike other training academy's! FULL KIT INCLUDED! Suitable for: Complete beginners Models: 1 live model during training day Whats Covered: Introduction to eyelash extensions Health & safety & hygiene Skin analysis Anatomy of the eye Lash mites Hair growth & anatomy Check list Styles of lashes What effects lashes Contraindications Pre/post treatment advice Equipment and products Consultation Application Removal Trouble shooting And so much more! Course extras: Basic business start up support Social media tips Ongoing support Lifetime aftercare
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is database professionals who need to fulfil a Business Intelligence Developer role. They will need to focus on hands-on work creating BI solutions including Data Warehouse implementation, ETL, and data cleansing. Overview Create sophisticated SSIS packages for extracting, transforming, and loading data Use containers to efficiently control repetitive tasks and transactions Configure packages to dynamically adapt to environment changes Use Data Quality Services to cleanse data Successfully troubleshoot packages Create and Manage the SSIS Catalog Deploy, configure, and schedule packages Secure the SSIS Catalog SQL Server Integration Services is the Community Courseware version of 20767CC Implementing a SQL Data Warehouse. This five-day instructor-led course is intended for IT professionals who need to learn how to use SSIS to build, deploy, maintain, and secure Integration Services projects and packages, and to use SSIS to extract, transform, and load data to and from SQL Server. This course is similar to the retired Course 20767-C: Implementing a SQL Data Warehouse but focuses more on building packages, rather than the entire data warehouse design and implementation. Prerequisites Working knowledge of T-SQL and SQL Server Agent jobs is helpful, but not required. Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of relational databases. Some experience with database design. 1 - SSIS Overview Import/Export Wizard Exporting Data with the Wizard Common Import Concerns Quality Checking Imported/Exported Data 2 - Working with Solutions and Projects Working with SQL Server Data Tools Understanding Solutions and Projects Working with the Visual Studio Interface 3 - Basic Control Flow Working with Tasks Understanding Precedence Constraints Annotating Packages Grouping Tasks Package and Task Properties Connection Managers Favorite Tasks 4 - Common Tasks Analysis Services Processing Data Profiling Task Execute Package Task Execute Process Task Expression Task File System Task FTP Task Hadoop Task Script Task Introduction Send Mail Task Web Service Task XML Task 5 - Data Flow Sources and Destinations The Data Flow Task The Data Flow SSIS Toolbox Working with Data Sources SSIS Data Sources Working with Data Destinations SSIS Data Destinations 6 - Data Flow Transformations Transformations Configuring Transformations 7 - Making Packages Dynamic Features for Making Packages Dynamic Package Parameters Project Parameters Variables SQL Parameters Expressions in Tasks Expressions in Connection Managers After Deployment How It All Fits Together 8 - Containers Sequence Containers For Loop Containers Foreach Loop Containers 9 - Troubleshooting and Package Reliability Understanding MaximumErrorCount Breakpoints Redirecting Error Rows Logging Event Handlers Using Checkpoints Transactions 10 - Deploying to the SSIS Catalog The SSIS Catalog Deploying Projects Working with Environments Executing Packages in SSMS Executing Packages from the Command Line Deployment Model Differences 11 - Installing and Administering SSIS Installing SSIS Upgrading SSIS Managing the SSIS Catalog Viewing Built-in SSIS Reports Managing SSIS Logging and Operation Histories Automating Package Execution 12 - Securing the SSIS Catalog Principals Securables Grantable Permissions Granting Permissions Configuring Proxy Accounts Additional course details: Nexus Humans 55321 SQL Server Integration Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55321 SQL Server Integration Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
QA Level 3 Award In Emergency Paediatric First Aid (RQF) Full day course Would you know what to do if you saw a child in need of First Aid? Being able to deal with paediatric emergencies can make the difference between the life and death of children, and save them a lot of suffering Course Contents: The Roles and Responsibilities of an Emergency Paediatric First Aider Assessing an Emergency Situation Accident Recording Minor Injuries Cuts, Grazes and Bruises Minor Burns and Scalds Managing an Unresponsive Infant or Child Recovery Position CPR Safe Use of an AED (Automated External Defibrillator) Choking Anaphylaxis Seizures Wounds and Bleeding Shock Benefits of this course: Would you know what to do if you saw a child in need of First Aid? Children are prone to minor injuries, but suffer from serious injuries also In 2014, 2,269 children in the UK were so badly bitten by an animal they had to be admitted to hospital More than 2 million children have accidents in the home for which they're taken to A&E - every year, with Under 5s accounting for 7% of all hospital emergency treatments Being able to deal with peadiatric emergencies can make the difference between the life and death of children, and save them a lot of suffering. This QA Level 3 Award in Emergency Paediatric First Aid (RQF) qualification is ideal for: - Parents/carers or family members who want to learn key paediatric first aid skills - Those who work with children and are not required to comply with Ofsted’s Childcare Register or Early Years Foundation Stage (EYFS) 2014 requirements Those who want to provide additional support in their organisation to existing paediatric first aiders that are trained to meet Ofsted’s Childcare Register or Early Years Foundation Stage (EYFS) 2014 requirements. For those who will be directly responsible for children, Ofsted requires people to do our two day Paediatric First Aid course instead We also run a Paediatric Annual Refresher to keep those life-saving skills up to date Accredited, Ofqual regulated qualification: Our Emergency Paediatric First Aid at Work course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Emergency Paediatric First Aid certificate will fulfill the legal requirements. It is a very good way to make sure you and your employees are trained in First Aid for Children and Infants (babies).The Ofqual Register number for this course is 603/0786/9
Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 DPI Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers Managers of all levels involved in shaping direction and strategy or developing a continually improving team Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview The purpose of the ITIL 4 Direct Plan and Improve Qualification is: To provide the candidate with the practical skills necessary to create a ?learning and improving? IT organization, with a strong and effective strategic direction To provide practitioners with a practical and strategic method for planning and delivering continual improvement with the necessary agility The objectives of this course are to: Understand the Key Concepts of Direct, Plan & Improve Understand the scope of what is to be directed and/or planned, and know how to use key principles and methods of direction and planning in that context Understand the role of GRC (Governance, Risk & Compliance) and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices This unique and central course covers requirements in both the ITIL Managing Professional and ITIL Strategic Leader designations. As such, this course is a must-have in any ITIL 4 professional development plan. You will gain the practical skills needed to establish a ?learning and improving? IT organization that possess a strong and targeted strategic direction. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - KEY CONCEPTS OF DIRECT, PLAN AND IMPROVE Knowing key terms Differentiating between principle concepts Defining the relationship of Values, Outcomes, Costs and Risks 2 - SCOPING WHAT IS TO BE DIRECTED Cascading goals and requirements Deciphering effective policies, controls and guidelines Placing decision-making authority at the correct level 3 - THE ROLE OF GRC IN THE SERVICE VALUE SYSTEM The role of risk management How governance impacts DPI Ensuring that controls are sufficient but not excessive 4 - PRINCIPLES AND METHODS FOR CONTINUAL IMPROVEMENT Leverage the ITIL CI model Identify assessment objectives and outputs Select the appropriate assessment method Prioritize desired outcomes Build, justify and advocate your business case Conduct improvement reviews and lessons learned sessions Embed CI at all levels of the service value stream 5 - APPLYING COMMUNICATION AND ORGANIZATIONAL CHANGE MANAGEMENT The nature and benefits of OCM Manage, communicate effectively, and influence stakeholders Establish valuable interfaces across the value chain 6 - EFFECTIVE MEASURING AND REPORTING Defining indicators and metrics to support objectives 7 - DIRECT, PLAN AND IMPROVE VALUE STREAMS Recognizing the differences between value streams and practices Choosing the right methods and techniques to direct, plan and improve value streams Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This Renewables Technical Surveying training short two day course is specifically designed for individuals and companies that want to train themselves and their staff on exactly how to carry out Renewables Technical Site Surveying prior to any renewables installation measures, this includes for heating systems, solar systems and EV Charge point installations. The course is primarily aimed at Energy Suppliers, Equipment Manufacturers, Renewable Installers, Domestic Energy Assessors, Retrofit Assessors, Retrofit Co-ordinators, Renewables sales staff and suitable individuals with a basic level of knowledge in varying building structures, heating systems and varying renewable technologies.
Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Prepare to maintain SQL databases on Azure Describe Microsoft Intelligent Data Platform roles Understand SQL Server in an Azure virtual machine Design Azure SQL Database for cloud-native applications Explore Azure SQL Database Managed Instance 2 - Deploy IaaS solutions with Azure SQL Explain IaaS options to deploy SQL Server in Azure Understand hybrid scenarios Explore performance and security Explain high availability and disaster recovery options 3 - Deploy PaaS solutions with Azure SQL Explain PaaS options for deploying SQL Server in Azure Explore single SQL database Deploy SQL database elastic pool Understand SQL database hyperscale Examine SQL managed instance Describe SQL Edge 4 - Evaluate strategies for migrating to Azure SQL Understand compatibility level Understand Azure preview features Describe Azure database migration options 5 - Migrate SQL workloads to Azure SQL databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL Database offline Migrate SQL Server to Azure SQL Database online Load and move data to Azure SQL Database 6 - Migrate SQL workloads to Azure Managed Instances Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed Instance Load and Move data to SQL Database Managed Instance 7 - Configure database authentication and authorization Describe Active Directory and Azure Active Directory Describe authentication and identities Describe Security Principals Describe database and object permissions Identify authentication and authorization failures 8 - Protect data in-transit and at rest Explore Transparent Data Encryption Configure server and database firewall rules Explain object encryption and secure enclaves Enable encrypted connections Describe SQL injection Understand Azure Key Vault 9 - Implement compliance controls for sensitive data Explore data classification Explore server and database audit Implement Dynamic Data Masking Implement Row Level security Understand Microsoft Defender for SQL Explore Azure SQL Database Ledger Implement Azure Purview 10 - Describe performance monitoring Describe performance monitoring tools Describe critical performance metrics Establish baseline metrics Explore extended events Describe Azure SQL Insights Explore Query Performance Insight 11 - Configure SQL Server resources for optimal performance Explain how to optimize Azure storage for SQL Server virtual machines Describe virtual machine resizing Optimize database storage Control SQL Server resources 12 - Configure databases for optimal performance Explore database maintenance checks Describe database scoped configuration options Describe automatic tuning Describe intelligent query processing 13 - Explore query performance optimization Understand query plans Explain estimated and actual query plans Describe dynamic management views and functions Explore Query Store Identify problematic query plans Describe blocking and locking 14 - Evaluate performance improvements Describe wait statistics Tune and maintain indexes Understand query hints 15 - Explore performance-based design Describe normalization Choose appropriate data types Design indexes 16 - Automate deployment of database resources Describe deployment models in Azure Automate deployment by using Azure Resource Manager templates and Bicep Automate deployment by using PowerShell Automate deployment by using Azure CLI 17 - Create and manage SQL Agent jobs Create a SQL Server maintenance plan Describe task status notifications 18 - Manage Azure PaaS tasks using automation Explore Elastic jobs Understand Azure Automation Build an automation runbook Automate database workflows by using Logic Apps Monitor automated tasks 19 - Describe high availability and disaster recovery strategies Describe recovery time objective and recovery point objective Explore high availability and disaster recovery options Describe Azure high availability and disaster recovery features for Azure Virtual Machines Describe high availability and disaster recovery options for PaaS deployments Explore an IaaS high availability and disaster recovery solution Describe hybrid solutions 20 - Explore IaaS and PaaS solutions for high availability and disaster recovery Describe failover clusters in Windows Server Configure Always-on availability groups Describe temporal tables in Azure SQL Database Describe active geo-replication for Azure SQL Database Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - Back up and restore databases Back up and restore SQL Server running on Azure virtual machines Back up a SQL Server virtual machine Back up and restore a database using Azure SQL Database Additional course details: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview Mining data Manipulating data Visualizing and reporting data Applying basic statistical methods Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle CompTIA Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making. CompTIA Data+ gives you the confidence to bring data analysis to life. As the importance for data analytics grows, more job roles are required to set context and better communicate vital business intelligence. Collecting, analyzing, and reporting on data can drive priorities and lead business decision-making. 1 - Identifying Basic Concepts of Data Schemas Identify Relational and Non-Relational Databases Understand the Way We Use Tables, Primary Keys, and Normalization 2 - Understanding Different Data Systems Describe Types of Data Processing and Storage Systems Explain How Data Changes 3 - Understanding Types and Characteristics of Data Understand Types of Data Break Down the Field Data Types 4 - Comparing and Contrasting Different Data Structures, Formats, and Markup Languages Differentiate between Structured Data and Unstructured Data Recognize Different File Formats Understand the Different Code Languages Used for Data 5 - Explaining Data Integration and Collection Methods Understand the Processes of Extracting, Transforming, and Loading Data Explain API/Web Scraping and Other Collection Methods Collect and Use Public and Publicly-Available Data Use and Collect Survey Data 6 - Identifying Common Reasons for Cleansing and Profiling Data Learn to Profile Data Address Redundant, Duplicated, and Unnecessary Data Work with Missing Value Address Invalid Data Convert Data to Meet Specifications 7 - Executing Different Data Manipulation Techniques Manipulate Field Data and Create Variables Transpose and Append Data Query Data 8 - Explaining Common Techniques for Data Manipulation and Optimization Use Functions to Manipulate Data Use Common Techniques for Query Optimization 9 - Applying Descriptive Statistical Methods Use Measures of Central Tendency Use Measures of Dispersion Use Frequency and Percentages 10 - Describing Key Analysis Techniques Get Started with Analysis Recognize Types of Analysis 11 - Understanding the Use of Different Statistical Methods Understand the Importance of Statistical Tests Break Down the Hypothesis Test Understand Tests and Methods to Determine Relationships Between Variables 12 - Using the Appropriate Type of Visualization Use Basic Visuals Build Advanced Visuals Build Maps with Geographical Data Use Visuals to Tell a Story 13 - Expressing Business Requirements in a Report Format Consider Audience Needs When Developing a Report Describe Data Source Considerations For Reporting Describe Considerations for Delivering Reports and Dashboards Develop Reports or Dashboards Understand Ways to Sort and Filter Data 14 - Designing Components for Reports and Dashboards Design Elements for Reports and Dashboards Utilize Standard Elements Creating a Narrative and Other Written Elements Understand Deployment Considerations 15 - Understand Deployment Considerations Understand How Updates and Timing Affect Reporting Differentiate Between Types of Reports 16 - Summarizing the Importance of Data Governance Define Data Governance Understand Access Requirements and Policies Understand Security Requirements Understand Entity Relationship Requirements 17 - Applying Quality Control to Data Describe Characteristics, Rules, and Metrics of Data Quality Identify Reasons to Quality Check Data and Methods of Data Validation 18 - Explaining Master Data Management Concepts Explain the Basics of Master Data Management Describe Master Data Management Processes Additional course details: Nexus Humans CompTIA Data Plus (DA0-001) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Data Plus (DA0-001) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.