• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1089 Integration courses

The BrainChild Foundation Course: Identifying Neuro-Developmental Issues (BCF)

By Brainchild Developmental Program

THE BRAINCHILD FOUNDATION COURSE: identifying neuro-developmental issues (BCF)


The BrainChild Foundation Course: Identifying Neuro-Developmental Issues (BCF)
Delivered In-Person in SedberghTwo days, Jul 1st, 08:00
£500 to £550

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: * Azure compute technologies such as VMs, containers and serverless solutions * Azure virtual networking to include load balancers * Azure Storage technologies (unstructured and databases) * General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - DESIGN GOVERNANCE * Design for governance * Design for management groups * Design for subscriptions * Design for resource groups * Design for resource tags * Design for Azure Policy * Design for role-based access control (RBAC) * Design for Azure landing zones 2 - DESIGN AN AZURE COMPUTE SOLUTION * Choose an Azure compute service * Design for Azure Virtual Machines solutions * Design for Azure Batch solutions * Design for Azure App Service solutions * Design for Azure Container Instances solutions * Design for Azure Kubernetes Service solutions * Design for Azure Functions solutions * Design for Azure Logic Apps solutions 3 - DESIGN A DATA STORAGE SOLUTION FOR NON-RELATIONAL DATA * Design for data storage * Design for Azure storage accounts * Design for data redundancy * Design for Azure Blob Storage * Design for Azure Files * Design for Azure managed disks * Design for storage security 4 - DESIGN A DATA STORAGE SOLUTION FOR RELATIONAL DATA * Design for Azure SQL Database * Design for Azure SQL Managed Instance * Design for SQL Server on Azure Virtual Machines * Recommend a solution for database scalability * Recommend a solution for database availability * Design security for data at rest, data in motion, and data in use * Design for Azure SQL Edge * Design for Azure Cosmos DB and Table Storage 5 - DESIGN DATA INTEGRATION * Design a data integration solution with Azure Data Factory * Design a data integration solution with Azure Data Lake * Design a data integration and analytic solution with Azure Databricks * Design a data integration and analytic solution with Azure Synapse Analytics * Design strategies for hot, warm, and cold data paths * Design an Azure Stream Analytics solution for data analysis 6 - DESIGN AN APPLICATION ARCHITECTURE * Describe message and event scenarios * Design a messaging solution * Design an Azure Event Hubs messaging solution * Design an event-driven solution * Design a caching solution * Design API integration * Design an automated app deployment solution * Design an app configuration management solution 7 - DESIGN AUTHENTICATION AND AUTHORIZATION SOLUTIONS * Design for identity and access management (IAM) * Design for Microsoft Entra ID * Design for Microsoft Entra business-to-business (B2B) * Design for Azure Active Directory B2C (business-to-customer) * Design for conditional access * Design for identity protection * Design for access reviews * Design service principals for applications * Design managed identities * Design for Azure Key Vault 8 - DESIGN A SOLUTION TO LOG AND MONITOR AZURE RESOURCES * Design for Azure Monitor data sources * Design for Azure Monitor Logs (Log Analytics) workspaces * Design for Azure Workbooks and Azure insights * Design for Azure Data Explorer 9 - DESIGN NETWORK SOLUTIONS * Recommend a network architecture solution based on workload requirements * Design patterns for Azure network connectivity services * Design outbound connectivity and routing * Design for on-premises connectivity to Azure Virtual Network * Choose an application delivery service * Design for application delivery services * Design for application protection services 10 - DESIGN A SOLUTION FOR BACKUP AND DISASTER RECOVERY * Design for backup and recovery * Design for Azure Backup * Design for Azure blob backup and recovery * Design for Azure files backup and recovery * Design for Azure virtual machine backup and recovery * Design for Azure SQL backup and recovery * Design for Azure Site Recovery 11 - DESIGN MIGRATIONS * Evaluate migration with the Cloud Adoption Framework * Describe the Azure migration framework * Assess your on-premises workloads * Select a migration tool * Migrate your structured data in databases * Select an online storage migration tool for unstructured data * Migrate offline data 12 - INTRODUCTION TO THE MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK * Azure Well-Architected Framework pillars * Cost optimization * Operational excellence * Performance efficiency * Reliability * Security 13 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - COST OPTIMIZATION * Develop cost-management discipline * Design with a cost-efficiency mindset * Design for usage optimization * Design for rate optimization * Monitor and optimize over time 14 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - OPERATIONAL EXCELLENCE * Embrace DevOps culture * Establish development standards * Evolve operations with observability * Deploy with confidence * Automate for efficiency * Adopt safe deployment practices 15 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - PERFORMANCE EFFICIENCY * Negotiate realistic performance targets * Design to meet capacity requirements * Achieve and sustain performance * Improve efficiency through optimization 16 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - RELIABILITY * Design for business requirements * Design for resilience * Design for recovery * Design for operations * Keep it simple 17 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - SECURITY * Plan your security readiness * Design to protect confidentiality * Design to protect integrity * Design to protect availability * Sustain and evolve your security posture 18 - GETTING STARTED WITH THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Common blockers 19 - PREPARE FOR SUCCESSFUL CLOUD ADOPTION WITH A WELL-DEFINED STRATEGY * Customer narrative * Capture strategic motivation * Define objectives and key results * Evaluate financial considerations * Understand technical considerations * Create a business case 20 - PREPARE FOR CLOUD ADOPTION WITH A DATA-DRIVEN PLAN * Customer narrative 21 - CHOOSE THE BEST AZURE LANDING ZONE TO SUPPORT YOUR REQUIREMENTS FOR CLOUD OPERATIONS * Customer narrative * Common operating models * Design areas for Azure landing zones * Design principles for Azure landing zones * Journey to the target architecture * Choose an Azure landing zone option * Deploy the Azure landing zone accelerator * Enhance your landing zone 22 - MIGRATE TO AZURE THROUGH REPEATABLE PROCESSES AND COMMON TOOLS * Customer narrative * Migration process * Migration tools * Common tech platforms 23 - ADDRESS TANGIBLE RISKS WITH THE GOVERN METHODOLOGY OF THE CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Govern methodology * Corporate policies * Governance disciplines * Deploy a cloud governance foundation * The Cost Management discipline 24 - ENSURE STABLE OPERATIONS AND OPTIMIZATION ACROSS ALL SUPPORTED WORKLOADS DEPLOYED TO THE CLOUD * Establish business commitments * Deploy an operations baseline * Protect and recover * Enhance an operations baseline * Manage platform and workload specialization 25 - INNOVATE APPLICATIONS BY USING AZURE CLOUD TECHNOLOGIES * Follow the innovation lifecycle * Azure technologies for the build process * Infuse your applications with AI * Azure technologies for measuring business impact * Azure technologies for the learn process 26 - PREPARE FOR CLOUD SECURITY BY USING THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Methodology * Security roles and responsibilities * Simplify compliance and security * Simplify security implementation * Security tools and policies ADDITIONAL COURSE DETAILS: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online5 days, Jul 8th, 13:00 + 5 more
£2380

Salesforce Integration With External Systems Part 1

By Packt

Accelerate your Salesforce integration expertise and master SOAP, REST, BULK API, and Streaming. Gain hands-on experience with Postman and SOAP UI and set up your environment with Visual Studio Code. Tailored for developers and Salesforce certification aspirants, this course will elevate your skills technically. Enroll now to advance your career!

Salesforce Integration With External Systems Part 1
Delivered Online On Demand
£44.99

Salesforce Integration With External Systems Part 2

By Packt

Explore data connectivity and streamline workflows by mastering integrating Salesforce with external systems. Discover a range of tools and techniques to seamlessly connect Salesforce with external apps. Understand concepts such as Auth Providers/Named Credentials, HTTP callouts, and OpenAPI 3.0, and achieve robust integrations without coding.

Salesforce Integration With External Systems Part 2
Delivered Online On Demand
£44.99

Differentiation and Integration Level-3

By Course Cloud

The comprehensive Differentiation and Integration Level-3 has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Differentiation and Integration Level-3 today, and learn from the very best the industry has to offer! This best selling Differentiation and Integration Level-3 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Differentiation and Integration Level-3 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Differentiation and Integration Level-3 is CPD-accredited, so you can be confident you're completing a quality training course  will boost your CV and enhance your career potential. The Differentiation and Integration Level-3 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Differentiation and Integration Level-3, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Differentiation and Integration Level-3 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Differentiation and Integration Level-3 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Differentiation and Integration Level-3
Delivered Online On Demand
£25

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. MODULE 1: OVERVIEW & ARCHITECTUREN * Explore the ecosystem and main components * Explore the technical architecture * Explore design and deployment considerations MODULE 2: DEVELOPER TOOLS * Manage implementations by using Lifecycle Services * Manage source code by using version control * Customize by using Visual Studio MODULE 3: SOLUTION DESIGN * Implement application lifecycle management MODULE 4: AOT ELEMENTS * Build extended data types and enumerations * Build tables * Build forms and optimize form performance * Create classes * Create other user interface elements MODULE 5: CODE DEVELOPMENT & TESTING * Explore the test framework and use tools * Get started with development using X++ * Develop object-oriented code * Use RSAT tool MODULE 6: DATA MIGRATION * Prepare data for migration MODULE 7: FRAMEWORKS * Introduction * Explore extensions and the extension framework * Extend elements * SysOperationSandbox framework * Summary MODULE 8: INTEGRATION * Identify data integration patterns and scenarios * Implement data integration concepts and solutions * Implement the data management package API * Data integrations * Integrate with Microsoft Azure * Connecting to Power Platform services * Consume business events * Integrate Finance and Operations apps with Microsoft Dataverse MODULE 9: REPORTING * Explore the reporting tools * Build reports * Build workspaces * Manage data sources with external data stores MODULE 10: SECURITY & PERFORMANCE * Work with performance and monitoring tools * Implement role-based security * Apply basic performance optimization techniques ADDITIONAL COURSE DETAILS: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer
Delivered Online6 days, Jul 15th, 13:00
£2975

VMware Horizon: Deploy and Manage [V8.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access™ and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VMWARE HORIZON * Recognize the features and benefits of Horizon * Describe the conceptual and logical architecture of Horizon INTRODUCTION TO USE CASE * Convert customer requirements to use-case attributes * Define a use case for your virtual desktop and application infrastructure VSPHERE FOR VMWARE HORIZON * Explain basic virtualization concepts * Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts * Create a Windows virtual machine using vSphere CREATE WINDOWS DESKTOPS * Outline the steps to install Horizon Agent on Windows virtual machines * Install Horizon Agent on a Windows virtual Machine * Optimize and prepare Windows virtual machines to set up Horizon desktop VMs CREATE LINUX DESKTOPS * Create a Linux VM for Horizon * Install Horizon Agent on a Linux virtual machine * Optimize and prepare Linux virtual machines to set up Horizon desktop VMs CREATING AND MANAGING DESKTOP POOLS * Identify the steps to set up a template for desktop pool deployment * List the steps to add desktops to the VMware Horizon© Connection Server? inventory * Compare dedicated-assignment and floating-assignment pools * Outline the steps to create an automated pool * Define user entitlement * Explain the hierarchy of global, pool-level, and user-level policies VMWARE HORIZON CLIENT OPTIONS * Describe the different clients and their benefits * Access the Horizon desktop using various Horizon clients and HTML * Configure integrated printing, USB redirection, and the shared folders option * Configure session collaboration and media optimization for Microsoft Teams CREATING AND MANAGING INSTANT-CLONE DESKTOP POOLS * List the advantages of instant clones * Explain the provisioning technology used for instant clone desktop pools * Set up an automated pool of instant clones * Push updated images to instant clone desktop pools CREATING RDS DESKTOP AND APPLICATION POOLS * Explain the difference between an RDS desktop pool and an automated pool * Compare and contrast an RDS session host pool, a farm, and an application pool * Create an RDS desktop pool and an application pool * Access RDS desktops and application from Horizon Client * Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms * Configure load-balancing for RDSHs on a farm MONITORING VMWARE HORIZON * Monitor the status of the Horizon components using the Horizon Administrator console dashboard * Monitor desktop sessions using the HelpDesk tool * Monitor the performance of the remote desktop using the Horizon Performance Tracker HORIZON CONNECTION SERVER * Recognize the VMware Horizon reference architecture * Identify the Horizon Connection Server supported features * Identify the recommended system requirements for Horizon Connection Server * Configure the Horizon event database * Outline the steps for the initial configuration of Horizon Connection Server * Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation HORIZON PROTOCOLS * Compare the remote display protocols that are available in VMware Horizon * Describe the BLAST Display Protocol Codecs * Summarize the BLAST Codec options * List the ideal applications for each BLAST codec * Describe the BLAST and PCoIP ADMX GPO common configurations GRAPHICS IN HORIZON * Describe the 3D rendering options available in Horizon 8 * Compare vSGA and vDGA * List the steps to configure graphics cards for use in a Horizon environment SECURING CONNECTIONS: NETWORK * Compare tunnels and direct connections for client access to desktops * Discuss the benefits of using Unified Access Gateway * List the Unified Access Gateway firewall rules * Configure TLS certificates in Horizon SECURING CONNECTIONS: AUTHENTICATION * Compare the authentication options that Horizon Connection Server supports * Restrict access to the Horizon remote desktops using restricted entitlements * Describe the smart card authentication methods that Horizon Connection Server supports * Explain the purpose of permissions, roles, and privileges in VMware Horizon * Create custom roles HORIZON SCALABILITY * Describe the purpose of a replica connection server * Explain how multiple Horizon Connection Server instances in a pod maintain synchronization * List the steps to configure graphics cards for use in a Horizon environment * Configure a load balancer for use in a Horizon environment * Explain Horizon Cloud Pod Architecture LDAP replication. * Explain Horizon Cloud Pod Architecture scalability options HORIZON CLOUD AND UNIVERSAL BROKER * Recognize the features and benefits of Horizon Cloud Service * Use Universal broker to connect to a Horizon Cloud instance * Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server WORKSPACE ONE ACCESS AND VIRTUAL APPLICATION MANAGEMENT * Recognize the features and benefits of Workspace ONE Access * Explain identity management in Workspace ONE Access * Explain access management in Workspace ONE Access * Describe the requirements to install and configure True SSO in a Horizon environment * Describe the Workspace ONE Access directory integration * Deploy virtual applications with Workspace services ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon: Deploy and Manage [V8.8]
Delivered Online6 days, Jul 8th, 13:00
£4250

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources

By Asia Edge

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT) This Virtual Instructor Led Training (VILT) course presents advanced methodologies that implement demand response and energy conservation programs in light of the integration of new technologies, regulatory changes and the accelerated penetration of renewable energy resources. This VILT course provides examples and case studies from North American and European jurisdictions covering the operational flexibilities on the demand side including requirements for new building codes to achieve zero net energy. The course describes a public agency's goals and objectives for conserving and otherwise reducing energy consumption and managing its demand for energy. This course presents the demand response implemented for economics and system security such as system balancing and relieving transmission congestion, or for system adequacy. The course also presents the principal attributes of conservation programs and the associated success criteria. In a system with increased penetration of renewable resources, demand response provides flexibility to system operators, helping them to maintain the reliability and the security of supply. Demand response is presented as a competitive alternative to additional power sources, enhancing competition and liquidity in electricity markets. The unique characteristics are discussed from a local, consumer centric and also from a system perspective bringing to life the ever changing paradigm for delivery energy to customers. Interoperability aspects and standards are discussed, as well as the consumer centric paradigm of Transactive Energy with IOT enabled flexibilities at system level, distribution networks and microgrids. The VILT course introduces the blockchain as a new line of defense against cyber threats and its increasing application in P2P transactions and renewable certificates. Our trainer's industry experience spans three decades with one of the largest Canadian utilities where she led or contributed to large operational studies and energy policies and decades of work with IEEE, NSERC and CIGRE. Our key expert also approaches to the cross sectional, interdisciplinary state of the art methodologies brings real life experience of recent industry developments. Training Objectives * Innovative Digital Technologies * How systems Facilitate Operational Flexibility on the Demand Side * The Ecosystem of Demand Side Management Programs * Advanced Machine Learning techniques with examples from CAISO * Regulatory Policy Context and how to reduce regulatory barriers * Industry Examples from NERC and ENTSO * Relevant Industry standards: IEEE and IEC * Manage Congestion with Distributed Operational Flexibilities: Grid to Distribution Controls; examples from NERC (NA) and ENTSO (Europe) * Grid solutions with IEC 61850 communication protocols * Decentralized grid controls * The New Grid with accelerated V2G and Microgrids * How DSM is and will be applied in Your System: Examples and discussions Target Audience * Regulators and government agencies advising on public energy conservation programs * All professionals interested in expanding their expertise, or advancing their career, or take on management and leadership roles in the rapidly evolving energy sector * Energy professionals implementing demand side management, particularly in power systems with increased renewable penetration, to allow the much needed operational flexibility paramount to maintaining the reliability and stability of the power system and in the same time offering all classes of customers flexible and economical choices * Any utility professional interested in understanding the new developments in the power industry Course Level * Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your first expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Your second expert course leader is the co-founder and Director of Research at Xesto Inc. Xesto is a spatial computing AI startup based in Toronto, Canada and it has been voted as Toronto's Best Tech Startup 2019 and was named one of the top 10 'Canadian AI Startups to Watch' as well as one of 6th International finalists for the VW Siemens Startup Challenge, resulting in a partnership. His latest app Xesto-Fit demonstrates how advanced AI and machine learning is applied to the e-commerce industry, as a result of which Xesto has been recently featured in TechCrunch. He specializes in both applied and theoretical machine learning and has extensive experience in both industrial and academic research. He is specialized in Artificial Intelligence with multiple industrial applications. At Xesto, he leads projects that focus on applying cutting edge research at the intersection of spatial analysis, differential geometry, optimization of deep neural networks, and statistics to build scalable rigorous and real time performing systems that will change the way humans interact with technology. In addition, he is a Ph.D candidate in the Mathematics department at UofT, focusing on applied mathematics. His academic research interests are in applying advanced mathematical methods to the computational and statistical sciences. He earned a Bachelor's and MSc in Mathematics, both at the University of Toronto. Having presented at research seminars as well as instructing engineers on various levels, he has the ability to distill advanced theoretical concept to diverse audiences on all levels. In addition to research, our key expert is also an avid traveler and plays the violin. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1112 to £2099

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, Jul 8th, 13:00 + 4 more
£2380

BIT400 SAP Process Integration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP PROCESS INTEGRATION ARCHITECTURE * Describing SAP Process Integration Architecture * Explaining the Functionality and Utilization of SAP Process Integration THE SYSTEM LANDSCAPE DIRECTORY (SLD) MAINTAINING PRODUCTS AND SOFTWARE COMPONENTS IN THE SYSTEM * Landscape Directory (SLD) * Implementing Technical Systems in the System Landscape Directory * Maintaining Business Systems for Use in the Integration Directory INTERFACE OBJECTS IN THE ENTERPRISE SERVICE REPOSITORY (ESR) * Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository * (ESR) * Maintaining Interface Objects * Defining Message Processing Types and Quality of Services OBJECT MAPPING IN THE ENTERPRISE SERVICE REPOSITORY (ESR) * Creating Message Mapping Objects * Mapping Between Service Interfaces * Analyzing Asynchronous Integration Scenarios CONFIGURATION OF INTEGRATION DIRECTORY COMMUNICATION OBJECTS * Using Configuration Views * Creating Communication Channels in the Integration Directory (ID) CONFIGURATION OF INTEGRATION DIRECTORY OBJECTS FOR ABAP PROCESSING * Analyzing Objects Used in the Configuration of Integration * Engine (IE) Communication * Analyzing Routing Objects Used in Integration Engine (IE) Communication * Analyzing Multiple Receiver Objects Used in Integration Engine * (IE) Communication CONFIGURATION OF INTEGRATION DIRECTORY OBJECTS FOR JAVA PROCESSING * Maintaining Objects for Advanced Adapter Engine (AAE)-Only * Processing * Maintaining Objects for Advanced Adapter Engine Extended (AEX) * Message Processing * Creating and Deploying Integration Flows to the Advanced Adapter * Engine Extended (AEX) OPERATIONS OF SAP PROCESS INTEGRATION * Using the Runtime Workbench * Using the Process Integration Monitoring (PIMon) Home * Using the SAP NetWeaver Administrator CONNECTIVITY OPTIONS FOR SAP PROCESS INTEGRATION * Analyzing Connectivity Options between Back-End Systems with * SAP Process Integration HTTP CONNECTIVITY OPTIONS * Configuring the Simple Object Access Protocol (SOAP) Adapter * Using Proxy Technology * Checking the HTTP ABAP Adapter * Using the HTTP_AAE (Java) Adapter FILE ADAPTER CONFIGURATION * Configuring the Receiver File Adapter * Configuring a Sender File Adapter INTERMEDIATE DOCUMENT (IDOC) CONNECTIVITY OPTIONS * Using the Intermediate Document (IDoc) Adapter with the Receiver * Intermediate Document Adapter for the ABAP Stack * Using the Sender Intermediate Document (IDoc) Adapter * Using the Intermediate Document (IDoc) Adapter in the Advanced * Adapter Engine (AAE) * Configuring a Complete Intermediate Document (IDoc) Scenario CONFIGURATION OF SAP BUSINESS APPLICATION PROGRAMMING INTERFACES (BAPIS) CONNECTIVITY * Configuring the Receiver Remote Function Call (RFC) Adapter * Configuring the Sender Remote Function Call (RFC) Scenario ENTERPRISE SERVICES AND B2B CONNECTIVITY * Analyzing Enterprise Services * Configuring Business-to-Business (B2B) Connectivity CROSS-COMPONENT BUSINESS PROCESS MANAGEMENT (CCBPM) INTEGRATION PROCESSES * Analyzing the Runtime of the Cross-Component Business Process * Management (ccBPM) * Identifying the Steps to Create and Use an Integration Process ADDITIONAL COURSE DETAILS: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BIT400 SAP Process Integration
Delivered on-request, onlineDelivered Online
Price on Enquiry