Duration 4 Days 24 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe mobile network architecture basics List enabling technologies for 5G and describe 5G key use cases Perform basic operations on a Cisco 5G NSA mobile packet core Describe the Cisco 5G Converged SDN Transport Architecture Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM) Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI Explain the 5G ready distributed Telco DC with Cisco ACI solution Describe the Cisco 5G security architecture The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco© automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI©). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork?, and the Cisco 5G security architecture will also be presented. Mobile Network Fundamentals 5G Key Use Cases Examining Mobile Network Components Enabling Technologies for 5G Introduction to 5G NR Characteristics Cloud Radio Access network (RAN) Cisco 5G NSA Solution 5G NSA Basics 5G NSA StarOS Configurations Cisco 5G Converged SDN Transport Architecture Cisco 5G Transport Ready Devices Application Awareness and Network Slicing with Segment Routing Cisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC NFVI and SDN Architecture Overview Cisco VIM Pod Configurations Cisco Service Provider Automation and Orchestration Telemetry Basics ZTP Fundamentals Cisco Ultra Cloud Core Cisco Ultra Cloud Core Basics Kubernetes and Docker Fundamentals 5G Ready Distributed DC with Cisco ACI Cisco ACI in Telco Data Centers 5GC Deployment Mitigating Threats in 5G Introduction to 5G Cybersecurity Risks Mitigating 5G Cybersecurity Risks
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
Duration 2.25 Days 13.5 CPD hours This course is intended for The job roles best suited to the material in this course are: sales personnel, accountants, administrators, auditors, lab assistants, office job positions. Overview Work with functions. Work with lists. Analyze data. Visualize data with charts. Use PivotTables and PivotCharts. Work with multiple worksheets and workbooks. Share and protect workbooks. Automate workbook functionality. Use Lookup functions and formula auditing. Forecast data. Create sparklines and map data This course provides the knowledge to create advanced workbooks and worksheets that can deepen the understanding of organizational intelligence. The ability to analyze massive amounts of data, extract actionable information from it and present that information to decision makers. In addition this course will give you the ability to collaborate with colleagues, automate complex or repetitive tasks and use conditional logic to construct and apply elaborate formulas and functions which will allow you to work through a lot of data and generate the answers that your organisation needs. WORKING WITH FUNCTIONS Topic A: Work with Ranges Topic B: Use Specialized Functions Topic C: Work with Logical Functions Topic D: Work with Date and Time Functions Topic E: Work with Text Functions WORKING WITH LISTS Topic A: Sort Data Topic B: Filter Data Topic C: Query Data with Database Functions Topic D: Outline and Subtotal Data ANALYZING DATA Topic A: Create and Modify Tables Topic B: Apply Intermediate Conditional Formatting Topic C: Apply Advanced Conditional Formatting VISUALIZING DATA WITH CHARTS Topic A: Create Charts Topic B: Modify and Format Charts Topic C: Use Advanced Chart Features USING PIVOTTABLES AND PIVOTCHARTS Topic A: Create a PivotTable Topic B: Analyze PivotTable Data Topic C: Present Data with PivotCharts Topic D: Filter Data by Using Timelines and Slicers WORKING WITH MULTIPLE WORKSHEETS AND WORKBOOKS Topic A: Use Links and External References Topic B: Use 3-D References Topic C: Consolidate Data SHARING AND PROTECTING WORKBOOKS Topic A: Collaborate on a Workbook Topic B: Protect Worksheets and Workbooks AUTOMATING WORKBOOK FUNCTIONALITY Topic A: Apply Data Validation Topic B: Search for Invalid Data and Formulas with Errors Topic C: Work with Macros USING LOOKUP FUNCTIONS AND FORMULAS AUDITING Topic A: Use Lookup Functions Topic B: Trace Cells Topic C: Watch and Evaluate Formulas FORECASTING DATA Topic A: Determine Potential Outcomes Using Data Tables Topic B: Determine Potential Outcomes Using Scenarios Topic C: Use the Goal Seek Feature Topic D: Forecast Data Trends CREATING SPARKLINES AND MAPPING DATA Topic A: Create Sparklines Topic B: Map Data
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions architects Developers Cost-optimization leads System administrators Overview In this course, you will learn to: Explain the cost of core AWS services Determine and predict costs associated with current and future cloud workloads Use strategies and best practices to reduce AWS costs Use AWS tools to manage, monitor, alert, and optimize your AWS spend Apply strategies to monitor service costs and usage Implement governance standards, including resource tagging, account structure, provisioning,permissions, and access This course is for individuals who seek an understanding of how to manage, optimize, and predict costs as you run workloads on AWS. You learn how to implement architectural best practices, explore cost optimization strategies, and design patterns to help you architect cost-efficient solutions on AWS. Module 0: Couse Overview Course introduction Module 1: Introduction to Cloud Financial Management Introduction to Cloud Financial Management Four pillars of Cloud Financial Management Module 2: Resource Tagging Tagging resources Hands-On Lab: Cost optimization: Control Resource Consumption Using Tagging and AWS Config Module 3: Pricing and Cost Fundamentals of pricing AWS Free Tier Volume discounts Savings plans and Reserved Instances Demonstration: AWS Pricing Calculator Module 4: AWS Billing, Reporting, and Monitoring Understanding AWS invoices Reporting and planning AWS Cost Explorer AWS Budgets Demonstration: AWS Billing Console Demonstration: AWS Cost Explorer Demonstration: Trusted Advisor Hands-On Lab: Cost optimization: Deploy Ephemeral Environments Using Amazon EC2 Auto Scaling Module 5: Architecting for Cost: Compute Evolution of compute efficiency Amazon EC2 right-sizing Purchasing options Architect for Amazon EC2 Spot Instance Impact of software licensing Demonstration: Compute Optimizer Demonstration: Spot Instance Advisor Hands-On Lab: Cost optimization: Right Size Amazon EC2 Instances Using Amazon CloudWatch Metrics Module 6: Architecting for Cost: Networking Data transfer costs Understand data costs for different services How to triage network costs Hands-On Lab: Cost optimization: Reduce Data Transfer Costs Using Amazon CloudFront and Endpoints Module 7: Architecting for Cost: Storage Amazon EBS cost, pricing, and best practices Amazon S3 cost, pricing, and best practices Amazon EFS cost, pricing, and best practices Hands-On Lab: Cost optimization: Reduce Storage Costs Using Amazon S3 Lifecycle Management Module 8: Architecting for Cost: Databases Amazon RDS cost, pricing, and best practices Amazon Aurora cost, pricing, and best practices Amazon DynamoDB cost, pricing, and best practices Amazon ElastiCache cost, pricing, and best practices Amazon Redshift cost, pricing, and best practices Module 9: Cost Governance Setting up AWS Organizations AWS Systems Manager Hands-On Lab: Cost optimization: Reduce Compute Costs Using AWS Instance Scheduler Module 10: Course Summary Course review
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe the Cisco CloudCenter solution, architecture, and features Discover the enterprise-class security solution for IT organizations and cloud service providers Discover how the CloudCenter Suite adapters can be leveraged to build custom integrations with a variety of enterprise platforms and services Discover the integrations and APIs that can be performed from Action Orchestrator CLDAO, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite is a 3-day course that teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes.This course will help you:Acquire the advanced skills and techniques using the primary modules of workload manager, cost optimizer and action orchestrator for consistent experiences across all business environmentsLearn how to design and deploy applications that are delivered consistently and reliably across private and public clouds Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs Additional course details: Nexus Humans Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 4 Days 24 CPD hours This course is intended for Application Consultants, Developers, System Administrators, and System Architects Overview Understand the need for an enterprise portalLog on to, navigate, and personalize the portalDescribe the components of SAP Enterprise PortalBuild-up a portal navigation structureAdapt the portal user interface to company specificationsExplain and use the main functions of the SAP Enterprise Portal, Knowledge Management and CollaborationExplain and use the community features of the portal add-ons Forums and WikisExplain and use the SAP Fiori Launchpad on Portal' In this course, students will gain knowledge of the basic fundamentals surrounding the SAP Enterprise Portal. Enterprise Portal Explaining Business Motivations for Portals Describing SAP NetWeaver Explaining the Basics of SAP Enterprise Portal The End User's Perspective Logging On and Navigating in SAP Enterprise Portal Personalizing SAP Enterprise Portal Technical Infrastructure Determining System Requirements Outlining SAP Enterprise Portal's Architecture Portal Platform Content Explaining the Object Model for Portal Content Managing iViews Managing Portal Pages Managing Worksets and Portal Roles Explaining Business Packages Outlining Portal Content Development Tools Translating Portal Content Look and Feel of the Portal Managing Portal Themes Managing Framework Pages Managing Portal Desktops Managing Portal Rules (Rule Collections) Security Aspects Identifying Security Aspects Managing Users and Authentication Options Describing Authorization Concepts Describing Single Sign-On (SSO) Evaluating Network Security Knowledge Management (KM) Outlining Knowledge Management (KM) Describing Content Management (CM) Functions Using Web Page Composer (WPC) Describing Search and Classification (TREX) Enterprise Workspaces Explaining Enterprise Workspaces Managing Personal Workspaces Managing Shared Workspaces Collaboration Outlining Collaboration Functions Using Forums Using Wikis Fiori Launchpad on the Portal Outlining SAP Fiori Launchpad on Portal Additional course details: Nexus Humans SAPEP SAP Enterprise Portal - Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAPEP SAP Enterprise Portal - Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.