• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2936 ARC courses in Cardiff delivered Online

Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Explain WAE basics, the purpose of WAE, and its capabilities Understand the Cisco WAE solution implementation Describe the network module configuration process Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis Describe Cisco WAE Design traffic engineering and QoS modeling Explain how to use API with WAE Design and WAE Server Describe the function, components, and processes of Cisco WAE Live The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco© WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.Additionally, you?ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions. Course Outline WAE Solution and Architecture Overview Implementing a Cisco WAE Solution Network Model Configuration WAE Design Fundamentals Cisco WAE Design Traffic Engineering and Optimization Introducing Cisco WAE API Cisco WAE Live Deployment Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE)
Delivered OnlineFlexible Dates
Price on Enquiry

MB-330T00 Microsoft Dynamics 365 Supply Chain Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for The Dynamics 365 Supply Chain Management functional consultant. The Dynamics 365 Supply Chain Management functional consultant is a key resource that designs and configures apps to meet the requirements for a customer. The functional consultant analyzes business requirements and translates those requirements into fully realized business processes and solutions that implement industry-recommended practices. The functional consultant specializes in one or more of the following feature sets of Dynamics: finance, manufacturing, or supply chain management. They partner with architects, developers, administrators, and other stakeholders to deliver solutions that meet or exceed the needs of their customers. Overview Configure the most important Dynamics 365 Dynamics 365 Supply Chain Management functionalities. Process most of the Dynamics 365 Supply Chain Management transactions. Explain to others how Dynamics 365 Supply Chain Management features and functionalities works. This course is designed to build your foundation in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Quality management and quality control functionalities. Master planning configuration and processing. This course includes lectures and several hands-on exercises. The exercises will be introduced to you on a form of a case study presented to a Dynamics 365 Supply Chain Management functional consultant. Each exercise will be bases on a business scenario followed by a question or discussion then a step-by-step guidance to perform the system related steps. Implement product information management Create and manage products Configure products for supply chain management Manage inventory pricing and costing Implement inventory management Configure Inventory management Manage and process inventory activities Implement and manage supply chain processes Implement Procurement and sourcing Implement common sales and marketing features Using Microsoft Guides Implement warehouse management and transportation management Configure warehouse management Perform warehouse management processes Implement transportation management Configure and manage quality control and quality management Configure quality control and quality management Manage quality control and quality management Implement master planning Configure master planning and forecasting Run master plans and manage planned orders Implement additional master planning features

MB-330T00 Microsoft Dynamics 365 Supply Chain Management
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Identity Management and Active Directory Integration with exam (RH363)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.

Red Hat Identity Management and Active Directory Integration with exam (RH363)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security Engineers Security Administrators Security Operations Specialists Security Analysts Network Engineers Overview Successful completion of this four-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get hands-on experience configuring, managing, and troubleshooting Prisma Access in a lab environment. The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Course Outline 1 - Prisma Access Overview and Definitions 2 - Planning and Design Architecture 3 - Routing SD-WAN Design and CloudGenix 4 - Activate and Configure Service Connections 5 - Rule Enforcement in Prisma Access and SSL Decrypt 6 - Panorama Operations for Prisma Access and Fawkes Overview 7 - Remote Networks 8 - Mobile Users 9- Cloud Secure Web Gateway 10 - Tune, Optimize and Troubleshoot 11 - Manage Multiple Tenants 12 - What?s New in v2.1 13 - Next Steps Additional course details: Nexus Humans Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)
Delivered OnlineFlexible Dates
Price on Enquiry

WE751 IBM Essentials of Service Development for IBM DataPower Gateway V7.5

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for integration developers who configure service policies on IBM© DataPower Gateways. Overview After completing this course, you should be able to: Describe how DataPower gateways are configured Create and configure cryptographic objects Configure Secure Sockets Layer (SSL) to and from DataPower gateways Configure a multi-protocol gateway (MPGW) to handle multiple protocols from a single service Configure a service level monitoring (SLM) policy to control message traffic Use logs and probes to troubleshoot services Use patterns to define and deploy new services Configure message transformation and routing by using style sheets (XSL) and GatewayScripts Handle errors in service policies This course teaches you the essential skills that are required to configure, implement, and troubleshoot services that are developed on the IBM© DataPower Gateways (IDG) with firmware version 7.5.0, regardless of use case. The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its XML and web services deployments, and extend the capabilities of its service-oriented architecture (SOA) infrastructure. The gateways also extend these capabilities into the JSON, REST, and Mobile application areas. Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to develop and debug services that are implemented on the DataPower gateways. These skills include WebGUI and Blueprint Console navigation, service type selection, basic multi-protocol gateway configuration, creating and using cryptographic objects, and configuring SSL connections. You also learn how to use various problem determination tools such as logs, monitors, and probes, and techniques for testing DataPower services and handling errors. Hands-on exercises give you experience working directly with a DataPower Gateway. The exercises focus on skills such as creating multi-protocol gateways, working with cryptographic and SSL objects, configuring service level monitoring, troubleshooting services, handling errors in a service policy, and deploying a service from a pattern. Course introductionQuick introduction to developing on DataPowerExercise: First exposure to the DataPower developer environmentServices overviewStructure of a serviceExercise: Creating a BookingService gatewayMulti-protocol gateway serviceProblem determination toolsExercise: Enhancing the BookingService gatewayHandling errors in a service policyExercise: Adding error handling to a service policyDataPower cryptographic tools and SSL setupExercise: Creating cryptographic objects and configuring SSLService level monitoringExercise: Implementing a service level monitor in a multi-protocol gatewayPatterns for service configurationExercise: Using a DataPower pattern to deploy a serviceCourse summary

WE751 IBM Essentials of Service Development for IBM DataPower Gateway V7.5
Delivered OnlineFlexible Dates
Price on Enquiry

SAP System Security Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP System Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is ideal for developers and engineers including: Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Cisco integrators/partners Field engineers Server administrators Network managers Overview After taking this course, you should be able to: Apply troubleshooting methodology to Cisco ACI networks Troubleshoot logical and physical constructs of the Cisco ACI policy Understand Cisco APIC and its troubleshooting aspects Troubleshoot endpoint learning in Cisco ACI Troubleshoot Layer 2 traffic bridging and Layer 3 routing in the Cisco ACI network Troubleshoot hypervisor integration in Cisco ACI Troubleshoot Layer 4 to Layer 7 service insertion Troubleshoot contracts and route leaking in Cisco ACI The Troubleshooting Cisco Application-Centric Infrastructure (DCACIT) v5.2 course teaches you through a combination of lectures and labs the key components and procedures needed to troubleshoot Cisco Nexus 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is for advanced engineers who have installed and managed existing fabrics or for those who have completed the Implementing Cisco Application-Centric Infrastructure-Advanced (DCACI) course. Course Outline Describing Cisco ACI Troubleshooting Methodology Troubleshooting Logical and Physical Constructs Troubleshooting Cisco APIC Troubleshooting Endpoint Learning Troubleshooting Layer 2 Troubleshooting Layer 3 Routing Troubleshooting VMM Integration Troubleshooting Layer 4-7 Service Insertion Troubleshooting Contracts and Route Leaking Additional course details: Nexus Humans Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT)
Delivered OnlineFlexible Dates
Price on Enquiry

AutoCAD Level 3 - Creating and Presenting 3D Models

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Fundamental concepts and workflows for creating 3D models using AutoCAD, Represent a design by creating solid primitives, solid or surface models from cross-sectional geometry, or composite models from multiple solid models, Complete a solid model design by adding the necessary features to detail, duplicate, and position 3D models, Convert 2D objects to 3D objects, Document a 3D design by creating 2D drawings for production and visualization, Communicate design ideas using visual styles, lights, model walk-through tools, and renderings. In this course, you will learn the fundamental concepts and workflows for creating 3D models using AutoCAD. IntroductionAdvanced Text Objects Annotation Scale Overview Using Fields Controlling the Draw Order Working with Tables Working with Linked Tables Creating Table Styles Projects - Advanced AnnotationDynamic Blocks Working with Dynamic Blocks Creating Dynamic Block Definitions Dynamic Block Authoring Tools Additional Visibility Options Attributes Inserting Blocks with Attributes Editing Attribute Values Defining Attributes Redefining Blocks with Attributes Extracting Attributes Projects - Advanced Blocks & AttributesOutput and Publishing Output For Electronic Review Autodesk Design Review Publishing Drawing Sets Other Tools for Collaboration eTransmit Hyperlinks Cloud Collaboration and 2D Automation Connecting to the Cloud Sharing Drawings in the Cloud Attach Navisworks Files Attach BIM 360 Glue Models Introduction to Sheet Sets Overview of Sheet Sets Creating Sheet Sets Creating Sheets in Sheet Sets Adding Views to Sheets Importing Layouts to Sheet Sets Publishing & Customizing Sheet Sets Transmitting and Archiving Sheet Sets Publishing Sheet Sets Customizing Sheet Sets Custom Blocks for Sheet Sets Projects - Sheet SetsManaging Layers Working in the Layer Properties Manager Creating Layer Filters Setting Layer States CAD Standards CAD Standards Concepts Configuring Standards Checking Standards Layer Translator System Setup Options Dialog Box System Variables Dynamic Input Settings Drawing Utilities Managing Plotters Plot Styles Introduction to Customization Why Customize? Creating a Custom Workspace Customizing the User Interface Using the Customize User Interface (CUI) Dialog Box Customizing the Ribbon Customizing the Quick Access Toolbar Customizing Menus Keyboard Shortcuts Macros & Custom Routines Custom Commands & Macros Running Scripts Action Recorder Editing Action Macros Loading Custom Routines

AutoCAD Level 3 - Creating and Presenting 3D Models
Delivered OnlineFlexible Dates
Price on Enquiry

OMI120 - Operations Manager i Software 9.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for New users of HP OperationsManagement (OMi) 9.21, including:? IT Tools engineers? Operations staff? Operations managers? Availability engineers? System administrators? Network administrators Overview At the end of the course, you should be able to:? Use OMi to effectively identify, prioritize, andresolve events? Use OMi to prioritize operational activities based onan event?s impact on key business services? Create event dashboards to meet the informationneeds of specific users? Describe CI resolution and correlation? Identify the health of services and technologycomponents based on Health Indicators (HIs) andKey Performance Indicators (KPIs) presented in OMi? Create and use OMi performance graphs? Create and use OMi tools? Create and tune Topology Based Event Correlation(TBEC) correlation rules? Create and tune Stream Based Event Correlation(SBEC) correlation rules? Create and tune Time Based Event Automation(TBEA) automation rules? Create and tune event suppression rules? Manage OMi user access and permissions? Create and tune OMi notifications? Describe the deployment architecture and options? Configure integration between OMi and HPOperations Management (HPOM)? Configure integration between OMi and HPSiteScope? Configure integration between OMi and NP EndUser Management (EUM) This course is recommended for individuals who are responsible for designing, implementing, or administering effective service operations capabilities for mission-critical business services. This course is recommended for individuals who are responsible for designing, implementing, or administering effective service operations capabilities for mission-critical business services. Additional course details: Nexus Humans OMI120 - Operations Manager i Software 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OMI120 - Operations Manager i Software 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OMI120 - Operations Manager i Software 9.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry