Duration 3 Days 18 CPD hours This course is intended for New users of Real User Monitor (RUM) 9.1, including: Database Administrators System Administrators Network Administrators Operations Managers Availability Engineers Overview At the end of the course, you should be able to: Describe the architecture of a RUM implementation Install and configure the RUM Windows Probe Install and configure the RUM Engine Configure RUM monitoring of a three-tier application (web, application, and database server) from BSM Explain RUM reporting data Size and tune RUM Configure RUM monitoring for secure web applications that use SSL Java Key Store (JKS) Troubleshoot RUM issues using the RUM logs This course is designed for users who have working experience with Business Service Management (BSM). This course is designed for users who have working experience with Business Service Management (BSM).
Duration 2 Days 12 CPD hours This course is intended for System Engineers, Administrators, Architects, and Channel Partners Overview After you complete this course you will be able to: Describe the requirements for Jabber deploymentConfigure DNS, CUCM, IM&P, and Active Directory for Jabber integration This training course is designed to provide the necessary skills to deploy a Cisco Jabber© on premise solution. During class, students will train Cisco© Unified Communications administrators to meet the deployment requirements. Course Outline Module 1: Cisco Jabber Overview Module 2: Requirements for Jabber Deployment Module 3: Configuring CUCM for Jabber Deployment Module 4: Configuring IM&P for Jabber Deployment Module 5: DNS Configuration Module 6: Installing Cisco Jabber Module 7: Adding Photos to User Module 8: URI Dialing Module 9: Using Jabber Features Module 10: Collaboration Edge Module 11: Troubleshooting
Duration 3 Days 18 CPD hours This course is intended for Application ConsultantBusiness AnalystBusiness Process ArchitectBusiness Process Owner / Team Lead / Power UserExecutiveIndustry SpecialistProgram/Project Manager Overview This course will prepare you to:Describe the motivation for S/4HANA Enterprise ManagementExecute innovative logistics processes in the areas of logistics planning and execution in S/4HANA, especially in manufacturing, procurement, and salesLearn about the simplification listOutline the SAP User Experience strategyUse SAP Fiori among other user interfaces to execute logistics processesOutline different migration strategies Students will learn to execute innovative logistics processes in the areas of logistics planning and execution in S/4HANA, especially in manufacturing, procurement, and sales. Motivation and Functional Overview of SAP S4/HANA (Materials Management and Operations)Simplification ListSAP User Experience, especially SAP FioriInnovative Logistics Processes in the Areas of Logistics Planning and Execution in S/4HANA, especially in Manufacturing, including MRP Life and Production Planning / Detailed Scheduling (PP/DS) Procurement, Sales, including Back Order Processing, and Extended Warehouse Management (EWM) Migration Scenarios
Duration 3 Days 18 CPD hours This course is intended for Java Developers with a minimum of 2 years of experience and individuals who want to become application security engineers/analysts/testers Individuals involved in the role of developing, testing, managing, or protecting wide area of applications. Overview In-depth understanding of secure SDLC and secure SDLC models Knowledge of OWASP Top 10, threat modelling, SAST and DAST Capturing security requirements of an application in development Defining, maintaining, and enforcing application security best practices The Certified Application Security Engineer (CASE) training and certification program provides a comprehensive application security approach which encompasses security activities involved in all the phases of Software Development Lifecycle (SDLC). Understanding Application Security, Threats, and AttacksSecurity Requirements GatheringSecure Application Design and ArchitectureSecure Coding Practices for Input ValidationSecure Coding Practices for Authentication and AuthorizationSecure Coding Practices for CryptographySecure Coding Practices for Session ManagementSecure Coding Practices for Error HandlingStatic and Dynamic Application Security Testing (SAST & DAST)Secure Deployment and Maintenance
Duration 5 Days 30 CPD hours This course is intended for Administrator Developer System Integrator Systems Administrator Overview Install WebLogic Server 12c Deploy applications to WebLogic Server Deploy share libraries and application that use them to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Configure WebLogic Server's authentication provider This Oracle WebLogic Server 12c: Administration I training teaches you how to perform the most important Oracle WebLogic Server 12c administrative tasks., and gives an overview of the architecture and concepts of Oracle WebLogic Server 12c. WebLogic Server OverviewInstalling and Patching WebLogic ServerCreating DomainsStarting ServersUsing the Administration ConsoleConfiguring JDBCMonitoring a DomainNode ManagerDeploying ApplicationsShared Java EE LibrariesNetwork Channels and Virtual HostsClusters: Overview, Create, & ConfigClusters: Proxies & SessionsClusters: Communication, Planning & TroubleshootingTransactionsWebLogic Server SecurityBacking Up a Domain and Upgrading WebLogic Server
Duration 2 Days 12 CPD hours This course is intended for Security Administrators, Security Operations Specialists, Security Analysts, Security Engineers, and Security Architects Overview The Palo Alto Networks Panorama 11.0: Managing Firewalls at Scale (EDU-220) course is two days of instructor-led training that should help you: Learn how to configure and manage the next-generation Panorama management server Gain experience configuring templates (including template variables) and device groups Gain experience with administration, log collection, and logging and reporting Become familiar with planning and design considerations for Panorama deployment This course should help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server?s role in managing and securing their overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.Learn how to configure and manage the next-generation Panorama? management server. Course Outline Module 1 - Initial Configuration Module 2 - Adding Firewalls Module 3 - Templates Module 4 - Device Groups Module 5 - Log Collection and Forwarding Module 6 - Using Panorama Logs Module 7 - Panorama Administrative Accounts Module 8 - Reporting Module 9 - Troubleshooting
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for application or system support personnel or anyone who needs an overview of the capabilities of HP UD 10.1x. Overview Upon successful completion of this course, you should be able to: Identify the evolution of the Configuration Management System (CMS) from the Configuration Management Database (CMDB), the need for CMS, and working of CMS Define the concept of Universal Discovery (UD) and be able to identify its applications and types Identify the architecture and deployment process of UD, and the installation and setup of the data flow probe and its log files Define the concepts of discovery adapters, discovery jobs, discovery scripts, and other discovery resources Use the Universal Discovery module to perform application dependency mapping discovery and inventory discovery Use zone-based discover method and discovery activities Design and build agentless and agent-based discoveries, and use inventory scanners Work with the Software Library Viewer and various inventory tools Use the application recognition process, and discovery rules HP This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution. This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution.