Social Media Marketing Strategy Course Overview: This Social Media Marketing Strategy course provides a comprehensive overview of how to create, manage, and optimise a social media marketing plan. Learners will explore the key aspects of social media marketing, including market analysis, content creation, and campaign management. The course focuses on understanding the dynamics of different social platforms, selecting the right platforms for your business, and integrating them into broader marketing strategies. By the end of the course, learners will be equipped with the knowledge to design and implement effective social media marketing strategies to enhance brand visibility and engagement. Course Description: This course dives deeper into the essential aspects of social media marketing, offering insights into the latest trends and tools available. Key topics include conducting a market analysis to understand target audiences, auditing current social media channels, setting measurable goals, and selecting the most effective platforms. The course also covers the creation of a social media policy, integrating marketing strategies across platforms, developing content that resonates with audiences, and launching successful campaigns. Learners will gain valuable skills to build and execute a social media marketing strategy that drives results for businesses and brands. Social Media Marketing Strategy Curriculum: Module 01: The Rise of Social Media Module 02: Conducting Market Analysis Module 03: Auditing Social Media Module 04: Setting Goals and Selecting Platforms Module 05: Creating the Social Media Policy Module 06: Integrating Marketing Strategies Module 07: Developing Effective Content Module 08: Understanding the Popular Platforms Module 09: Launching Successful Campaigns (See full curriculum) Who is this course for? Individuals seeking to enhance their marketing skills. Professionals aiming to boost their career in digital marketing. Beginners with an interest in social media marketing. Entrepreneurs looking to build their brand presence online. Career Path: Social Media Manager Digital Marketing Specialist Content Strategist Marketing Consultant Brand Manager
Accounting and Finance Course Overview: This Accounting and Finance course offers a comprehensive understanding of the key principles and practices involved in accounting and finance. Learners will gain insights into essential financial concepts, from understanding the role of accountants to analysing financial statements. The course equips learners with the skills needed to navigate the world of financial management, preparing them for a wide range of opportunities in the finance industry. By completing this course, learners will be able to confidently approach financial tasks, from budgeting to risk management, and develop a clear understanding of the financial decision-making process. Course Description: This course covers the fundamentals of accounting and finance, offering in-depth insights into financial processes, accounting mechanics, and the preparation and analysis of financial statements. Learners will explore the role of accountants, budgeting and budgetary control, and financial markets, while also gaining a strong foundation in financial risk management and investment strategies. With a focus on analytical skills, the course will help learners develop a deeper understanding of financial operations and decision-making. By the end of the course, participants will be well-equipped to analyse financial data, manage risks, and apply their knowledge in a range of financial contexts. Accounting and Finance Curriculum: Module 01: Introduction to Accounting and Finance Module 02: The Role of an Accountant Module 03: Accounting Process and Mechanics Module 04: Introduction to Financial Statements Module 05: Financial Statement Analysis Module 06: Budgeting and Budgetary Control Module 07: Financial Markets Module 08: Financial Risk Management Module 09: Investment Management Module 10: Auditing (See full curriculum) Who is this course for? Individuals seeking to gain a solid understanding of accounting and finance. Professionals aiming to develop their financial management skills. Beginners with an interest in the finance or accounting industries. Those looking to transition into a finance-focused career. Career Path: Accountant Financial Analyst Budget Analyst Investment Advisor Risk Manager Auditor Finance Manager Banking and Financial Services
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20
Duration 2.25 Days 13.5 CPD hours This course is intended for The job roles best suited to the material in this course are: sales personnel, accountants, administrators, auditors, lab assistants, office job positions. Overview Work with functions. Work with lists. Analyze data. Visualize data with charts. Use PivotTables and PivotCharts. Work with multiple worksheets and workbooks. Share and protect workbooks. Automate workbook functionality. Use Lookup functions and formula auditing. Forecast data. Create sparklines and map data This course provides the knowledge to create advanced workbooks and worksheets that can deepen the understanding of organizational intelligence. The ability to analyze massive amounts of data, extract actionable information from it and present that information to decision makers. In addition this course will give you the ability to collaborate with colleagues, automate complex or repetitive tasks and use conditional logic to construct and apply elaborate formulas and functions which will allow you to work through a lot of data and generate the answers that your organisation needs. WORKING WITH FUNCTIONS Topic A: Work with Ranges Topic B: Use Specialized Functions Topic C: Work with Logical Functions Topic D: Work with Date and Time Functions Topic E: Work with Text Functions WORKING WITH LISTS Topic A: Sort Data Topic B: Filter Data Topic C: Query Data with Database Functions Topic D: Outline and Subtotal Data ANALYZING DATA Topic A: Create and Modify Tables Topic B: Apply Intermediate Conditional Formatting Topic C: Apply Advanced Conditional Formatting VISUALIZING DATA WITH CHARTS Topic A: Create Charts Topic B: Modify and Format Charts Topic C: Use Advanced Chart Features USING PIVOTTABLES AND PIVOTCHARTS Topic A: Create a PivotTable Topic B: Analyze PivotTable Data Topic C: Present Data with PivotCharts Topic D: Filter Data by Using Timelines and Slicers WORKING WITH MULTIPLE WORKSHEETS AND WORKBOOKS Topic A: Use Links and External References Topic B: Use 3-D References Topic C: Consolidate Data SHARING AND PROTECTING WORKBOOKS Topic A: Collaborate on a Workbook Topic B: Protect Worksheets and Workbooks AUTOMATING WORKBOOK FUNCTIONALITY Topic A: Apply Data Validation Topic B: Search for Invalid Data and Formulas with Errors Topic C: Work with Macros USING LOOKUP FUNCTIONS AND FORMULAS AUDITING Topic A: Use Lookup Functions Topic B: Trace Cells Topic C: Watch and Evaluate Formulas FORECASTING DATA Topic A: Determine Potential Outcomes Using Data Tables Topic B: Determine Potential Outcomes Using Scenarios Topic C: Use the Goal Seek Feature Topic D: Forecast Data Trends CREATING SPARKLINES AND MAPPING DATA Topic A: Create Sparklines Topic B: Map Data
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.5 Days 27 CPD hours This course is intended for This intermediate course is for people who are new to the RACF component of the z/OS Security Server, and responsible for security administration. This includes people who are planning to implement RACF for the first time, and people who are security administrators in installations where RACF is already implemented. Those inexperienced z/OS users may find the course Basics of z/OS RACF Administration (ES19) more appropriate Overview Identify the security requirements of a system Evaluate the facilities and options of RACF Define users to RACF Set up a RACF group structure Use RACF to protect resources Select options to tailor RACF Evaluate and implement RACF database and performance options Identify tools available for auditing Administer the system so that it is consistent with the installation's security goals Be a more effective security administrator using the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, & use several RACF utilities. Security and RACF overview . Administering groups and users . Protecting z/OS data sets . Introduction to user administration and delegation and general resources . RACF database, tables, and performance options . RACF utilities and exits . RACF options . Auditing the RACF environment . Storage management and RACF . Security for JES facilities . Security classification .
Duration 1 Days 6 CPD hours This course is intended for This course is ideal for any administrator with an interest in furthering the development of their Salesforce CRM administration, Sales and Service Cloud management, and process automation skills, and who ultimately wants to succeed at the Salesforce Certified Advanced Administrator exam. Overview When you complete this course, you will be able to:Configure data and application security.Describe Sales Cloud and Service Cloud applications.Implement business logic and process automation.Build advanced reports and dashboards.Apply data management best practices. This course will help hone your knowledge of of next-level techniques to administer and manage Salesforce?s CRM capabilities through guided scenarios, lecture, and discussion. Salesforce Security and Custom Objects Restricting and extending object, record, and field access Determining appropriate sharing solutions Territory Management Data relationships Automation, Change Management, and Auditing Process automation tools and best practices Change management options Sandboxes Deployment tools Auditing and monitoring Analytics and Data Management Creating reports Report types Dashboards Data quality features and policies Sales, Service, and Content Applications Products, price books, schedules and quotes Forecasting Salesforce Knowledge Entitlements Service Cloud console toolkit Content management Wrapping Test preparation Practice exam Additional course details: Nexus Humans Salesforce Certification Preparation for Advanced Administrator (CRT211) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Certification Preparation for Advanced Administrator (CRT211) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA