Duration 5 Days 30 CPD hours This course is intended for DevelopersConsultants Overview Explore SAP Gateway architecture and deployment optionsPerform OData queries and operations with SAP GatewayDefine data model and implement CRUD operationsExtend SAP Gateway services and build new ones with CDS ViewsConfigure routing, multiple origin, and SAP Workflow supportImplement advanced OData operations and introduce OData V4Handle security and consume OData services using SAP Web IDE Students will explore SAP Gateway architecture and deployment options. SAP Gateway Overview SAP Gateway Architecture SAP Gateway Deployment Options OData Overview OData and REST OData Operations OData Queries Consuming OData using SAP Web IDE SAP Gateway Service Implementation Defining a Data Model Implementing Read Operations Implementing Navigation Implementing Query Options Implementing Change Operations SAP Gateway Service Generation RFC/BOR Generator Search Help Generator SAP Gateway Service Redefinition Redefining a Data Service Redefining a Gateway Service SAP Gateway and CDS Views SAP Fiori Programming Model CDS/SADL Generator Data Source Reference CDS View Annotations SAP Gateway Hub Functionalities Multiple Back-End Systems Support Configuring Routing Capabilities Multiple Origin Composition SAP Workflow Support Advanced OData Options Implementing Function Imports Implementing Expand Operations Implementing Deep Insert Operations Handling ETags Batch Requests Media Links Offline Support Server Side Caching SAP Gateway Security Authentication Data Security SAP Gateway OData V4 Support OData V4 Implementation OData V4 Publishing
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ITIL® 4 Specialist: Create, Deliver and Support: Virtual In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management
Duration 1 Days 6 CPD hours This course is intended for Employees not working in a centralized office. Overview The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. Getting Started Workshop Objectives Pre-Assignment Core Skills Required Self-Management Time Management Organizing and Planning Communication Self-Management (I) Solving Problems on Your Own Being and Staying Motivated You Have More Freedom ? Don?t Abuse It You and Only You are Accountable Self-Management (II) Recognize and Remove Bad Habits Reflect on Mistakes and Learn from Them Establish Good Habits Be Assertive with Yourself Time Management (I) Build a Little Flexibility into Your Schedule Identify and Remove Time Wasters Working with Time Zones Using Free Time Wisely Time Management (II) The Urgent/Important Matrix Setting and Sticking to Deadlines The Glass Jar: Rocks, Pebbles, Sand and Water Recognize When You Are Procrastinating Organizing and Planning (I) Plan for Additional Stress When to Seek Help Being Proactive ? Not Reactive Establish Priorities and Attainable Goals Organizing and Planning (II) Setting Up Your Home Office Remove Unneeded or Distracting Items When Technology Fails Develop a Normal Working Day Communication (I) Stay in the Loop Use the Correct Medium Be Clear and to the Point Virtual Communication Can Be Impersonal Communication (II) Open and Frequent Communication Share Your Information Have a Collaborative Attitude Setting Expectations with Family and Friends Additional Challenges Building Trust and Rapport Feeling Isolated Always in the Office Lack of or Less Feedback Wrapping Up Words from the Wise
If your organisation manages contractors then your staff need to understand the health and safety issues. This course is the answer. The expert trainer will set out clearly the legal responsibilities of all relevant parties and explore the practical application of these responsibilities with the course participants. The course will then examine the issues associated with the planning of work to be contracted out and the evaluation, selection, control and monitoring of contractors engaged to undertake the work. Although the main focus is on health and safety, the course will also explain how health and safety issues need to be integrated into your organisation's functional management processes to ensure effective control of contractors. The course will consider all types of contracted activities, including construction and maintenance, cleaning, security, plant installation, etc. This programme will give participants: A clear understanding of the organisation's legal responsibilities for managing contractors The information they need to assess the competence of contractors A practical understanding of risk assessment principles and the transfer of risk to contractors A step-by-step guide to the key aspects of managing contractors in practice, covering:Planning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion Practical guidance on the integration of health and safety controls into organisational procedures for contractor management 1 Introduction Who are contractors? Why manage contractors? Different types of contractors Costs of poor contractor performance 2 Overview of health and safety law and liability Health and safety law and statutory duties Relevance of civil and criminal law Enforcement and prosecution 3 Relevant legislation for controlling contractors Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations 1999 Construction (Design and Management) Regulations 1994 (as amended, 2007) Other relevant legislation Contract law 4 Managing contractors in practice Exercise - how well is it happening? The objectives Five step approachPlanning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion 5 Planning the work Scope and extent Risk assessment Interface and other activities Who controls what? Contract arrangements 6 Selecting the right contractor(s) Locating contractor organisations Selection the right contractors Assessing contractor competence Approved lists/frameworks Tender process 7 Pre-work commencement Co-ordination and co-operation Exchange of information Contractor risk assessments and method statements Permits to work Case study exercise 8 During contract work Communication and liaison Supervision and inspection of the work Inspection and reporting procedures Security issues Facilities and access 9 Reviewing work on completion Why, what and how? Achieving continuous improvement in contractor performance 10 Questions, discussion and review
Duration 3 Days 18 CPD hours This course is intended for Developers & Developer Consultants Overview To discuss the role of the ABAP Dictionary in the SAP system and its scope of functions. This course discusses the role of the ABAP Dictionary in the SAP system and its scope of functions. Introduction to the ABAP Dictionary Describing the ABAP Dictionary Data Types in the ABAP Dictionary Creating Domains and Data Elements Creating Flat Structures Creating Table Types and Deep Structures Creating Type Groups Database Tables Creating Transparent Tables Defining Cluster Tables and Pooled Tables Performance During Table Access Creating Database Table Indexes Setting Up Table Buffering Input Checks Creating Fixed Values Defining Foreign Keys to Perform Input Checks Creating Text Tables Dictionary Object Dependencies Differentiating Between Active and Inactive Dictionary Objects Identifying Dependencies with ABAP Dictionary Objects Table Changes Performing a Table Conversion Enhancing Tables Using Append Structures Views and Maintenance Views Creating Database Views Creating Maintenance Views Creating View Clusters Search Helps Creating Search Helps Applying Advanced Search Help Techniques
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary Lab outline Execute Your First Python Program Use the Python Interactive Shell Explore Foundation Python Data Types Explore Complex Python Data Types Use Standard String Operations Use Basic Pattern Matching Reformat MAC Addresses Use the if-else Construct Use for Loops Use while Loops Create and Use Functions Create and Use Classes Use the Python main() Construct Traverse the File Structure Read Data in Comma-Separated Values (CSV) Format Read, Store, and Retrieve Data in XML Format Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format Read, Store, and Retrieve Data in a Raw or Unstructured Format Import Modules from the Python Standard Library Import External Libraries Create a Python Module Prompt the User for Input Use Command-Line Arguments Manage Exceptions with the try-except Structure Manage Exceptions with the try-except-finally Structure Use Assertions Use Simple Debugging Methods Use the Python Debugger Code a Practical Debugging Script
Duration 3 Days 18 CPD hours This course is intended for This Yellow Belt training is intended for managers and employees from companies or government institutions who want to get acquainted with Lean Six Sigma or (soon) will have to deal with Lean Six Sigma in their own organization Overview During this training you will become acquainted with the essence of Lean Six Sigma and the importance of improvement management. It discusses how a Lean Six Sigma improvement project is approached, who plays an important role in an improvement project, what it yields as an employee or manager if this methodology is introduced in the organization and what should be taken into account when implementing. Theory and practice go hand in hand. The training encourages you to think about the value for your customer and which methodology best suits your role and your value in a process. This makes Lean and Six Sigma understandable and applicable. We also show what is involved in the introduction of LeanSix Sigma and there are various discussions about the introduction and the 'do's and don'ts of Lean Six Sigma. Course Outline Lean & Six Sigma Overview Basic Statistics Lean Six Sigma: the DMAIC Roadmap Lean Six Sigma: Tools Additional course details: Nexus Humans Lean Six Sigma Yellow Belt training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Lean Six Sigma Yellow Belt course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, and Program/Project Managers. Overview Learn the fundamental concepts of the ABAP programming languageEfficiently use the ABAP Workbench toolsCreate simple application programs with user dialogs (list, selection screen, screens, Web Dynpro) and database dialogs (reading from the database) In this course, students gain knowledge of the fundamental concepts of ABAP and learn how to comfortably and efficiently work with the ABAP Workbench tools in order to undertake custom developments with confidence. Flow of an ABAP Program Describing the Processing of ABAP Programs ABAP Workbench Introduction Introducing the ABAP Development Environment Organizing ABAP Developments Developing Programs Finalizing Development Basic ABAP Language Elements Defining Elementary Data Objects Using Basic ABAP Statements Working with the ABAP Debugger Modularization Introducing Modularization Modularizing Using Subroutines Modularizing Using Function Modules Implementing Function Modules Modularizing Using BAPIs Modularizing Using Global Classes Implementing Simple Global Classes and Static Methods Modularizing Using Local Classes Complex Data Objects Working with Structures Working with Internal Tables Data Modeling and Data Retrieval Modeling Data Reading Single Database Records Reading Multiple Database Records Handling Other Aspects of Database Access Working with Authorization Checks Classic ABAP Report Implementing ABAP Lists Implementing Selection Screens Implementing Events of ABAP Reports Screen Creating Screens Creating Input/Output Fields Implementing Data Transport SAP List Viewer Using the SAP List Viewer Web Dynpro ABAP Describing Web Dynpro ABAP Implementing Navigation in Web Dynpro Implementing Data Transport in Web Dynpro Program Analysis Tools Using the Code Inspector ABAP Development Tools for SAP NetWeaver Describing ABAP Development Tools for SAP NetWeaver Creating an ABAP Project in Eclipse SAP Standard Software Adjustments Adjusting the SAP Standard Software Additional course details: Nexus Humans BC400 SAP ABAP Workbench Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BC400 SAP ABAP Workbench Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.