Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Duration 4 Days 24 CPD hours This course is intended for Primary audience: IT administrators, architects, and business leaders who already manage Nutanix clusters in the datacenter, but who would like more in-depth knowledge of Nutanix datacenter administration. Anyone seeking preparation for the Nutanix Platform Professional (NPP) Advanced certification (in development).Secondary audience: Managers and technical staff seeking more detailed information before making a purchase decision. Overview Protect intellectual property and company data to guarantee business continuity with a complete, advanced data protection strategy.Practice advanced datacenter management procedures using hands on labs.Get the most out of Nutanix systems by maximizing configuration and operation for peak efficiency.Validate new skills by preparing for and completing the Nutanix Platform Professional Advanced certification. The Nutanix AAPM Advanced Administration & Performance Management course is an advanced level training program for experienced Nutanix data center administrators, technicians, and support personnel.The course features comprehensive coverage of performance management for Nutanix clusters, including options for performance optimization, troubleshooting issues and tuning. Learn through hands-on labs to monitor system performance, advanced networking and storage to help optimize data center administration.Advanced Administration explains in detail how to use the major Acropolis services such as Acropolis Block Services (ABS) and Acropolis File Services (AFS). The course also explains how to define and manage assets and applications using Calm, including how to connect to clouds, automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.Take advantage of Flash mode to improve system performance as well as how to effectively clone and delete VMs, move them between storage containers, and how to manage VMs (tagging, sizing, migration). Performance ManagementManaging Controller VM ServicesAdvanced Virtual Machine AdministrationImplementing Business Continuity/Disaster RecoveryConfiguring Advanced NetworkingCustomizing Security ServicesManaging Acropolis ServicesPrism Central Management
Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence
Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Process Owner/ Team Lead/ Power User Overview This course will prepare you to: configure asset accounting manage asset master data perform day to day asset transactions perform periodic asset transactions manual legacy data transfer for assets This course gives you a thorough overview of Asset Accounting configuration and processes with SAP S/4HANA. Course Outline Chart of Depreciation/Depreciation Areas Asset Classes Asset Master Data Daily Asset Accounting Business Processes Valuation and Depreciation Period and Year-End Closing Processes Investment Support Measures Information System Asset Legacy Data Transfer Additional course details: Nexus Humans S4F17 SAP Asset Accounting in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4F17 SAP Asset Accounting in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators System engineers who work in data center solutions and manage data center management policies Cisco integrators and partners Overview After taking this course, you should be able to: Understand Cisco UCS Director architecture Understand deployment models of Cisco UCS Director Configure virtual data centers, policies, and catalogs Understand the unified infrastructure management capabilities of Cisco UCS Director Understand orchestration and build advanced workflows Understand application containers The Cisco UCS Director Foundation (UCSDF) v6.6 course helps you understand concepts, architecture, and deployment use cases for Cisco UCS© Director. You will gain hands-on experience in deploying basic Cisco UCS Director solutions. You will also practice using core features that most implementations require, such as services design, using the self-service portal for provisioning services, creating workflows that enable cloud automation and standardize IT services, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Understanding Cisco UCS Director Deployment Explaining Cisco UCS Director Deployment Explaining Global System Settings Understanding Site and Pod Management Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Understanding the Design Phase Understanding Policies Understanding vDC and Groups Use Case Understanding Deployment Through the Self-Service Portal Understanding the Self-Service Provisioning Portal Understanding Service Request Introducing Orchestration Understanding Orchestration Reporting and Monitoring in Cisco UCS Director Understanding Chargeback in Cisco UCS Director Understanding Reports in Cisco UCS Director Introducing Application Containers Understanding Application Containers
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Developers, Solutions Architects, and System Administrators. Overview Work with SAP Fiori ApplicationsUnderstand and leverage the architectures and principles of SAP Fiori and SAP UX DesignConfigure and customize SAP FioriConnect SAP Fiori with other technologies This course provides participants with an overview of Fiori Design Principles. End-User Perspective Explore the Design of SAP Fiori Explore the SAP Fiori Launchpad Explore SAP Fiori Data Handling Personalize SAP Fiori Foundation Explain User Interfaces Explain Data Services Explain Application Types Architecture Examine SAP Fiori for Suite on Any DB Examine SAP Fiori for Suite on HANA Examine SAP Fiori for S/4HANA Examine SAP Fiori Mobile Configuration Create SAP Fiori Groups Create SAP Fiori Catalogs Create LPD_CUST Target Mappings Create SAPUI5 Fiori Target Mappings Create Web Dynpro Target Mappings Create Transaction Target Mappings Configure Analytical Applications Theming Use the UI Theme Designer Use SAP Screen Personas Integration Integrate SAP Workflow Operate SAP Fiori Standalone Explore SAP HANA Cloud Platform Additional course details: Nexus Humans UX100 SAP Fiori - Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the UX100 SAP Fiori - Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Anyone interested in getting an overview of SAP S/4HANA Overview This course will prepare you to: Explain how SAP S/4HANA supports the digital transformation Navigate in SAP S/4HANA using SAP Fiori UX and other client technologies Describe system-wide concepts such as organizational elements or master data Describe key business processes of SAP S/4HANA Enterprise Management and SAP S/4HANA LoB solutions Describe integration scenarios between SAP S/4HANA and SAP Cloud solutions Explain SAP S/4HANA embedded analytics capabilities and additional BI/BW tools Gain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoption This course provides an overview of SAP S/4HANA for learners who do not yet have specific SAP background knowledge and want to build SAP S/4HANA skills. Module 1 SAP S/4HANA Overview Module 2 Navigation Module 3 System-wide concepts Module 4 Logistics capabilities Module 5 Finance capabilities Module 6 Human Resources capabilities Module 7 SAP Activate Additional course details: Nexus Humans S4H00 SAP S/4HANA Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H00 SAP S/4HANA Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability. This course is also designed for you to prepare for the CyberSAFE credential. You can obtain your CyberSAFE certificate by completing the CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify security compliance measures. Address social engineering attempts. Secure devices such as desktops, laptops, tablets, smartphones, and more. Use the Internet securely. Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:Understand both security and compliance needs and requirements.Recognize and avoid phishing and other social engineering attempts.Recognize and avoid viruses, ransomware, and other malware.Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Identifying Security Compliance Measures Topic A: Identify Organizational Compliance Requirements and Resources Topic B: Identify Legal Compliance Requirements and Resources Topic C: Identify Industry Compliance Requirements and Resources Recognizing and Addressing Social Engineering Attacks Topic A: Recognize Phishing and Other Social Engineering Attacks Topic B: Defend Against Phishing and Other Social Engineering Attacks Securing Devices Topic A: Maintain Physical Security of Devices Topic B: Use Secure Authentication Methods Topic C: Protect Your Data Topic D: Defend Against Malware Topic E: Use Wireless Devices Securely Using the Internet Securely Topic A: Browse the Web Safely Topic B: Use Email Securely Topic C: Use Social Networks Securely Topic D: Use Cloud Services Securely Topic E: Work from Remote Locations Securely
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.