Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for implementing VMware Horizon, Citrix XenApp and XenDesktop, and RDHS solutions. Overview By the end of the course, you should be able to meet the following objectives: Describe the features and functions of App Volumes and VMware Dynamic Environment Manager Demonstrate the architectures of App Volumes and VMware Dynamic Environment Manager Install and configure App Volumes Create and deploy Application Packages and writable volumes Install and configure VMware Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings This three-day course builds your skills in application management using VMware App Volumes© and VMware Dynamic Environment Manager©. You learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use VMware Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Overview of Application and Profile Management Profile Management Application Management Overview of App Volumes Describe the basic architecture and operation of App Volumes Explain the function of App Volumes Manager Explain the function of App Volumes Agent Describe the principles of SAM List the stages of application package life cycle Describe what is a writable volume and how it differs from an AppStack Identify the major requirements to deploy App Volumes App Volumes components App Volumes Installation Overview Describe the installation sequence for the App Volumes Manager Describe the App Volumes operation modes for packages and writable volumes Describe the App Volumes hypervisor connection types and their relationships with operation modes Describe the process of initial configuration of the App Volumes Manager Describe the basic configuration parameters and where these are configured in the App Volumes Manager Web interface Install and perform the initial configuration of the App Volumes Manager in a lab environment Describe the installation steps for the App Volumes Agent Install the App Volumes Agent in target client machines in a lab environment Working with Application Packages Explain the concept of simplified application packaging List the steps of application package life cycle Differentiate between an application, package, and program Create an application package Use markers to assign the new version of an application package Edit an application Edit a package Working with Writable Volumes Overview Describe what a writable volume is and where it is used Compare AppStacks with writable volumes Describe the operation of a writable volume Explain how to assign a writable volume to a desktop Create and assign a writable volume in a lab environment Working with AppStacks Explain how applications in an AppStack are available to a user Describe how to create an AppStack and populate it with applications Describe how to update an application in an existing AppStack Overview of Dynamic Environment Manager Describe VMware Dynamic Environment Manager and its architecture Describe the functional areas and benefits of VMware Dynamic Environment Manager Describe VMware Dynamic Environment Manager features and how it manages profiles Installation of Dynamic Environment Manager Recognize considerations for planning a Dynamic Environment Manager deployment Identify pre-configuration requirements before installing and starting the Dynamic Environment Manager - Management Console Recognize key steps in the installation process of Dynamic Environment Manager Describe the initial configuration process for the management console and FlexEngine Application Configuration Management Explain how a user can use the Dynamic Environment Manager Self-Support tool to recover from application configuration mistakes Explain how administrators and support staff can use the Dynamic Environment Manager Helpdesk Support Tool to troubleshoot profile problems Describe how the Dynamic Environment Manager SyncTool enables and synchronizes the offline use of Dynamic Environment Manager Describe how the Dynamic Environment Manager Application Profiler can be used to create predefined configurations for applications Application Configuration Management Predefined and user-customized application settings Using Application Profiler Using the Self-Support Tool Using the Helpdesk Support Tool
Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Describe the benefits of implementing a decision management solution with Operational Decision Manager.Identify the key user roles that are involved in designing and developing a decision management solution, and the tasks that are associated with each role.Describe the development process of building a business rule application and the collaboration between business and development teams.Set up and customize the Business Object Model (BOM) and vocabulary for rule authoring. Implement the Execution Object Model (XOM) that enables rule execution.Orchestrate rule execution through ruleflows. Author rule artifacts to implement business policies.Debug business rule applications to ensure that the implemented business logic is error-free.Set up and customize testing and simulation for business users.Package and deploy decision services to test and production environments.Integrate decision services for managed execution within an enterprise environment.Monitor and audit execution of decision services.Work with Operational Decision Manager features that support decision governance. This course introduces developers to IBM Operational Decision Manager V8.9.2. It teaches participants the concepts and skills required to design, develop, and integrate a business rule solution with Operational Decision Manager. This course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development. Through instructor-led presentations and hands-on lab exercises, participants learn about the core features of Decision Server, which is the primary working environment for developers. Participants design decision services and work with the object models that are required to author and execute rule artifacts. Participants gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, students become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. Participants also learn how to use Operational Decision Manager features to support decision governance. Introducing IBM Operational Decision Manager Exercise: Operational Decision Manager in action Developing decision services Exercise: Setting up decision services Programming with business rules and developing object models Exercise: Working with the BOM Exercise: Refactoring Orchestrating ruleset execution Exercise: Working with ruleflows Authoring rules Exercise: Exploring action rules Exercise: Authoring action rules Exercise: Authoring decision tables Customizing rule vocabulary with categories and domains Exercise: Working with static domains Exercise: Working with dynamic domains Working with queries Exercise: Working with queries Debugging rules Exercise: Executing rules locally Exercise: Debugging a ruleset Enabling tests and simulations Exercise: Enabling rule validation Managing deployment Exercise: Managing deployment Exercise: Using Build Command to build RuleApps Executing rules with Rule Execution Server Exercise: Exploring the Rule Execution Server console Auditing and monitoring ruleset execution Exercise: Auditing ruleset execution through Decision Warehouse Working with the REST API Exercise: Executing rules as a hosted transparent decision service (HTDS) Additional course details: Nexus Humans WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for The audience for this course includes professionals who are new to Looker who are interested in leveraging Looker for data analysis, visualization, and reporting. The course is designed for individuals seeking to gain a comprehensive understanding of Looker's functionalities and apply these skills in their organizations to drive data-driven decision-making. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore and gain: Solid foundation in Looker's platform: Acquire a comprehensive understanding of Looker's key features, functionality, and interface, enabling you to effectively utilize the platform for your data analysis and visualization needs. Proficiency in LookML and data modeling: Develop essential skills in Looker's unique data modeling language, LookML, to create efficient and customized data models tailored to your organization's specific requirements. Expertise in creating Explores: Learn how to build, customize, and save Explores with dimensions, measures, filters, and calculated fields, empowering you to analyze your data and uncover valuable insights in a short amount of time. Mastery of dashboard design and visualization: Gain the skills to design visually appealing and informative dashboards, create various types of visualizations, and customize them to effectively communicate your data story. Improved content organization with folders and boards: Understand how to effectively use folders and boards in Looker to organize, manage, and discover content, making your data insights easily accessible for you and your team. Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker is a one day, hands-on course designed to equip professionals from a variety of backgrounds with the knowledge and skills needed to harness the full potential of their data using Looker's powerful platform. With the guidance of our expert trainers, you will gain a basic understanding of Looker's features, enabling you to create visually engaging, interactive, and insightful reports and dashboards to drive informed decision-making. Throughout this interactive workshop, you will explore Looker's key functionalities, including connecting to data sources, mastering LookML, building custom Explores, and designing captivating dashboards. With about 40% of the course dedicated to hands-on labs and a guided project, you will have ample opportunity to apply the skills you've learned in real world scenarios. Don't miss this opportunity to elevate your data analysis and visualization capabilities, enhance your professional skill set, and unlock the power of data-driven decision making. Getting Started with Looker Overview of Looker and its key features Navigating the Looker interface Connecting to Data Sources and LookML Basics Setting up and managing data connections Exploring database schemas Understanding LookML: Looker's data modeling language Creating and Customizing Explores Building and customizing Explores Adding dimensions, measures, and filters Creating calculated fields Data Visualization and Dashboard Design Creating visualizations using Looker's visualization library Customizing chart types, colors, and labels Displaying visualizations in dashboards Organizing Content with Folders and Boards Introduction to folders and boards in Looker Creating and managing folders for organizing content Setting up boards for easy content discovery Hands-on Workshop and Project Participants work on a guided project to apply the skills learned Wrap-up and Q&A Additional course details: Nexus Humans Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Navigate the AutoCAD user interfacesUse the fundamental features of AutoCADUse the precision drafting tools in AutoCAD to develop accurate technical drawingsPresent drawings in a detailed and visually impressive way In this course, you will learn to navigate the AutoCAD user interfaces and use the fundamental features of AutoCAD. You will learn to use the precision drafting tools in AutoCAD to develop accurate technical drawings. Getting Started with AutoCAD Starting the Software User Interface Working with Commands Cartesian Workspace Opening an Existing Drawing File Viewing Your Drawing Saving Your Work Basic Drawing & Editing Commands Drawing Lines Erasing Objects Drawing Lines with Polar Tracking Drawing Rectangles Drawing Circles Undo and Redo Actions Projects - Creating a Simple Drawing Create a Simple Drawing Create Simple Shapes Drawing Precision in AutoCAD Using Running Object Snaps Using Object Snap Overrides Polar Tracking at Angles Object Snap Tracking Drawing with Snap and Grid (Optional) Making Changes in Your Drawing Selecting Objects for Editing Moving Objects Copying Objects Rotating Objects Scaling Objects Mirroring Objects Editing with Grips Projects - Making Your Drawing More Precise Schematic Project: Electronics Diagram Architectural Project: Landscape Mechanical Project (with Polar & Tracking) Mechanical Project: Surge Protector Mechanical Project: Satellite Organizing Your Drawing with Layers Creating New Drawings With Templates What are Layers? Layer States Changing an Object's Layer Advanced Object Types Drawing Arcs Drawing Polylines Editing Polylines Drawing Polygons Drawing Ellipses Analzying Model and Object Properties Working with Object Properties Measuring Objects Projects - Drawing Organization & Information Architectural Project Mechanical Project Civil Project Advanced Editing Commands Trimming and Extending Objects Stretching Objects Creating Fillets and Chamfers Creating Arrays of Objects Inserting Blocks What are Blocks? Working with Dynamic Blocks Inserting Blocks Inserting Blocks using the Tool Palettes Inserting Blocks using the DesignCenter Inserting Blocks using the Content Explorer Projects - Creating More Complex Objects Mechanical Project 1 - Plate Mechanical Project 2 - Gasket Mechanical Project 3 - Plate Mechanical Project 4 - Rocker Arm Architectural Project 1 - Floor Plan Architectural Project 2 - Floor Plan Civil Project - Parking Lot Setting Up a Layout Printing Concepts Working in Layouts Creating Layouts Creating Layout Viewports Guidelines for Layouts Printing Your Drawing Printing Layouts Print and Plot Settings Projects - Preparing to Print Mechanical Project Architectural Project Text Working with Annotations Adding Text in a Drawing Modifying Multiline Text Formatting Multiline Text Adding Notes with Leaders to Your Drawing Creating Tables Modifying Tables Hatching Hatching Editing Hatches Adding Dimensions Dimensioning Concepts Adding Linear Dimensions Adding Radial and Angular Dimensions Editing Dimensions Projects - Annotating Your Drawing Mechanical Project Architectural Project 1 Architectural Project 2 Civil Project Additional course details: Nexus Humans AutoCAD Level 1 - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AutoCAD Level 1 - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Report Authors Overview What is IBM Cognos Analytics ? Reporting Examine dimensionally modelled and dimensional data sources Examine personal data sources and data modules Examine List reports Aggregate measure/fact data Use shared dimensions to create multi-fact queries Add repeated information to reports Create crosstab reports Create complex crosstab reports Format, sort, and aggregate data in a crosstab report Create discontinuous crosstab reports Create Visualization reports Add business logic to reports using IBM Cognos Analytics ? Reporting Focus reports using filters Focus reports using prompts Augment reports using calculations Extend report functionality in IBM Cognos Analytics - Reporting Customize reports with conditional formatting Conditionally format one crosstab measure based on another Drill-through definitions Enhance the report layout Use additional report building techniques This offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting? Create a simple list report Create a report from a dimensionally modeled relational data source Examine personal data sources and data modules Upload personal data Upload custom images Use navigation paths Create a report from a personal data source Examine list reports Group data in a list Format columns in a list Include headers and footers in a list Enhance a list report Aggregate measure/fact data Identify differences in aggregation Explore data aggregation Use shared dimensions to create multi-fact queries Create a multi-fact query in a list report Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create a simple crosstab report Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Create a complex crosstab report Format, sort, and aggregate data in a crosstab Sort, format, and aggregate a crosstab report Create discontinuous crosstab reports Present unrelated items using a discontinuous crosstab Create a visualization report Create and format a visualization report Create a report that uses a Map visualization Show the same data graphically and numerically Focus reports using filters Apply filters to a report Apply a detail filter on fact data in a report Apply a summary filter to a report Focus reports using prompts Create a prompt by adding a parameter Add a value prompt to a report Add a Select & search prompt to a report Create a cascading prompt Augment reports using calculations Add calculations to a report Display prompt selections in the report title Customize reports with conditional formatting Create a multilingual report Highlight exceptional data and conditionally render a column Drill-through definitions Let users navigate to related data in IBM Cognos Analytics Enhance report layout Create a report structured on data items Create a condensed list report Use additional report building techniques Section a report and reuse objects within the same report Reuse layout components in a different report Explore options for reports that contain no data Additional course details: Nexus Humans B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The target audience for the SRE Practitioner course are professionals including: Anyone focused on large-scale service scalability and reliability Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will have learned: Practical view of how to successfully implement a flourishing SRE culture in your organization. The underlying principles of SRE and an understanding of what it is not in terms of anti-patterns, and how you become aware of them to avoid them. The organizational impact of introducing SRE. Acing the art of SLIs and SLOs in a distributed ecosystem and extending the usage of Error Budgets beyond the normal to innovate and avoid risks. Building security and resilience by design in a distributed, zero-trust environment. How do you implement full stack observability, distributed tracing and bring about an Observability-driven development culture? Curating data using AI to move from reactive to proactive and predictive incident management. Also, how you use DataOps to build clean data lineage. Why is Platform Engineering so important in building consistency and predictability of SRE culture? Implementing practical Chaos Engineering. Major incident response responsibilities for a SRE based on incident command framework, and examples of anatomy of unmanaged incidents. Perspective of why SRE can be considered as the purest implementation of DevOps SRE Execution model Understanding the SRE role and understanding why reliability is everyone's problem. SRE success story learnings This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability. SRE Anti-patterns Rebranding Ops or DevOps or Dev as SRE Users notice an issue before you do Measuring until my Edge False positives are worse than no alerts Configuration management trap for snowflakes The Dogpile: Mob incident response Point fixing Production Readiness Gatekeeper Fail-Safe really? SLO is a Proxy for Customer Happiness Define SLIs that meaningfully measure the reliability of a service from a user?s perspective Defining System boundaries in a distributed ecosystem for defining correct SLIs Use error budgets to help your team have better discussions and make better data-driven decisions Overall, Reliability is only as good as the weakest link on your service graph Error thresholds when 3rd party services are used Building Secure and Reliable Systems SRE and their role in Building Secure and Reliable systems Design for Changing Architecture Fault tolerant Design Design for Security Design for Resiliency Design for Scalability Design for Performance Design for Reliability Ensuring Data Security and Privacy Full-Stack Observability Modern Apps are Complex & Unpredictable Slow is the new down Pillars of Observability Implementing Synthetic and End user monitoring Observability driven development Distributed Tracing What happens to Monitoring? Instrumenting using Libraries an Agents Platform Engineering and AIOPs Taking a Platform Centric View solves Organizational scalability challenges such as fragmentation, inconsistency and unpredictability. How do you use AIOps to improve Resiliency How can DataOps help you in the journey A simple recipe to implement AIOps Indicative measurement of AIOps SRE & Incident Response Management SRE Key Responsibilities towards incident response DevOps & SRE and ITIL OODA and SRE Incident Response Closed Loop Remediation and the Advantages Swarming ? Food for Thought AI/ML for better incident management Chaos Engineering Navigating Complexity Chaos Engineering Defined Quick Facts about Chaos Engineering Chaos Monkey Origin Story Who is adopting Chaos Engineering Myths of Chaos Chaos Engineering Experiments GameDay Exercises Security Chaos Engineering Chaos Engineering Resources SRE is the Purest form of DevOps Key Principles of SRE SREs help increase Reliability across the product spectrum Metrics for Success Selection of Target areas SRE Execution Model Culture and Behavioral Skills are key SRE Case study Post-class assignments/exercises Non-abstract Large Scale Design (after Day 1) Engineering Instrumentation- Instrumenting Gremlin (after Day 2)
Duration 5 Days 30 CPD hours This course is intended for Network engineers and technicians that are working in the enterprise sector. Overview - Describe the factors that led to the development of IPv6 and possible uses of this new IP structure - Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software - Implement IPv6 services and applications - Understand the updates to IPv4 routing protocols needed to support IPv6 topologies - Understand multicast concepts and IPv6 multicast specifics - Evaluate the scenario and desired outcome and identify the best transition mechanism for the situation - Describe security issues, how security for IPv6 is different than for IPv4, and emerging practices for IPv6-enabled networks - Describe the standards bodies that define IPv6 address allocation, in addition to one of the leading IPv6 deployment issuesââ¬'multihoming - Describe the deployment strategies that service providers might consider when deploying IPv6 - Describe case studies for enterprise, service provider, and branch networks This course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. Introduction to IPv6 Explaining the Rationale for IPv6 Evaluating IPv6 Features and Benefits Understanding Market Drivers IPv6 Operations Understanding the IPv6 Addressing Architecture Describing the IPv6 Header Format Enabling IPv6 on Hosts Enabling IPv6 on Cisco Routers Using ICMPv6 and Neighbor Discovery IPv6 Services IPv6 Mobility Describing DNS in an IPv6 Environment Understanding DHCPv6 Operations Understanding QoS Support in an IPv6 Environment Using Cisco IOS Software Features IPv6-Enabled Routing Protocols Routing with RIPng Examining OSPFv3 Examining Integrated IS-IS Examining EIGRP for IPv6 Understanding MP-BGP Configuring IPv6 Policy-Based Routing Configuring FHRP for IPv6 Configuring Route Redistribution IPv6 Multicast Services Implementing Multicast in an IPv6 Network Using IPv6 MLD IPv6 Transition Mechanisms Implementing Dual-Stack Describing IPv6 Tunneling Mechanisms IPv6 Security Configuring IPv6 ACLs Using IPsec, IKE, and VPNs Discussing Security Issues in an IPv6 Transition Environment Understanding IPv6 Security Practices Configuring Cisco IOS Firewall for IPv6 Deploying IPv6 Examining IPv6 Address Allocation Understanding the IPv6 Multihoming Issue Identifying IPv6 Enterprise Deployment Strategies IPv6 and Service Providers Identifying IPv6 Service Provider Deployment Understanding Support for IPv6 in MPLS Understanding 6VPE Understanding IPv6 Broadband Access Services IPv6 Case Studies Planning and Implementing IPv6 in Enterprise Networks Planning and Implementing IPv6 in Service Provider Networks Planning and Implementing IPv6 in Branch Networks Lab Exercises Lab 2-1: Enabling IPv6 on Hosts Lab 2-2: Using Neighbor Discovery Lab 3-1: Using Prefix Delegation Lab 4-1: Routing with OSPFv3 Lab 4-2: Routing with IS-IS Lab 4-3: Routing with EIGRP Lab 4-4: Routing with BGP and MP-BGP Lab 5-1: Multicasting Lab 6-1: Implementing Tunnels for IPv6 Lab 7-1: Configuring Advanced ACLs Lab 7-2: Implementing IPsec and IKE Lab 7-3: Configuring Cisco IOS Firewall Lab 9-1: Configuring 6PE and 6VPE Configuration Files Summary Lab Activity Solutions Teardown and Restoration Additional course details: Nexus Humans Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.