• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6022 Computing & IT courses

Introduction to Computer & Building PC

4.8(9)

By Skill Up

Develop the ability to build your own PC and learn the fundamentals of computers with the help of

Introduction to Computer & Building PC
Delivered Online On Demand3 hours 8 minutes
£25

Check Point Cyber Security Administrator (CCSA R80.10)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical professionals who support, install, deploy or administer Check Point Software Blades. Overview Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.Describe the key elements of Check Point?s unified Security Management Architecture.Recognize SmartConsole features, functions and tools.Understand Check Point deployment options.Describe the basic functions of Gaia.Describe the essential elements of a Security Policy.Understand how traffic inspection takes place in a unified Security Policy.Summarize how administration roles and permissions assist in managing policy.Recall how to implement backup techniques.Understand the Check Point policy layer concept.Recognize Check Point security solutions and products and how they work to protect your network.Understand licensing and contract requirements for Check Point security products.Identify tools designed to monitor data, determine threats and recognize performance improvements.Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.Understand Site-to-Site and Remote Access VPN deployments and communities.Understand how to analyze and interpret VPN traffic.Recognize how to define users and user groups.Understand how to manage user access for internal and external users.Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. Introduction to Check Point Technology Security Policy Management Policy Layers Check Point Security Solutions and Licensing Traffic Visibility Basic Concepts of VPNManaging User Access Working with ClusterXLAdministrator Task Implementation Additional course details: Nexus Humans Check Point Cyber Security Administrator (CCSA R80.10) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Check Point Cyber Security Administrator (CCSA R80.10) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Check Point Cyber Security Administrator (CCSA R80.10)
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Dynamics CRM 4.0 User Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for individuals or anyone that plans to implement, use, maintain, or support Microsoft CRM in their organization. Overview After completing this course, students will be able to: Microsoft CRM User Interface and application terminology, Basic and advanced navigation and record maintenance, Microsoft CRM Client for Outlook functionality and synchronization, Planning and budgeting tasks related to marketing campaigns, Create and manage customer lists This three-day instructor-led course provides students with the knowledge and skills to improve their business processes by using the key features of sales management, marketing automation, service management, and service scheduling. This three-day instructor-led course provides students with the knowledge and skills to improve their business processes by using the key features of sales management, marketing automation, service management, and service scheduling. Additional course details: Nexus Humans Microsoft Dynamics CRM 4.0 User Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Dynamics CRM 4.0 User Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Dynamics CRM 4.0 User Training
Delivered OnlineFlexible Dates
Price on Enquiry

CV862 IBM DB2 11 for zOS Implementation Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone responsible for maintaining, installing or migrating DB2 10 for z/OS to DB2 11 for z/OS, or installing DB2 11 for z/OS. Overview After completing this course, you should be able to:Prepare z/OS TSO environment to run the Install CLISTProvide appropriate parameters for the Install CLISTExecute the Install CLISTDefine DB2 10 for z/OS Define VSAM catalog and aliasDefine system data sets and databasesInitialize system data sets and databasesDefine DB2 10 for z/OS initialization parametersDefine user authorization exitsRecord DB2 11 for z/OS data to SMFEstablish subsystem securityVerify the DB2 10 for z/OS installationUpdate subsystem parametersCreate a new subsystem parameter moduleMigrate DB2 10 for z/OS to DB2 11 for z/OS Conversion ModeEnable DB2 11 for z/OS New Function ModeVerify migrationConvert the BSDS and Catalog/Directory to 10-byte RBA and LRSN usage This course is for installers of DB2 10 z/OS and/or migration to DB2 11 for z/OS using the Install CLIST. The participants are involved in lectures that explain DB2 11 components and pointers, and the processes used to install or migrate from DB2 10. Course Outline Installation preparation for DB2 10 for z/OS Installation CLIST Installing the DB2 10 subsystem Verification of DB2 10 with the sample applications Performing parameter update Migrating to DB2 11 conversion mode DB2 10 enabling-new-function and new-function modes Verification of DB2 11 with the sample applications 10-byte RBA and LRSN (new) Additional course details: Nexus Humans CV862 IBM DB2 11 for zOS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV862 IBM DB2 11 for zOS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CV862 IBM DB2 11 for zOS Implementation Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)
Delivered OnlineFlexible Dates
Price on Enquiry

WM666 IBM Integration Bus V10 Application Development I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for experienced Integration Specialists and Senior-Level Developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of the IBM Integration BusDevelop, deploy, and test message flow applicationsGenerate message flow applications from predefined patternsUse IBM Integration Bus problem determination aids to diagnose and solve development and runtime errorsDescribe the function and appropriate use of IBM Integration Bus processing nodesWrite basic Extended Structured Query Language and Java programs to transform dataUse the IBM Graphical Data Mapping editor to transform dataDefine, use, and test simple XML and Data Format Description Language (DFDL) data modelsDescribe supported transport protocols and how to call them in message flows This course teaches you how to use IBM Integration Bus to develop, deploy, and support message flow applications. Students will learn how to construct applications to transport and transform data. Course Outline Course introduction Introduction to IBM Integration Bus Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Course summary Additional course details: Nexus Humans WM666 IBM Integration Bus V10 Application Development I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM666 IBM Integration Bus V10 Application Development I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM666 IBM Integration Bus V10 Application Development I
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures: Security architects Cloud architects Network engineers and administrators System engineers and adminstrators Cloud security consumers Cloud application administrators IT managers Line of business managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe public, private, and hybrid cloud models, concepts, and design Explain the concepts and components for securing cloud environments Describe Cisco security offerings for Amazon Web Services (AWS) Define methods to secure SaaS application usage The Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course gives you a technical overview of basic concepts and components of the cloud, and the Cisco© solutions used to provide comprehensive security of your cloud-based environment. In this primarily lecture-based course, you?ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch? Cloud, Cisco CloudLock, Cisco Umbrella? and more to protect the user when using cloud-based applications. Introducing the Cloud Describe the Evolution of Cloud Computing Explain Cloud Service Models Explore Cloud Deployment Models Introducing Securing the Cloud Describe the Cisco Threat-Centric Approach to Network Security Describe Cloud Physical Environment Security Describe Cloud Network Infrastructure Security Explain Application Security Explore Cloud Management and API Security Describe Cisco Cloud-Based Security Solutions Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE) Describe Cisco CloudCenter for MultiCloud Management Describe Cisco Stealthwatch Describing Cloud Security Solutions Using AWS Identify AWS Security Offerings Identify Cisco Security Solutions in AWS Introducing Security in an SaaS Environment Describe SaaS Applications Describe SaaS Security Challenges Explain Cloud Access Security Broker Describe Cisco CloudLock Describe OAuth and OAuth Attacks Describe Cisco Advanced Malware Protection for Endpoints Describe Cisco Cloud Email Security Describe Cisco Umbrella Lab outline Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore Cisco Security Solutions in AWS Marketplace Explore the Cisco CloudLock Dashboard and User Security Explore Cisco CloudLock Application and Data Security Explore Cisco Advanced Malware Protection (AMP) Endpoints Explore the Cisco Umbrella Roaming Client Additional course details: Nexus Humans Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)
Delivered OnlineFlexible Dates
Price on Enquiry

HA301 SAP HANA 2.0 SPS04 Advanced Modeling

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Business application consultant Data Consultant / Manager Database Administrator Application developer BI specialist Overview This course will prepare you to: Understand and put into practice the main advanced modeling capabilities of SAP HANA 2.0 SPS04 in the areas of text search and analysis, graph modeling, spatial analysis and predictive modeling. Promote these advanced modeling capabilities to extend the core SAP HANA Modeling features. Broaden your experience with the modern SAP HANA tooling in XS Advanced (SAP Web IDE for SAP HANA) This course provides advanced knowledge and practical experience on several topics that are included in, or connected to, the scope of the modeler role. Its purpose is to take a step further, beyond the core modeling knowledge from HA300, and to demonstrate how applications powered by SAP HANA can benefit from innovations such as Spatial Data Storage and Processing, Text Search and Analysis, Predictive Analysis and Graph Modeling.The course is supported by many demos and exercise, which demonstrate the advanced modeling capabilities in several scenarios. For example, working with classical schemas or HDI containers in XS Advanced, using the SQL console, developing graphical models. Some of the proposed case studies blend together several modeling capabilities, such as text with spatial, or text with graph.An introduction to SAP HANA Series Data is also provided. Introduction to Advanced ModelingSAP HANA Predictive Analysis Library (PAL) Describing SAP HANA PAL Using PAL in Flowgraphs Calling PAL Functions in Calculation Views Calling PAL Procedures in SQL Scripts Exploring the PAL Library SAP HANA Spatial Introducing SAP HANA Spatial Working with Spatial Data Types Importing and Exporting Spatial Data Accessing and Manipulating Spatial Data Using Spatial Clustering SAP HANA Graph Defining SAP HANA Graph Workspace Describing the Different Graph Algorithms Using the Graph Node in Calculation Views Using GraphScript Procedures SAP HANA Text Understanding Full Text Search Understanding Text Analysis Understanding Text Mining SAP HANA Series Data Getting Started with SAP HANA Series Data

HA301 SAP HANA 2.0 SPS04 Advanced Modeling
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Account manager Deployment engineer Deployment project manager Sales engineer Overview After taking this course, you should be able to: Describe CCE flows and processes required to support and troubleshoot the PCCE deployment Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment The Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco© PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues CCE Flows and Process Review Troubleshooting and Support Methodology PCCE Component Review PCCE Call Flow Review CCE Diagnostic Tools Diagnostic Framework Suite Run Analysis Manager Run Unified System Command-Line Interface (CLI) Troubleshooting CCE Troubleshoot Certificates Troubleshoot Cisco Finesse Troubleshoot a PCCE Deployment Additional course details: Nexus Humans Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry