• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5802 Computing courses in Coatbridge delivered Online

CCMS Check Point Certified Multi-Domain Security Management Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX

CCMS Check Point Certified Multi-Domain Security Management Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)
Delivered OnlineFlexible Dates
Price on Enquiry

55316 Administering a SQL Database

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows

55316 Administering a SQL Database
Delivered OnlineFlexible Dates
Price on Enquiry

SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Use the SAP HANA cockpit to perform emergency trouble shooting, the SAP HANA traces to investigate for costly statements and to setup SAP HANA Workload Management and SAP HANA Capture and Replay tools. In this course, students will learn how to describe the methods and the tools needed for analyzing performance issues in SAP HANA. Emergency Analysis and Troubleshooting using SAP HANA cockpit 2.0 SP10 Handling System Offline Situations Handling System Hanging but Reachable Situations Analyzing a Suddenly Slow System Structural System Performance Root Cause Analysis Analyzing Memory Issues Analyzing CPU Issues Analyzing Expensive Statements Issues Analyzing Disk and I/O Issues Proactive Monitoring and Performance Safeguarding Configuring SAP HANA Alerting Framework Setting up SAP HANA Workload Management Using SAP HANA Capture and Replay Additional course details: Nexus Humans SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools
Delivered OnlineFlexible Dates
Price on Enquiry

WS-013T00 Azure Stack HCI

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for IT professionals who manage on-premises Windows Server environments and want to use Azure to manage server workloads and run their virtual workloads on Windows Server 2019. They also want to use existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. Overview Describe the Azure Stack portfolio, including Azure Stack HCI, Azure Stack Hub, and Azure Stack Edge Describe the Azure Stack HCI core technologies and management tools. Describe the process of a typical Azure Stack HCI implementation. Identify Azure Stack HCI hybrid capabilities. Implement, manage, and maintain workloads on Azure Stack HCI. Plan for and implement Azure Stack HCI Storage, including Storage QoS and Storage Replica. Plan for Azure Stack HCI Networking. Implement Software Defined Networks in Azure Stack HCI. This three-day course WS-013T00-A is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products. The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles. Introducing Azure Stack HCI Overview of Azure Stack HCI Overview of Azure Stack HCI technologies Overview of Azure Stack HCI management tools Overview of the Azure Stack HCI hybrid capabilities Operating and maintaining Azure Stack HCI Implementing and managing workloads on Azure Stack HCI Maintaining Azure Stack HCI Planning for and implementing Azure Stack HCI storage Overview of Azure Stack HCI Storage core technologies Planning for Storage Spaces Direct in Azure Stack HCI Implementing a Storage Spaces Direct-based hyper-converged infrastructure Managing Storage Spaces Direct in Azure Stack HCI Planning for and implementing Storage QoS Planning for and implementing Storage Replica Planning for and implementing Azure Stack HCI networking Overview of Azure Stack HCI core networking technologies Overview of network virtualization and Software-Defined Networking Planning for and implementing Switch Embedded Teaming Planning for and implementing Datacenter Firewall Planning for and implementing Software Load Balancing Planning for and implementing RAS Gateways

WS-013T00 Azure Stack HCI
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

Java Fundamentals for Android Development

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for software developers or anyone interested in building Android applications. Overview Install Android Studio. Writing a Java Program. Run a Java Program. Write a Java Comment. Understand Java Variables and Their Data Types. Acquiring Good Knowledge of Java Control Flow Statements. Understanding The Java Methods and Arrays. Understanding the Object-Oriented Programming (OOP) Concepts and Java Class. Developing applications for Android? systems requires basic knowledge of Java programming language. Introductory course that focuses on the fundamentals of Java programming language, its framework, syntax, and paradigm. First Step in Java The History of Java How Java Programs work? Install Java JDK and JRE Why did Google choose Java over other programming languages? Android OS Structure Install Android Studio Create and Run Java Projects Creating an Android Project (Java Project) Using Android Studio Writing a Java Program Java Methods Running a Java Program Write a Comment Java Variables and Their Data Type Control Flow Statements Introduction IF ? Else Statement If?Else and Else?If... Statement If Else and Logical Operators Switch Statement While Loop Do-while Loop For Loop The Break Statement The Continue Statement Methods and Arrays Introduction Method Structure Call Method by Value Call Method by Reference Arrays Enter Data to Java Program Object-Oriented Programming (OOP) Concepts Java Class Additional course details: Nexus Humans Java Fundamentals for Android Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Fundamentals for Android Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Java Fundamentals for Android Development
Delivered OnlineFlexible Dates
Price on Enquiry

HA240 SAP Authorization, Security, and Scenarios

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators, developers, developer consultants, system administrators, and technology consultants. Overview This training course will focus on the authorization, security, and integrated scenario. In this course, students will focus on the authorization, security, and integrated scenarios for SAP HANA. Module 1 Creation of authorizations and authorization roles Module 2 User management Module 3 Access control for HANA native models Module 4 Authorization trace Module 5 Auditing Module 6 Authentication and single sign-on options Module 7 Encryption options Module 8 Security considerations for Multitenant Database Containers Module 9 SAP GRC Integration for Governance Risk and Compliance Module 10 HANA use case scenarios and security requirements Module 11 SAP Netweaver Identity Management integration Module 12 Reusing of BW authorizations for SAP HANA applications Module 13 HANA Cloud Platform (HCP) security Module 14 HANA Enterprise Cloud security

HA240 SAP Authorization, Security, and Scenarios
Delivered OnlineFlexible Dates
Price on Enquiry

HA350 SAP HANA - Data Management

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for consultants, project team members, and administrators who want to learn how to implement data provisioning and data transformation for their SAP HANA project. In this course, students will learn the essential techniques and tools of data provisioning and data transformation for SAP HANA. This course will help students identify the most effective data provisioning solutions for their SAP HANA project. Course Outline Trigger-based replication with SAP Landscape Transformation ETL based data provisioning using SAP Data Services Connecting SAP HANA to data sources using SAP HANA Smart Data Access Real-time data loading using Smart Data Streaming ETL based loading using Smart Data Integration and Smart Data Quality SAP HANA Direct Extractor Connection Fundamentals of SAP Replication Server Additional course details: Nexus Humans HA350 SAP HANA - Data Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA350 SAP HANA - Data Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HA350 SAP HANA - Data Management
Delivered OnlineFlexible Dates
Price on Enquiry

HA250 SAP Migration to SAP HANA using DMO

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Support Consultant System Administrator Technology Consultant Overview The objective of this course is to enable students to use the one-step migration procedure (DMO - Database Migration Option) to SAP HANA autonomously. This course covers the most important tasks for an SAP HANA administrator for the combined update & migration of an SAP system to the SAP HANA database. Furthermore, it provides details about the procedure and technical details of the process. Getting Familiar with Database Migration Option (DMO) Listing DMO Benefits Explaining DMO Basics Preparing Database Migration Option (DMO) Procedure Ensuring DMO Prerequisites are Fulfilled on the Host Configuring SAP Host Agent for DMO Examining the SUM UI Configuration of Database Migration Option (DMO) Procedure Starting the DMO Run Continuing DMO with Roadmap Steps Configuration and Checks Continuing DMO with Roadmap Steps Preprocessing Listing DMO Procedure Steps Monitoring the Migration Resetting the DMO Procedure Tuning the DMO Downtime Listing the DMO Steps After Roadmap Step Preprocessing Explaining the DMO Release Schedule Listing Migration Options to SAP HANA

HA250 SAP Migration to SAP HANA using DMO
Delivered OnlineFlexible Dates
Price on Enquiry