• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10686 Concept courses

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the Cisco IOS XR 64-Bit software architecture and Linux system fundamentals Describe the major differences between classic Cisco IOS XR software and Cisco IOS XR 64-Bit software on the ASR 9000 Series routers Migrate an ASR 9000 Series router from classic IOS XR software to Cisco IOS XR 64-Bit software Perform and explain Cisco IOS XR 64-Bit software installations Configure and describe Cisco IOS XR 64-Bit software features The Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) course covers the migration from classic 32-bit Cisco IOS© XR software to Cisco IOS XR 64-Bit software on the Cisco© ASR 9000 Series Aggregation Services Routers. This course will also examine the software architecture, boot process, and auto-provisioning of the Cisco IOS XR 64-bit software, as well as showing you how to install Cisco IOS XR and third-party software packages. In addition, it will investigate data models and show you how to implement telemetry, model-driven programmability, and application hosting services. Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 Series IOS XR 64-Bit Software vs. Classic 32-Bit Software Exploring Linux Fundamentals Creating User Profiles Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Examining the Boot Process Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Features Investigating Data Models Implementing Telemetry Exploring Model-Driven Programmability Employing Application Hosting Additional course details: Nexus Humans Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. IntroductionThe Traps? technology alternative to endpoint defenseTraps? Exploit and Malware protectionTraps? Product ArchitectureTraps? DeploymentTraps? Exploit Policy ManagementTraps? Malware Protection PoliciesTraps? ForensicsPractical Traps? Implementation considerations Additional course details: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Firewall (NSE 7)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the administration and support of a security infrastructure using FortiGate appliances. Overview Monitor traffic passing through FortiGate Optimize FortiGate memory usage Diagnose using FortiGate tools such as the built-in sniffer and ''diagnose debug flow'' command Monitor statistics for user traffic, traffic shaping, user authentication, IPsec, web proxy, BGP, OSPF and HA Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, user authentication, *IPsec, FortiGuard, UTM inspection, explicit web proxy, routing, and HA Describe the processing flow of FortiGate packet inspection Configure FortiGate for external BGP and OSPF This 3-day class provides more in-depth work with FortiGate infrastructure and architecture, combined with enhanced troubleshooting methods and tools to isolate and fix the most common issues in networks with FortiGate devices. Module 1: Security Fabric Configuring the Security Fabric Troubleshooting: Security Fabric Physical and logical topology views Module 2: FortiOS Architecture System information Module 3: System Troubleshooting Crash Logs Module 4: Traffic and Session Monitoring Exploring the session table Troubleshooting: Connectivity issues Module 5: Routing Failover of existing sessions Troubleshooting: Routing Module 6: FortiGuard Troubleshooting: Local FDS issue Troubleshooting: Rating lookups Module 7: Central Management FortiManager and registration Module 8: OSPF Configuring OSPF Troubleshooting: OSPF Module 9: Web Filtering and Antivirus Configuring Web Filtering and AV Troubleshooting: Web Filetering Troubleshooting: Antivirus Module 10: IPS Configuring IPS IPS custom signatures Module 11: BGP Configuring BGP Troubleshooting: BGHP neighbor Troubleshooting: BGP routing Configuring prefix lists Module 12: IPsec Troubleshooting: IPsec VPN Manager Module 13: Auto Discovery VPN Configuring ADVPN and IBGP Troubleshooting: OSPF and BGP' Additional course details: Nexus Humans Enterprise Firewall (NSE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Firewall (NSE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Enterprise Firewall (NSE 7)
Delivered OnlineFlexible Dates
Price on Enquiry

SCM520 SAP Purchasing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. In this course, students become familiar with options for optimizing and simplifying purchasing processes and their prerequisites. Students will also learn about additional, special functions and customizing settings. Purchasing Master Data Creating Material Master Records for Purchasing Creating Vendor Master Records for Purchasing Using Partner Functions in Purchasing Sources of Supply and Conditions Analyzing Price Determination Basics Creating Purchasing Info Records Creating Special Info Records Using Special Functions in Info Records Creating Central Contracts Creating Contracts for Material Groups Creating Scheduling Agreements Without Release Documentation Creating Scheduling Agreements with Release Documentation Source Determination Controlling Source Determination with Source Lists Maintaining Source Lists Controlling Source Determination with Quota Arrangements Executing the Planning Run with Quota Arrangements Identifying Additional Aspects of Source Determination Blocking Sources of Supply Creating Purchase Orders with Source Determination Optimized Purchasing Processing Unassigned Purchase Requisitions Processing Assigned Purchase Requisitions Monitoring Purchase Orders Assessing the Buyer Role Document Release Procedure Releasing Purchasing Documents Converting Released Purchase Requisitions Configuring Release Procedures in Customizing Creating Release Procedures Specific Procurement Processes Creating Invoices Using Invoice Plans Creating Blanket Purchase Orders Deploying Subcontracting Purchasing with Manufacturer Part Numbers Deploying Additional Special Procurement Processes Vendor Evaluation Evaluating Vendors Setting Up Vendor Evaluation Purchasing Document Types Customizing Document Types in Purchasing Setting Up Field Selection in Purchasing Documents Deploying Version Management in Purchasing Analyzing Special Aspects in Customizing Defining Function Authorizations for Buyers Integrated Procurement Scenarios Purchasing with SRM and Catalogs Integrating SAP Components Additional course details: Nexus Humans SCM520 SAP Purchasing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM520 SAP Purchasing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM520 SAP Purchasing
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Developer Certified (SDC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is highly recommended for everyone in a company who works in a Scrum Team or anyone who interacts with any Scrum Team. This will also be very useful for those who are interested in understanding the basics of Scrum and how this method could be used effectively. Overview To ensure that students understand the basics of Scrum To enable Scrum Team members to effectively contribute to a Scrum project. To enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects. In this course, students learn to understand the basics of Scrum, effectively contribute to a Scrum project, and learn how to enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects.Successful candidates will be awarded the Scrum Developer Certified (SDC?) certification by SCRUMstudy after passing the included certification exam. Introduction Agile Overview Scrum Overview Principles The Six Scrum Principles Organization Core Roles and Non-core Roles Business Justification Value-driven Delivery Factors used to Determine Business Justification Confirm Benefits Realization Quality Quality Defined Quality, Scope and Business Value Quality Management in Scrum Change Unapproved and Approved Changes Change in Scrum Risk Risks and Issues Risk Management Procedure Introduction to Scrum Project PhasesInitiate Create Project Vision Process Identify Scrum Master and Stakeholders Process Form Scrum Team and Develop Epics processes Create Prioritized Product Backlog and Conduct Release Planning Processes Plan and Estimate Create User Stories Process Estimate User Stories and Commit User Stories Processes Identify Tasks and Estimate Tasks Processes Create Sprint Backlog Process Implement Create Deliverables and Conduct Daily Stand-up processes Groom Prioritized Product Backlog Process Review and Retrospect Demonstrate and Validate Sprint Process Retrospect Sprint Process Additional course details: Nexus Humans Scrum Developer Certified (SDC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Scrum Developer Certified (SDC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Scrum Developer Certified (SDC)
Delivered OnlineFlexible Dates
Price on Enquiry

B6259 IBM Cognos Analytics - Author Reports Advanced V11.1.x

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Authors Overview Please refer to course overview This course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports. Create query models Build a query and connect it to a report Answer a business question by referencing data in a separate query Create reports based on query relationships Create join relationships between queries Combine data containers based on relationships from different queries Create a report comparing the percentage of change Introduction to dimensional reporting concepts Examine data sources and model types Describe the dimensional approach to queries Apply report authoring styles Introduction to dimensional data in reports Use members to create reports Identify sets and tuples in reports Use query calculations and set definitions Dimensional report context Examine dimensional report members Examine dimensional report measures Use the default measure to create a summarized column in a report Focus your dimensional data Focus your report by excluding members of a defined set Compare the use of the filter() function to a detail filter Filter dimensional data using slicers Calculations and dimensional functions Examine dimensional functions Show totals and exclude members Create a percent of base calculation Create advanced dynamic reports Use query macros Control report output using a query macro Create a dynamic growth report Create a report that displays summary data before detailed data and uses singletons to summarize information Design effective prompts Create a prompt that allows users to select conditional formatting values Create a prompt that provides users a choice between different filters Create a prompt to let users choose a column sort order Create a prompt to let users select a display type Examine the report specification Examine report specification flow Identify considerations when modifying report specifications Customize reporting objects Distribute reports Burst a report to email recipients by using a data item Burst a list report to the IBM Cognos Analytics portal by using a burst table Burst a crosstab report to the IBM Cognos Analytics portal by using a burst table and a master detail relationship Enhance user interaction with HTML Create interactive reports using HTML Include additional information with tooltips Send emails using links in a report Introduction to IBM Cognos Active Reports Examine Active Report controls and variables Create a simple Active Report using Static and Data-driven controls Change filtering and selection behavior in a report Create interaction between multiple controls and variables Active Report charts and decks Create an Active Report with a Deck Create an Active Report with 11.0 visualizations

B6259 IBM Cognos Analytics - Author Reports Advanced V11.1.x
Delivered OnlineFlexible Dates
Price on Enquiry

Beginning ASP.NET

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is aimed at developers who want to build web applications using ASP.NET Core or developers who want to make a career building web applications using Microsoft technology. In the web world, the ability to build robust web applications is key. With the knowledge about ASP.NET Core MVC (that makes use of the Model-View-Controller architecture) that you will take away from this course, you will be prepared to meet this need. In today's age, it's important for you as a developer to possess the ability to separate the programming and business logic. This course covering ASP.NET Core 2 will help you develop this skillset. Setting the Stage Introduction to Web Applications Creating ASP.NET Core application Controllers Role of the Controller in ASP.NET MVC Applications Introduction to Routing Our First Controller Implementing our own IActionResult Adding Views Adding Models Passing Data from the Controller to the View Filters Writing a Custom Filter Views The View Engine and the Razor View Engine Working with Layout Generating HTML Partial View View Components Tag Helpers Models Introduction to Models Model Binding The Entity Framework Using the Entity Framework in ASP.NET MVC applications Database Migration Validation Introduction to Validation Client-Side and Server-Side Validation Server-side Validation Client-side Validation Implementation Routing Convention-Based Routing Attribute-Based Routing Route Attribute at the Controller Level Passing Routing Values in HTTP Action Verbs in the Controller Route Constraints Rest Buy Designing Rest Buy Creating the Entities for the Application Creating EF Context and Migration Adding Features, Testing, and Deployment Adding the Registration Feature Creating a Unit Test Upgrading Our Application to Bootstrap 4 Deploying Rest Buy to Azure Additional course details: Nexus Humans Beginning ASP.NET training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning ASP.NET course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Beginning ASP.NET
Delivered OnlineFlexible Dates
Price on Enquiry

MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course should have previous experience with functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role Overview After completing this course, students will be able to: Understand the tasks expected to be completed by the solution architect for Dynamics implementation Complete the solution blueprint artifacts Know where to find technical information to address their customer's questions This course is developed for those aspired to be and new to the solution architect role. This course provides the technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role. The Architect Role The solution architect role Manage Interactions with FastTrack Get to know FastTrack Make the most of FastTrack templates Solution Blueprint Solution blueprint definition and components Project governance and timeline Solution architecture and organizational structure Working with business process catalog Define Environments, Tools, and Deployment Strategy Understand environment planning Application lifecycle management and deployment strategy Using LCS and Azure DevOps Determine Data Management Strategy Data management overview Develop data migration strategy Determine Integration and Interfaces Strategies Develop integration strategy Integration options Define Security Architecture Important security aspects Security framework Define security strategy Define Testing Strategy Testing strategy overview Testing planning and execution Define Performance Testing Strategy Prepare for performance topics Utilize performance testing tools Business Intelligence and Reporting Implement business intelligence and reporting Determine Licensing and Support Understand licensing estimation Understand support options Prepare for Go-Live Complete solution blueprint Prepare for go-live Class recap Additional course details: Nexus Humans MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
Delivered OnlineFlexible Dates
Price on Enquiry