Duration 4 Days 24 CPD hours This course is intended for Application Consultant Data Consultant / Manager Developer Consultant Technology Consultant Program / Project Manager Business Analyst Developer User Business Process Owner / Team Lead / Power User Overview This course will prepare you to: Outline SAP Transportation Management business processes Identify and examine the SAP TM building blocks necessary for processing shipments of goods. Engage in Transportation network maintenance, order/requirements integration and management, transportation planning, shipment execution, and freight invoicing and settlement. Use both the SAP ERP and SAP TM systems using the NetWeaver Business Client interface This course will help you to prepare for the blueprinting stage of your SAP Transportation Management implementation or enable you to use the system in your role as a business user. You will gain an overview of the key business transactions and system capabilities to enable you to design the processes you will use within your own organization. You will learn how SAP TM can help you to support Order Management, Transportation Planning, Subcontracting, Execution, Charge Calculation and Settlement. This course is the mandatory foundational prerequisite for all follow-on SAP TM training courses. SAP Transportation Management (SAP TM) Evaluating SAP Transportation Management Evaluating the SAP TM System Landscape SAP TM User Interface Identifying NetWeaver Business Client Components Personalizing Object Worklists Transportation Management Master Data Identifying Master Data Requirements for SAP TM Evaluating the Organizational Structures Used in SAP TM Defining Conditions Determining Freight Incompatibilities Determining Dangerous Goods Shipping Requirements Transportation Order Management Triggering the Transportation Management Process Integrating SAP ERP with SAP TM Managing the Freight Forwarding Process Booking Capacities Transportation Planning Defining the Transportation Planning Process Viewing Freight Units Building Packages Defining Selection Profiles Determining Planning Profiles Accessing the Transportation Cockpit Creating Transportation Proposals Creating Freight Orders Optimizing Loads Transportation Execution Performing Carrier Selection Tendering Freight Orders Triggering Delivery Creation from SAP TM Executing Transportation in SAP ERP Integration between SAP TM and SAP EWM Generating Outputs Monitoring Transportation Events Exporting Freight Orders Analyzing Transportation Management Performance Charge Calculation and Freight Settlement Managing Charge Calculation Master Data Calculating Supplier Charges in Freight Orders Settling Supplier Freight Charges Calculating and Settling Customer Charges in Forwarding Orders Distributing Costs Settling Freight Charges in Group Logistics Companies Managing Freight Contracts
Duration 4 Days 24 CPD hours This course is intended for This course is designed for those who have little or no experience with Linux and whoare seeking a fundamental understanding of the SUSE Linux Enterprise 15 operatingsystem. It is also ideal for those who want to begin preparing for the SUSE CertifiedAdministrator in Enterprise Linux 15 certification exam. Overview Attendees will be taught the following concepts and skills that are fundamental inadministering the SLES Operating System:Install SLES 15 and perform basic Linux configurationBecome familiar with the command line interface & commonly usedcommandsConfigure and use Remote AdministrationManage the boot process and understand systemsManage processes and jobsManage users and permissionsManage softwareConfigure basic networkingManage storageMonitor SUSE Linux Enterprise This course is designed for those who are seeking a fundamental understanding of the SUSE Linux Enterprise Server (SLES) operating system.Students will be able to install and configure a SLES 15 server and integrate it into an existing network. They will be able to perform the most important system administration tasks. Overview of SUSE Linux Enterprise Flavors of SUSE Linux SLE Maintenance Model YaST The Linux Filesystem Understand the Filesystem Hierarchy Standard (FHS) Understand the Linux File Types Work with the Command Line Getting Help at the Command Line Understand the Shell Environment The Vim EditorRemote Administration Understand Remote Administration with OpenSSH Understand Remote Administration with VNC System Initialization Understand the Boot Process Understand the GRUB2 Boot Loader Define and Describe systems Process Management Understand Process Administration Understand Background Processes Understand Process Scheduling Understand xinet Identify and Security Understand User Management Understand Filesystem Permissions Understand Privilege Delegation Software Management Understand Compiling Software from Source Understand Management of RPM Packages Understand Software Management with Libzypp Network Management Understand Network Management in SLE Understand Network Management with Wicked Understand firewall Storage Management Understand the Linux I/O Stack Recognize Traditional Linux File Systems Configure Logical Volume Management (LVM) Configure Software RAID Define and Describe BtrFS Understand NFSv4 Administration and Monitoring Understand Time Sync with chrony Configure System Logging Understand Supportconfig Installing SUSE Linux Enterprise Understand the Unified Installer Understand Extensions and Modules Understand AutoYaST
Duration 3 Days 18 CPD hours This course is intended for Java Fundamentals is designed for tech enthusiasts who are familiar with some programming languages and want a quick introduction to the most important principles of Java. Overview After completing this course, you will be able to: Create and run Java programs Use data types, data structures, and control flow in your code Implement best practices while creating objects Work with constructors and inheritance Understand advanced data structures to organize and store data Employ generics for stronger check-types during compilation Learn to handle exceptions in your code Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. The course begins with an introduction to the language, its philosophy, and evolution over time, until the latest release. You'll learn how the javac/java tools work and what Java packages are - the way a Java program is usually organized. Once you are comfortable with this, you'll be introduced to advanced concepts of the language, such as control flow keywords. You'll explore object-oriented programming and the part it plays in making Java what it is. In the concluding lessons, you'll be familiarized with classes, typecasting, and interfaces, and understand the use of data structures, arrays, strings, handling exceptions, and creating generics. Introduction to Java The Java Ecosystem Our First Java Application Packages Variables, Data Types, and Operators Variables and Data Types Integral Data Types Type casting Control Flow Conditional Statements Looping Constructs Object-Oriented Programming Object-Oriented Principles Classes and Objects Constructors The this Keyword Inheritance Overloading Constructor Overloading Polymorphism and Overriding Annotations References OOP in Depth Interfaces Typecasting The Object Class Autoboxing and Unboxing Abstract Classes and Methods Data Structures, Arrays, and Strings Data Structures and Algorithms Strings The Java Collections Framework and Generics Reading Data from Files The Java Collections Framework Generics Collection Advanced Data Structures in Java Implementing a Custom Linked List Implementing Binary Search Tree Enumerations Set and Uniqueness in Set Exception Handling Motivation behind Exceptions Exception Sources Exception Mechanics Best Practices
Duration 1 Days 6 CPD hours This course is intended for Multi-role (consumers, business authors, professional authors, developers, administrators, modelers, project managers) This course provides students with an overview of the IBM Cognos Analytics suite of products and their underlying architecture. Students will examine each component as it relates to an Analytics solution & will be shown a range of resources. IBM Cognos Analytics Describe IBM Cognos Analytics Describe IBM Cognos Analytics components Describe IBM Cognos architecture at a high level Describe IBM Cognos security at a high level Consume Content in IBM Cognos Analytics Where do consumers access BI content? Use published reports Drill through to related data Specify run report options Specify properties of an entry Alerts and Watch Items Create Reports in IBM Cognos Analytics Overview of reporting and report authoring Identify package types, uploaded files, and data modules available for reporting Examine IBM Cognos Analytics - Reporting Examine the interface Explore different report types Create a simple, sorted, and formatted report Create a report view Create a subscription Create an Active Report Import and report on personal data Create Dashboards in IBM Cognos Analytics Describe IBM Cognos Dashboarding Identify the IBM Cognos Dashboarding user interface Add report content and tools to create dashboards Widget-to-widget communication Filter data in the dashboard Sort, group and ungroup, and calculate data Create Metadata Models in IBM Cognos Analytics Define IBM Cognos Framework Manager and its purpose Describe the IBM Cognos Framework Manager environment Describe IBM Cognos Cube Designer Get high-level content from Dynamic Cubes course and/or FM course Web-based Modeling Create Data Modules Extend IBM Cognos Analytics Introduction to IBM Cognos Mobile Key features Examine Cognos Mobile architecture Identify supported products Introduction to IBM Cognos BI for Microsoft Office Describe Cognos Analysis for Excel (CAFÂ) Compare IBM Cognos Analytics & IBM Cognos BI New features in IBM Cognos Analytics Changes from IBM Cognos BI to IBM Cognos Analytics Legacy option Examine Event Studio Examine the role of Event Studio in Performance Management List the benefits of Event Studio Examine Metric Studio Identify scorecards, metrics, and metric types Organize metrics with strategies Track initiatives with projects
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodology Assess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deployment Apply advanced authentication and load balancing principles In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, you will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare you for the Citrix Certified Expert in Networking (CCE-N) exam. Module 1: Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirementrs User Segmentation Application Assessment Capabilities Assessment Module 2: Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Module 3: Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Module 4: Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Module 5: Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Module 6: Advanced Load Distribution and Link Load balancing Advanced Load Balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Module 7: Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new)
Duration 2 Days 12 CPD hours Overview Working in a hands-on learning environment guided by our expert practitioner, students will explore: Introduction to Continuous Integration, Continuous Deployment and Jenkins-CI Installing and Running Jenkins Job Types in Jenkins Securing Jenkins Jenkins Plugin Distributed Builds with Jenkins Continuous Deployment and the Jenkins Pipeline Best Practices for Jenkins Introduction to Jenkins is a two-day, lab intensive hands-on training course geared for experienced programmers who need to learn how to:Install and configure Jenkins in a servlet containerCreate Jenkins buildsConfigure and use Apache Ant and Apache Maven with JenkinsUse Jenkins to generate Java coding standards reports, code coverage reports, and change noticesUse Jenkins to automatically deploy software into a testing environment. Introduction to Continuous Integration, Continuous Deployment and Jenkins-CI Agile Development Agile Development (cont'd) What is Continuous Integration What is Continuous Integration (cont'd) What is Continous Integration (cont'd) Typical Setup for Continuous Integration Continuous Deployment Continuous Deployment (cont'd) DevOps and Continuous Deployment Continuous Deployment Challenges Jenkins Continuous Integration Jenkins Features Running Jenkins Installing and Running Jenkins Downloading and Installing Jenkins Running Jenkins as a Stand-Alone Application Running Jenkins as a Stand-Alone Application (cont'd) Running Jenkins on an Application Server The Jenkins Home Folder Installing Jenkins as a Windows Service Initial Configuration Configuration Wizard Configuration Wizard (cont'd) Configuring Tools Configuring Tools - Best Practices Job Types in Jenkins Different types of Jenkins Items Different types of Jenkins Items (cont'd) Configuring Source Code Management(SCM) Working with Subversion Working with Subversion (cont'd) Working with Git Storing Credentials Storing Credentials (cont'd) Build Triggers Schedule Build Jobs Polling the SCM Maven Build Steps Securing Jenkins Jenkins Security - Overview Jenkins Security Authentication Authorization Confidentiality Activating Security Configure Authentication Using Jenkins's Internal User Database Creating Users Authorization Matrix-Based Security Note ? Create the Administrative User Project-based Matrix Authorization Project-Based Authentication Jenkins Plugin Introduction Jenkins Plugins - SCM Jenkins Plugins ? Build and Test Jenkins Plugins ? Analyzers Jenkins for Teams Installing Jenkins Plugins Distributed Builds with Jenkins Distributed Builds - Overview Distributed Builds ? How? Slave Machines Configure Jenkins Master Configure Projects Continuous Deployment and the Jenkins Pipeline Continuous Deployment Continuous Deployment (cont'd) DevOps and Continuous Deployment Continuous Deployment Challenges Continuous Deployment with Jenkins The Pipeline Plugin The Pipeline Plugin (cont'd) Defining a Pipeline A Pipeline Example Pipeline Example (cont'd) Parallel Execution Creating a Pipeline Invoking the Pipeline Interacting with the Pipeline Best Practices for Jenkins Best Practices - Secure Jenkins Best Practices - Backups Best Practices - Reproducible Builds Best Practices - Testing and Reports Best Practices - Large Systems Best Practices - Distributed Jenkins Additional course details: Nexus Humans Introduction to Jenkins / Jenkins Quick Start (TTDV7520) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Jenkins / Jenkins Quick Start (TTDV7520) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little or no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC traffic management. Overview Optimize the Citrix ADC system for traffic handling and management Customize the ADC system for traffic flow and content-specific requirements Employ recommended tools and techniques to troubleshoot common Citrix ADC network and connectivity issues Configure advanced load balancing and GSLB on the Citrix ADC system Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing. At the end of the course, students will be able to configure their ADC environments to address efficient traffic switching and resilience requirements including Content Switching, Traffic Optimization, and Disaster Recovery. Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings App Expert Additional Features Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Content Switching Content Switching Overview Content Switching Configuration Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB Additional course details: Nexus Humans CNS-224: Implement Citrix ADC 13.x with Traffic Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-224: Implement Citrix ADC 13.x with Traffic Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Security Engineers Security Administrators Security Operations Specialists Security Analysts Network Engineers Overview Successful completion of this four-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get hands-on experience configuring, managing, and troubleshooting Prisma Access in a lab environment. The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Course Outline 1 - Prisma Access Overview and Definitions 2 - Planning and Design Architecture 3 - Routing SD-WAN Design and CloudGenix 4 - Activate and Configure Service Connections 5 - Rule Enforcement in Prisma Access and SSL Decrypt 6 - Panorama Operations for Prisma Access and Fawkes Overview 7 - Remote Networks 8 - Mobile Users 9- Cloud Secure Web Gateway 10 - Tune, Optimize and Troubleshoot 11 - Manage Multiple Tenants 12 - What?s New in v2.1 13 - Next Steps Additional course details: Nexus Humans Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.