Duration 2 Days 12 CPD hours This two-day course provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interactive discussions and hands-on exercises guide students through the configuration, management, and supervision of iOS devices. Students? knowledge and skills are tested and reinforced by working through real-world scenarios The Role of MDM, VPP, and DEP How to successfully deploy iOS devices Identify and respond to challenges when deploying and managing devices without MDM Apple IDs Explain what an Apple ID is and identify when it?s needed Security How security is relevant in the context of a given deployment scenario Design and implement a deployment solution for a given scenario DEP Devices Configure DEP registered devices for Over-the-Air Enrollment Configure and manage settings, apps, and content on user-owned and company-owned devicesPrerequisites Manual Configuration Explore the challenges and inconsistencies when manually configuring multiple devices. Creating Configuration profiles using Apple Configurator to view and edit a configuration profile. Learn how profiles ensure consistency across multiple devices Manage Settings The iOS MDM protocol How a MDM solution is used to configure and manage devices over-the-air with consistency and accountability Apps and Content Introduce and define VPP Assign apps and content to their user and then configure and test managed 'open in' functionality Company-Owned (Personalized and Shared) Configure settings to enable Over-the-Air Enrollment and supervision and learn how users can personalize company-owned devices. Configure and test shared (shared) device scenarios and how Apps and content are distributed to the devices Workshop Real-world deployment scenarios Design a deployment that meets your scenario?s needs
Duration 5 Days 30 CPD hours This course is intended for This course is intended for new and experienced programmers that want to learn how to write and troubleshoot Python code. This is the Microsoft recommended course for preparing for the 98-381 test. Previous programming experience is not required but recommended. Overview By the end of this course, you will be able to: Create Operations using Data Types and Operators Create Control Flow Operations Create Input and Output Operations Write and Document code to solve a specified problem Troubleshoot Problems and Write Error Handling Operations Perform Operations Using Modules and Tools This five-day instructor-led course (three-day boot camp) is intended for students who want to learn how to write, debug and document Python code Module 1: Perform Operations Using Data Types and Operators Assign data types to variables Perform data and data type operations Perform Arithmetic, Comparison and Logical Operations Review Module 2: Control Flow with Decisions and Loops Construct and analyze code segments that use branching statements Construct and analyze code segments that perform iterations Review Module 3: Perform Input and Output Operations Create Python code segments that perform file input and output operations Create Python code segments that perform console input and output operations Review Module 4: Document and Structure Code Construct and analyze code segments Document code segments using comments and documentation strings Review Module 5: Perform Troubleshooting and Error Handling Analyze, Detect and Fix code segments that have errors Analyze and construct code segments that handle exceptions Review Module 6: Perform Operations Using Modules and Tools Use Built-In Modules to perform basic operations Use Built-In Modules to perform complex operations Review
Duration 2 Days 12 CPD hours This course is intended for Leaders & Managers Overview The practical emotional intelligence tools every manager needs to build performance, communication, trust and leadership skills. Management Essentials with applied Emotional Intelligence delivers crucial tools for professionals to learn more about the people side of the organization. Strengthening performance with a powerful framework to understand the job of managing people. Provides practical tools for effective management and leadership. This course blends engaging learning and powerful content with the perspective of emotional intelligence experts. It provides tools to help navigate through today?s challenges, foster innovation, and build organizations where people thrive. What is Emotional Intelligence? Learn about business EI - a practical, work based approach that helps individuals and teams. Discover 18 key brain talents essential to fuel performance. Essentials of Trust Where does Trust originate? Do we trust from the head or the heart? Explore the science of emotional intelligence with a practical approach. Use the EI tools to help you earn trust. The Challenge of Change Untangle and rewire to affect change. Understand the stages of change and the emotional transitions needed to support change. Recognize our own patterns; a key step to being more effective at change. Igniting Motivation The surprising truth about what motivates us. Find meaning in your work and help the people that work for you find meaning. Delve into Purpose, Skill and Autonomy, and find what motivates you and your team? Enhancing Teamwork What blocks us from utilizing Divergence in our Teams? What helps us? Learn to know the EI talents you have in your group. Understand working with differing personalities. Discover strengths and weaknesses and how can they be positive. Accelerating Execution Higher and lower talents and how they assist? Learn the impact of optimizing talent. Discover your EI talent to help you grow and optimize your execution.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for networking and security professionals involved in the day-to-day management of a FortiAnalyzer appliance and FortiGate security information.. Overview Describe key features and concepts of FortiAnalyzer Deploy an appropriate architecture Manage ADOMs on both FortiAnalyzer and the devices that log to it Configure RAID Register supported devices Encrypt log transmission (SSL / IPSec) View & analyze current and historical logs (FortiView) Monitor events Apply disk quotas to log data from devices Backup, restore, and forward log data Use content archiving (summary and full) Understand the different stages of data processing, from receiving logs to compiling reports Understand SQL queries and datasets used by FortiAnalyzer reports Design datasets, charts, and custom reports Generate reports by schedule or on demand. In this 1-day class, you will learn how to use FortiAnalyzer. You will explore setup, registering supported devices and securing communications, managing logs and archives, and configuring both predefined and customized reports. Introduction to FortiAnalyzer Key features Key concepts Different FortiAnalyzer models Configuration & Administration Deployment requirements Configuration tools Configuring network settings Backing up system configuration Configuring administrative users Configuring, enabling, and assigning ADOMs Configuring RAID Device Registration Registered and unregistered devices Device registration methods Modifying options of a registered device Methods available to secure communication Configuring SSL encryption and encryption levels Configuring an IPsec tunnel Logs & Archives Logging basics The FortiView tab Configuring log arrays and event handlers Reports Reports and functionality Relationship between reports, charts, and datasets Effect of ADOMs on report settings SQL SELECT queries and clauses SQL functions and operators FortiAnalyzer-specific functions and macros Building or customizing charts Report features--creating, cloning, configuring
Duration 2 Days 12 CPD hours This course is intended for Anyone working within leadership, or aspiring to transition into leadership, who would like to professionalize their skills and competencies will benefit from this course. Overview Learn to thrive in a volatile and changing world Build employee engagement in a precarious work environment Leverage fundamental values to build a better workplace Develop a culture of change Plan a path to the future Change is both inevitable and necessary, yet potentially disruptive. Leading change efforts requires building credibility, communicating effectively, developing trust, making decisions, and demonstrating confidence. This course will help you to cultivate the leadership skills that you need to influence others and guide them through times of change. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Building a Sustainable Organization Seeing the Need for a New Type of Leadership Choosing to Be an Authentic Leader Rebuilding Confidence Decentralizing Power 2. Values and Engagement in a New Reality Engaging in the 21st Century Measuring Employee Engagement Developing Highly Engaged Employees Tapping into Discretionary Energy Embracing Differences Building a Sustainable Organization Integrating Engagement into Your Culture Building a Passion for Excellence Inspiring Trust Reaping the Benefits of Trust 3. Making Change the New Normal Facing Complexities Navigating Fluid Environments Harnessing the Power of Change Applying Intuition Creating Profound and Sustainable Change Understanding the Phases of Change Engaging Stakeholders Leading Through the Transition 4. Planning for the Road Ahead Managing Issues of the 21st Century Working Within the New Cultural Reality Avoiding Traps and Pitfalls Challenging How Teams Are Managed Building a Vision Managing with Purpose
Duration 1 Days 6 CPD hours This course is intended for This class is designed for administrators preparing to take the Salesforce Marketing Cloud Administrator exam who are able to configure Marketing Cloud products using industry and product best practices. You should be generally familiar with data structure in subscriber data management. You should also be able to thoroughly navigate Setup, troubleshoot account configuration, and manage user requests. Overview When you complete this course, you will be able to: Recall exam objectives. Discuss product features and functionality covered on the exam. Assess your exam readiness by answering practice questions. Familiarize yourself with additional resources necessary to prepare for the exam. Take the next step in your career and become a Salesforce Certified Marketing Cloud Administrator. In this 1-day, expert-led certification prep class, boost your exam readiness with a detailed exam overview, exam resources, and practice exam questions to test your knowledge. This course includes a voucher to sit for the Salesforce Marketing Cloud Administrator exam. Course Outline Exam Overview Digital Marketing Proficiency Review Governance and Compliance in Relation to Digital Marketing Review Security Best Practices for Date, Permissions, and PII Review Marketing Cloud Product Inventory and Offerings Subscriber Data Management Review the Contact Model Review Data Quality Evaluation Review Preference and Profile Center Setup Review Business Units, Users, and Security Configuration Review Integrations Configuration Review Features in Setup Home Review Marketing Cloud Extension Products Channel Management Review Mobile Studio Configuration Review Email Studio Configuration Review Social Studio and Advertising Configuration Review Journey Builder Concepts and Use Cases Maintenance Review Data Extraction and Report Generation Solutions Review Monitoring and System Availability Review Additional Marketing Cloud Product Benefits Practice Exam and Wrap-up Complete a Practice Exam Review Next Steps
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Participants learn about the fundamental elements of materials management.Participants understand usage of the procurement processes for stock material, consumable materials, and services, the basic functions from purchasing, inventory management, invoice verification, service entry, and materials planning.Topic-specific exercises in the SAP system give participants the opportunity to gain first-hand practical experience of the above processes. This course will give students the fundamental knowledge and a comprehensive overview of the processes in procurement in SAP. After attending this class, students will understand the major business processes and functions in materials management. Procurement Processes Defining Processes and Organizational Levels in Procurement Maintaining Purchase Orders Posting Goods Receipts Entering Invoices Master Data Maintaining Vendor Master Records Maintaining Material Master Records Using Entry Aids for Master Data Maintenance Performing Mass Maintenance Stock Material Procurement Applying Conditions in Purchasing Handling Requests for Quotations and Quotation Processes Creating Purchase Orders with Reference Maintaining Purchasing Info Records Analyzing Material Valuation Posting Goods Receipts for Purchase Orders Entering Invoices with Reference to Purchase Orders Consumable Material Procurement Purchasing Consumable Materials Creating Purchase Requisitions Creating Purchase Orders with Reference to Purchase Requisitions Entering Valuated and Non-Valuated Goods Receipts Creating Blanket Purchase Orders External Services Procurement Maintaining Master Data for External Services Ordering Services Creating Service Entries and Verifying Invoices Automated Procurement Maintaining Data for Material Requirements Planning (MRP) Maintaining Contracts and Source Lists Performing Procurement Processes Automatically Reporting and Analytics Using Standard Reports Performing Standard Analyses in the Logistics Information System Introduction to the SAP Buyer Role Assessing the Buyer Role Self-Service Procurement Examining the Functions of Self-Service Procurement
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 richtet sich an alle in der Datenverarbeitung tätigen Mitarbeiter. Das Modul eignet sich auch für kleine und mittelständische Unternehmer, die ein bestimmtes Grundwissen im Bereich der Informationssicherheit benötigen. Für Fachkräfte, die neu auf dem Gebiet der Informationssicherheit sind, ist dieses Modul ein guter Anfang. Overview Anwendungsbereich Mit einer Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 können Professionals ihr Wissen in folgenden Bereichen nachweisen: Information und Sicherheit: der Begriff, der Wert, die Bedeutung und die Informationssicherheit Bedrohungen und Risiken: die Begriffe Bedrohung und Risiko und wie diese mit der Zuverlässigkeit von Informationen in Beziehung stehen Verfahren und Organisation: Sicherheitsrichtlinie und Sicherheitsorganisation einschlieÃlich der Bestandteile der Sicherheitsorganisation sowie der Umgang mit (Sicherheits)vorfällen MaÃnahmen: die Bedeutung von SicherheitsmaÃnahmen wie zum Beispiel physischen, technischen und organisatorischen MaÃnahmen Gesetze und Vorschriften: die Bedeutung und Auswirkung von Gesetzen und Vorschriften ie EXIN-Module zum Thema Informationssicherheitsmanagement definieren Informationssicherheit wie folgt: Bei dem Informationssicherheitsmanagement geht es um die Definition, Umsetzung, Aufrechterhaltung, Einhaltung und Bewertung von kohârenten Kontrollen (Maánahmen), die die VerfÂgbarkeit, Integritât, und Vertraulichkeit der (manuellen und automatisierten) Informationsverarbeitung sichern. Das Modul EXIN Information Security Foundation based on ISO/IEC 27001 prÂft die Grundbegriffe der Informationssicherheit und ihre Beziehungen zueinander. Eine der Zielsetzungen des Moduls ist das Bewusstsein fÂr den Wert von Informationen zu wecken und ein Verstândnis fÂr die Schwachstellen der Informationsverarbeitung zu vermitteln, um zu verstehen, welche Maánahmen zum Schutz von Informationen notwendig sind. Information und Sicherheit Der Begriff Information Der Wert von Informationen Aspekte der Zuverlâssigkeit Bedrohungen und Risiken Bedrohungen und Risiken Verfahren und Organisation Sicherheitsrichtlinie und Sicherheitsorganisation Bestandteile Incident Management Maánahmen Bedeutung von Maánahmen Physische Maánahmen Technische Maánahmen Organisatorische Maánahmen Gesetzgbeung und Vorschriften Gesetzgebung und Vorschriften
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower
Duration 5 Days 30 CPD hours This course is intended for Data center systems engineers Field engineers Architects Cisco partners using Cisco Nexus Series switch platforms Overview After taking this course, you should be able to: Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families Describe Cisco Nexus platform implementations Explain Cisco Nexus platform management Describe Port Channels and Virtual Port Channels Configure First Hop Redundancy protocols Configure security features of Cisco Nexus devices Describe the Cisco Nexus devices routing and forwarding Describe Virtual Extensible LAN (VXLAN) Describe Quality of Service (QoS) on Cisco Nexus Devices Explain system management and monitoring processes Describe Cisco NX-OS programmability Describe Cisco Nexus storage services Configure device aliases and zoning Configure FCoE Configure NPIV and NPV modes The Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the CiscoNexus switch platform and teach you how to install, configure, and manage Cisco Nexusswitch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes. Course Outline Describing Cisco Nexus Series Switches Describing Cisco Nexus Platforms Implementation Describing Cisco Nexus Platforms Management Describing Port Channels and Virtual Port Channels Configuring First Hop Redundancy Protocols Configuring Cisco Nexus Security Features Describing Cisco NX-OS Routing and Forwarding Describing Virtual Extensible LAN Describing QoS on Cisco Nexus Devices Configuring System Management and Monitoring Describing Cisco NX-OS Programmability Describing Cisco Nexus Storage Services Configuring Fibre Channel Over Ethernet Describing Device Aliases and Zoning Configuring NPIV and NPV Modes