• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

864 Courses in Cardiff delivered Live Online

Getting Started with React | Introduction to React Basics (TT4190)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level React development course for web developers. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: A basic and advanced understanding of React components An advanced, in-depth knowledge of how React works A complete understanding of using Redux How to build, validate, and populate interactive forms How to use inline styles for perfect looking components How to test React components How to build and use components How to get control of your build process Introduction to React | React Basics is a three-day hands-on course designed to get students quickly up and running with Core React skills. Geared for more experienced web developers new to React, this course provides students with the core knowledge and hands-on skills they require to build reliable, powerful React apps.Throughought the course students will explore React fundamentals with a progressive, example-driven approach. You?ll create your first apps, learn how to write components, start handling user interaction, and manage rich forms. We end the first part by exploring the inner workings of Create React App (Facebook?s tool for running React apps), and building a multi-page app that uses client-side routing.Every project in this course was built using Create React App. Create React App is based on Webpack, a tool which helps process and bundle our various JavaScript, CSS, HTML, and image files. We explore Create React App in-depth in the module ?Using Webpack with Create React App.?Students will build Single Page Applications (SPA), create robust routing with error handling, and both class and functional reusable components.The lab project will also include the use of form validation.NOTE: This is a foundational course that explores how to build your first React application. Students who want a deeper dive, withmore intermediate level topics such as Redux, REST, Unit Testing and more might consider the TT4195 Mastering React five-daysuperset of this class as an alternative. ES6 Primer Prefer const and let over var Arrow functions Modules Object.assign() Template literals The spread operator and Rest parameters Enhanced object literals Default arguments Destructuring assignments Your First React Web Application Setting up your development environment JavaScript ES6 /ES7 What?s a component? Building The App Making The App data-driven Your app?s first interaction JSX and the Virtual DOM React Uses a Virtual DOM Why Not Modify the Actual DOM? What is a Virtual DOM? Virtual DOM Pieces ReactElement JSX

Getting Started with React | Introduction to React Basics (TT4190)
Delivered OnlineFlexible Dates
Price on Enquiry

Data Science Projects with Python

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for If you are a data analyst, data scientist, or a business analyst who wants to get started with using Python and machine learning techniques to analyze data and predict outcomes, this book is for you. Basic knowledge of computer programming and data analytics is a must. Familiarity with mathematical concepts such as algebra and basic statistics will be useful. Overview By the end of this course, you will have the skills you need to confidently use various machine learning algorithms to perform detailed data analysis and extract meaningful insights from data. This course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You?ll discover how to tune the algorithms to provide the best predictions on new and unseen data. As you delve into later sections, you?ll be able to understand the working and output of these algorithms and gain insight into not only the predictive capabilities of the models but also their reasons for making these predictions. Data Exploration and Cleaning Python and the Anaconda Package Management System Different Types of Data Science Problems Loading the Case Study Data with Jupyter and pandas Data Quality Assurance and Exploration Exploring the Financial History Features in the Dataset Activity 1: Exploring Remaining Financial Features in the Dataset Introduction to Scikit-Learn and Model Evaluation Introduction Model Performance Metrics for Binary Classification Activity 2: Performing Logistic Regression with a New Feature and Creating a Precision-Recall Curve Details of Logistic Regression and Feature Exploration Introduction Examining the Relationships between Features and the Response Univariate Feature Selection: What It Does and Doesn't Do Building Cloud-Native Applications Activity 3: Fitting a Logistic Regression Model and Directly Using the Coefficients The Bias-Variance Trade-off Introduction Estimating the Coefficients and Intercepts of Logistic Regression Cross Validation: Choosing the Regularization Parameter and Other Hyperparameters Activity 4: Cross-Validation and Feature Engineering with the Case Study Data Decision Trees and Random Forests Introduction Decision trees Random Forests: Ensembles of Decision Trees Activity 5: Cross-Validation Grid Search with Random Forest Imputation of Missing Data, Financial Analysis, and Delivery to Client Introduction Review of Modeling Results Dealing with Missing Data: Imputation Strategies Activity 6: Deriving Financial Insights Final Thoughts on Delivering the Predictive Model to the Client

Data Science Projects with Python
Delivered OnlineFlexible Dates
Price on Enquiry

Working with Spring REST (TT3358)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This in an intermediate-level Java development course geared for students experienced with Java and Spring programming essentials. This course does not cover Java or Spring development basics. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core Cucumber and web testing skills, coupling the most current, effective techniques with the soundest industry practices. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will: Learn the request-response cycle of REST requests Implement a REST controller using Spring Map URLs to service endpoints Use Spring's template class to develop a REST client Bootstrap a Spring REST applications Return different media types for a service Setting the response headers Discuss Exceptions and HTTP Status codes Handle exceptions thrown by a service Spring REST focuses on providing an understanding of the fundamental principles and technologies that are used in the development of RESTful services and clients. This understanding is critical to being able to diagnose, troubleshoot, tune, and perform other lifecycle activities.Working with Spring REST is a two-day, fast-paced coding course geared for experienced developers who have prior working knowledge of Java. Throughout the course students learn the best practices for writing Restful services in Java using Spring Boot. The course provides an in-depth view of the APIs provided by Spring to develop both the REST service and the REST client. Implementing REST with Spring REST principles Introduction to RESTful Services in Spring Introduction to REST Clients in Spring Bootstrapping the REST application Content Representation Implementing the REST Service Error Handling Security and RESTful Services Securing Untrusted Input Defending RESTful Services Additional course details: Nexus Humans Working with Spring REST (TT3358) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Working with Spring REST (TT3358) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Working with Spring REST (TT3358)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered OnlineFlexible Dates
Price on Enquiry

OP25 IBM z/OS UNIX System Services Implementation

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course for experienced data professionals such as z/OS system programmers, who are responsible for the installation and maintenance of z/OS UNIX. Overview Execute the tasks required to prepare a z/OS installation for implementing z/OS UNIXExecute the tasks to install the z/OS UNIX software featuresUse the information provided in this class to perform the basic customization necessary to fully implement the z/OS UNIX kernel, the file system, the shell and utilities, and z/OS UNIX applicationsPut in place the RACF security required for z/OS UNIX resources and applicationsMake appropriate definitions for the activation of TCP/IP sockets by z/OS UNIXIdentify and use the processes and data required for monitoring and tuning the z/OS UNIX environment This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment. Day 1 Welcome Unit 1: z/OS UNIX implementation overview Unit 2: z/OS UNIX services initial installation Exercise 1: Move from default to full mode function Exercise 2: IPL in full function mode and enable a nonvolatile root HFS Unit 3: File system customization Day 2 Exercise 3: Customizing the file system Unit 4: Security customization Exercise 4: Defining and managing UNIX users, OMVS security Day 3 Unit 5: Shell customization Exercise 5: UNIX System Services and shell customization Unit 6: Customizing applications, daemons, and servers Exercise 6: UNIX processes Exercise 7: Access control list and enhanced ASCII support Day 4 Unit 7: File system management and system maintenance Exercise 8: Managing HFS and zFS data sets Unit 8: Managing z/OS UNIX operations Unit 9: Exploiting TCP/IP with z/OS UNIX Exercise 9: Managing z/OS UNIX Additional course details: Nexus Humans OP25 IBM z/OS UNIX System Services Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OP25 IBM z/OS UNIX System Services Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OP25 IBM z/OS UNIX System Services Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

Decision Making for Vulnerable People Webinar

5.0(1)

By Born at the Right Time

leading expert Philip Warford will talk about the options available to protect a disabled person using specialist Wills and Trusts

Decision Making for Vulnerable People Webinar
Delivered OnlineJoin Waitlist
FREE

Business networking skills (In-House)

By The In House Training Company

This workshop will provide participants with the insight and skills to be more effective business networkers, face-to-face and online. The approach taken is to build on the strengths people already have and their successes. It is easier to develop what you already have than to try and develop skills that do not come easily. Being yourself is the most effective tool for business networking and building relationships. This course will help those attending: Appreciate the importance of networking, and different forms of networking Understand the dynamics of communication that are specific to networking Become more confident and assured when 'working' a room Improve their influencing skills, especially with people who are experts and in positions of authority 'Sell' themselves and promote their company Identify and manage their profiles using online social networking sites Use effective follow-up to maintain active contacts and connections Select the correct networking groups, clubs and events Create their own personal network 1 The importance, and different types, of networking Personal objectives and introductions Test networking session Examples of the importance, purpose and format of various types of networking, and benefits you can expect 2 How to work a room - preparation and strategy Three things to know before you attend any event Non-verbal communication and art of rapport Breaking the ice - worked examples with practical demonstration 3 Communication dynamics in networking - the power of the listening networker Why it is better to listen than talk Effective questioning and active listening Creating a natural and engaging conversation, 1-2-1 and in a larger group 4 Assumptions when networking How to use the 'instant judgement' of others to your advantage What assumptions are you making? How to keep an open mind 5 Business networking etiquette Meeting and greeting at a business networking event - approaching complete strangers and introducing yourself Socialising: joining and leaving groups easily Making a good first impression in 30 seconds The use of status when networking 6 Making connections Asking for cards, contact details and referrals Gaining a follow-up commitment Some tips and tricks 7 Business networking rehearsals Practice sessions 8 Personal business networking online Overview of different types of networking sites - there is a lot more out there than just Facebook! Examples of creating an effective profile Using social networking effectively - case studies and application 'Advanced' applications - blogs, articles, twitter, feeds, etc. Online demonstration and examples 9 Building relationships - follow-up and follow-through Maintaining a good database Developing a contact strategy with different types and levels of contact How to analyse your contact base

Business networking skills  (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Deploy and Manage

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your Center Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Describe BLAST and PCoIP ADMX GPO common configurations Graphic Cards Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Deploy and Manage
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Juniper Networks Firewall/IPSec VPN Products

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Configuring Juniper Networks Firewall/IPSec VPN Products
Delivered OnlineFlexible Dates
Price on Enquiry

MB-300T00 Microsoft Finance and Operations Core

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A Dynamics 365 for Finance and Operations Functional Consultant is responsible for performing discovery, capturing requirements, engaging subject matter experts and stakeholders, translating requirements, and configuring the solution and applications. The Functional Consultant implements a solution using out of the box capabilities, codeless extensibility, application and service integrations. Overview This course provides the practical knowledge to Navigate and efficiently use search, filtering and queries Use operational workspaces Work with Business Document Management Work with record templates Integrate Power BI with Dynamics 365 Finance and Operations apps Personalize workspaces Run and analyze security reports Create and use workflow for approval Work with Organization Hierarchy and its purposes. How to use personalization feature Use Data Management workspace Create and use and entity templates Import and export data and manage data by using Office Integration Dynamics 365 Finance and Operations apps include, but are not limited to, Dynamics 365 Finance, Dynamics 365 Supply Chain Management, and Dynamics 365 Supply Chain Management, Manufacturing. This foundational course provides students with the important first steps in automating and modernizing both global financial and supply chain operations. USE COMMON FUNCTIONALITY AND IMPLEMENTATION TOOLS Introduction Identify and use common Dynamics 365 Finance and Operations apps features and functionality Describe use cases for Power Platform apps and services Module Summary CONFIGURE SECURITY, PROCESSES, AND OPTIONS Introduction Implement security Design and create workflows Configure Organization administration features Configure System administration features Module Summary MANAGE DYNAMICS 365 FINANCE AND OPERATION DATA Introduction Manage data in Dynamics 365 Finance and Operations apps Plan a migration strategy Prepare data for migration and migrate data Module Summary VALIDATE AND SUPPORT THE SOLUTION Introduction Test solutions in Dynamics 365 Finance and Operations apps Implement Lifecycle Services tools Module Summary Additional course details: Nexus Humans MB-300T00 Microsoft Dynamics 365: Core Finance and Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-300T00 Microsoft Dynamics 365: Core Finance and Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-300T00 Microsoft Finance and Operations Core
Delivered OnlineFlexible Dates
Price on Enquiry