Duration 2 Days 12 CPD hours Overview Create heightened self-awareness and personal discovery Establish a space of mutual respect by adapting your communication Work with resistance to gain commitment and buy-in Recognize and enhance trust by leading from any position Distinguish among varying attitudes and behaviors to make your teams work as a stronger unit One of DISC?s most intriguing applications is leveraging behavioral identification and adaptability. This workshop will guide you on the path of heightened self-awareness and personal discovery. You can make this your cornerstone seminar, revealing your unique behavioral style blend and how to apply that knowledge prescriptively to others, based on their style blend; thus boosting communication effectiveness. Studies indicate that 92% of workplace conflict is the result of misunderstanding and communication breakdowns. Your entire organization can apply DISC?s prescriptive lessons of behavioral adaptability to reduce employee conflict and turnover, increase productivity, and optimize team performance. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Understanding The World Of Disc What is DISC? Breaking down the four main styles: Dominant Influencing Steady Conscientious Determining behaviors to read styles: Indirect vs. Direct Open vs. Guarded 2. Building Stronger Self-Awareness Rating your own style Understanding the Platinum Rule Grid Breaking down your profile Natural Style Adapted Style 3. Reading And Adapting To Others? Behaviors Applying the Platinum Rule Identifying characteristics in others Communication strategies with others Adapting your approaches 4. Getting Buy-In From Others Selling yourself to others Getting buy-in from each profile Understanding the cycle of getting buy-in Assessing Solving Confirming agreement Assuring satisfaction 5. Trust-Based Leadership High performance leadership characteristics The key to listening to build trust Motivating strategies with each profile 6. Making Teams Work Understanding how we each make decisions Seeing the power in each style as a role Blending team styles for teamwork Reviewing the team needs to optimize effectiveness
Duration 2 Days 12 CPD hours This course is intended for Dieser Kurs richtet sich an Personen, die als Systemadministratoren, Informatiker, Netzwerktechniker oder Computeringenieure arbeiten und an alle, die mit Ubiquiti-Produkten bereits Erfahrung gesammelt haben. Overview Nach dem Training kennen Sie die wichtigsten WLAN-Konzepte und haben praktische Erfahrung bei der Installation und Administrierung von UniFi Controller, Access Point, Gateways und Switches gesammelt. Werden Sie zertifizierter Ubiquiti Enterprise Wireless Admin (UEWA). Der zweitâgige Kurs wurde von ubiquiti konzipiert, um Sie fÂr die Herausforderungen heutiger Enterprise Netzwerke vorzubereiten. Wlan Grundlagen Lizenzfreie Frequenzbânder Regularien fÂr die inbetriebnahme WLAN Standards Zugriffsm'glichkeiten Netzwerk Hardware WLAN Planung Abdeckung, Frequenzen und Leistung Antennentechnologie m'gliche St'rungen im System Airtime, Kapazitât und Features gemischte Netzwerke Inbetriebnahme Einmessen und Organisation Funkzellen und Å¡berlappungen Verkabelung und PoE Leistungsmessung Basiskonfigurieren der Unifi Produkte Gruppen / Benutzer Layer 2 Adoptierung SSID, Sicherheit und VLANs Analyse Fortgeschrittenes Einbinden Âber Layer 3 Controller in der Cloud Layer-3 Adoptierung Methoden (SSH, DNS, DHCP) Minimum RSSI Roaming Zugriffskontrolle Gâste WLANs Am zweiten Tag findet eine PrÂfung Âber die erworbenen Kenntnisse statt. Die Kursunterlagen und die Online PrÂfung sind in englischer Sprache. Bitte bringen Sie zu dem Lehrgang ein Notebook mit Ethernet Anschluss, Win7 Pro oder h'her und Admin Rechten mit. Additional course details: Nexus Humans Ubiquiti Enterprise Wireless Admin (UEWA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ubiquiti Enterprise Wireless Admin (UEWA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 3 Days 18 CPD hours This course is intended for This course is for computer professionals involved with security compliance using CCS 11.0. Overview At the completion of the course, you will be able to: Describe current security risk and compliance challenges. Define methods of proactive security. Describe CCS 11 and how it helps meet security and compliance needs. Describe general CCS 11.0 pre-deployment considerations. Install CCS 11. Perform initial CCS configuration tasks. Import assets and common fields. Describe how to install CCS Agents. Perform data collection and evaluation. Describe the components of standards. Copy and edit standards. Evaluate collected data in terms of a standard. Describe compliance and risk scores. Manage exceptions. Create, edit, and map control statements. Use Controls Studio to eliminate duplication of controls. Describe mandates, policies, and control statements. Build queries to gather data quickly from assets. Add external data integration and configure data connectors. Use CCS reporting features. Create, edit, and manage dashboards. Investigate contingencies using a ?what if?? analysis in dynamic dashboards. This course focuses on defining security controls that govern the enterprise, assess compliance with standards and other mandates, and create reports and dashboards to demonstrate compliance and show deficiencies to multiple audiences. Introduction to CCS 11.0 Overview of Security and Compliance Proactive Security Into to CCS11 Implementing Security and Compliance with CCS 11.0 Installing the CCS Suite General pre-deployment considerations Pre-installation requirements Installation tasks Initial configuration Getting started tasks Preparing for data collection Getting started with CCS 11.0 Importing assets Installing a UNIX Agent Collecting and evaluating data Standards Manager/CVSS and Risk Score Working with standards Assessing compliance with standards Managing exceptions Controls Studio About Controls Studio Working with Controls Studio Ad hoc queries Query building Querying your enterprise External data integration Connecting to external data sources Overview of third-party connectors Reporting and dashboards Reporting overview Working with dynamic dashboards Additional course details: Nexus Humans Symantec Control Compliance Suite (CCS) 11.0 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Control Compliance Suite (CCS) 11.0 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The target audience for the SRE Foundation course are professionals including. Anyone starting or leading a move towards increased reliability. Anyone interested in modern IT leadership and organizational change approaches. Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Practitioners, IT Directors, IT Managers, IT, Team Leaders, Product Owners, Scrum Masters, Software Engineers, Site Reliability Engineers, System Integrators, Tool Providers will benefit from this course. Overview The learning objectives for the SRE Foundation course include a practical understanding of. The history of SRE and its emergence at Google. The inter-relationship of SRE with DevOps and other popular frameworks. The underlying principles behind SRE Service Level Objectives (SLO's) and their user focus Service Level Indicators (SLI's) and the modern monitoring landscape. Error budgets and the associated error budget policies. Toil and its effect on an organization's productivity. Some practical steps that can help to eliminate toil. Observability as something to indicate the health of a service SRE tools. Automation techniques and the importance of security. Anti-fragility, our approach to failure and failure testing. The organizational impact that introducing SRE brings. The SRE (Site Reliability Engineering) Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. This course prepares you for the SRE Foundation (SREF) certification. Course Introduction Course Goals Course Agenda SRE Principles & Practices What is Site Reliability Engineering? SRE & DevOps: What is the Difference? SRE Principles & Practices Service Level Objectives & Error Budgets Service Level Objectives (SLO?s) Error Budgets Error Budget Policies Reducing Toil What is Toil? Why is Toil Bad? Doing Something About Toil Monitoring & Service Level Indicators Service Level Indicators (SLI?s) Monitoring Observability SRE Tools & Automation Automation Defined Automation Focus Hierarchy of Automation Types Secure Automation Automation Tools Anti-Fragility & Learning from Failure Why Learn from Failure Benefits of Anti-Fragility Shifting the Organizational Balance Organizational Impact of SRE Why Organizations Embrace SRE Patterns for SRE Adoption On-Call Necessities Blameless Post-Mortems SRE & Scale SRE, Other Frameworks, The Future SRE & Other Frameworks The Future Exam Preparations Exam Requirements, Question Weighting, and Terminology List Sample Exam Review Additional course details: Nexus Humans Site Reliability Engineering (SRE) Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Site Reliability Engineering (SRE) Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Project team members In this course, students learn how to successfully set up functions and customizing settings for pricing in Sales and Distribution. Course Outline Condition technique for definition and maintenance of prices, surcharges and discounts Creating condition tables, access sequences, and condition types Using prices and other conditions in sales documents Promotions and sales deals Introduction to rebate processing
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Make selected configurations for the implementation of the Materials Management component of the SAP system This course will give students an overview and in-depth knowledge of Materials Management Configuration in SAP. After attending this class, students will understand the business processes, functions and configuration in Materials Management. Solution Manager and Customizing Projects Defining Customizing Projects General Settings Checking Countries and Currencies Defining Units of Measurements Setting Up a Factory Calendar Organizational Units Defining Organizational Units in Materials Management Defining and Assigning Plants Master Data Setting Up Material Master Records Creating Material Types Setting Up Field Selection for Material Master Records Defining Field References for Material Master Records Configuring the Material Master Defining Settings for Vendor Master Records Valuation & Account Assignment Describing Automatic Account Determination Determining the Relevance of Company Codes and Valuation Areas Creating Valuation Classes and Account Category References Setting Up Account Determination for Specific Transactions Subdividing a Transaction with the Account Grouping Code Adjusting Account Determination for Special Cases Adjusting Settings for Split Valuation Purchasing Creating Document Types in Purchasing Using Document Types in Purchasing Creating Account Assignment Categories Adjusting the Screen Layout of Purchasing Documents Defining Text Types and Text Adoption Specifying Texts for Output Processing Controlling the Output of Messages in Purchasing Using Condition Technique for Message Determination Inventory Management Adjusting Settings for Material and Accounting Documents Adjusting Settings for Goods Movements Adjusting the Output of Messages in Inventory Management Additional course details: Nexus Humans SCM550 SAP Cross-Functional Customizing in Materials Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM550 SAP Cross-Functional Customizing in Materials Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Project team members & Consultants In this course, students become familiar with logistics invoice verification as the final stage in the external procurement process. Students also learn how to enter invoices relating to purchase orders, block them, and release them for payment. Course Outline Introduction to invoice verification Invoice entry and parking Taxes, cash discounts, and foreign currency Invoices for purchase orders with account assignment Variances with and without reference to an item, invoice blocking reasons Invoice reduction, releasing blocked invoices Delivery costs Subsequent debits and credits Credit memos and cancellations Invoice verification in the background Automated processing GR/IR clearing account maintenance Customizing for invoice verification