Duration 2 Days 12 CPD hours This course is intended for This course is intended for those who need to use Tableau Desktop to build complex visuals and dashboards to present information or to monitor data about their organization. Overview Upon completion of this course, participants will be able to:Select the best method to work with multiple data sourcesCreate complex visuals using calculations and parametersApply best practices to improve the layout and aesthetics of dashboards This course enables participants to create complex visualizations and to combine them into interactive dashboards to share with others using Tableau Desktop. The Data Data Interpreter Data Joins Same Database Cross Databases Spatial Join New! Data Blending New Union Custom SQL Tableau Extract TDE Hyper Clipboard Database Changes Automatic Updates Calculations Regular Calculations Quick Table Calculations Table Calculations Level of Detail (LOD) Expressions Complex Visualizations Custom Background Map Web Map Servers Dual Maps Bar in Bar Graph Bullet Graph Pareto Chart Sparkline Report Top N Within a Category Report Waterfall Chart Funnel Chart Pattern Analysis using the Path Shelf Building Better Dashboards Best Practices for Design Best Practices for Performance Creating a Template Workbook Using Layout Containers Dashboard Extenders New! Generating A Performance Summary Additional course details: Nexus Humans Tableau Advanced v10.3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Advanced v10.3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is most valuable for individuals who have been given responsibilities to create or maintain a website. It will also be valuable for new web designers, web developers, and graphic artists who want to extend their skills in creating complete websites. Learning how to use Dreamweaver CC will enable the practitioner to create web pages and sites in the most efficient manner. This course can also be used to help prepare students to take the Adobe Certified Associate (ACA) exam. Overview Upon successful completion of this course, you will be able to develop interactive and engaging websites that are compatible with multiple display devices. You will: ?Identify website requirements.?Create layouts.?Format web pages.?Create forms.?Integrate media files with Dreamweaver.?Manage website files. In this course, you will use Adobe Dreamweaver CC to create fluid CSS layouts, implement mobile integration techniques, and share files over a server to work in a collaborative manner. Identifying Website Requirements Examine Website Design Considerations Examine Website Performance Parameters Creating Layouts Create a Fluid Layout Manage a Layout by Using CSS Formatting Web Pages Format Content in Code View Apply Advanced CSS Tools Add Behaviors Manage Links and Files Creating Forms Add a Form Container and Elements Validate a Form Integrating Media Files with Dreamweaver Integrate Photoshop Files in Dreamweaver Insert Video, Audio, and Mobile Files Implement PhoneGap Integration Managing Website Files Preview and Test a Website Share Website Files with Other Users Synchronize Website Files Additional course details: Nexus Humans Adobe Dreamweaver CC - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Dreamweaver CC - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced IT Asset Managers Overview By attending this course the attendee will be able to Understand and utilize the dependencies, relationships and benefits of the KPAs found within an effective IT Asset Management Program specify and define the duties and responsibilities necessary to be an effective IT Asset Manager be able to obtain and display an understanding of the resources and commitment necessary to implement a fully functional IT Asset Management Program. Attendees will learn about the entire ITAM Program and take with them the foundation plan for starting or improving their organization?s ITAM Program. The intense three-day course with certification is packed full of information and real-world experiences designed to make your ITAM Program more effective and efficient, and the CITAM Certification will lend notable credibility to both you and your ITAM Program.This course addresses each of the Key Process Areas (KPAs) identified within the IBPL that, when combined, empowers an organization and maximizes the value of their IT assets. The course will also review the core processes that encompass the ITAM Program and the projects that will help an organization build a productive and profitable business unit.The course includes exam for CITAM certification. Course Outline IAITAM and the Mission ITAM Code of Ethics Defining Primary Roles in an ITAM Program IAITAM?s 12 KPAs Relationships, Dependencies, and Benefits KPA Interdependencies Roles and Responsibilities Creating Dynamic Job Descriptions for ITAM Programs The Role of a Program Manager Project Management Relationship Triangle Sample Projects by KPA Prioritization and the ITAM Program Lifecycle Management Process Building Best Practices Gaining Executive Buy-in Business Case Template Maturity Assessment ITAM as a Core Business Function Additional course details: Nexus Humans Certified IT Asset Manager (CITAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Manager (CITAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010, 2013, or 2016 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Delve. Collaborate and work with colleagues using the Yammer and Planner apps. Use email and manage contacts with Outlook on the web. Collaborate using Teams. Configure Teams. This course introduces working with shared documents in the familiar Office 365 online apps?Word, PowerPoint©, and Excel©?as an alternative to installing the Microsoft© Office desktop applications. This course also introduces several productivity apps including Yammer?, Planner, and Delve© that can be used in combination by teams for communication and collaboration. Getting Started with Office 365 Topic A: Sign In to Office 365 Topic B: Navigate the Office 365 Environment Collaborating with Shared Files Topic A: Work with Shared Documents in SharePoint Topic B: Edit Documents in Office Online Topic C: Collaborate on the SharePoint Site Topic D: Work with OneDrive for Business Topic E: Find Shared Resources Using Productivity Apps Topic A: Work with Productivity Apps in Combination Topic B: Broadcast Messages with Yammer Using Outlook on the Web Topic A: Send and Receive Email Topic B: Manage Contacts Topic C: Schedule Appointments Topic D: Personalize Outlook on the Web Collaborating with Teams Topic A: Overview of Microsoft Teams Topic B: Converse and Share in Teams Topic C: Call and Meet in Teams Topic D: Collaborate with Microsoft 365 Apps and Teams Configuring Teams Topic A: Configure Teams Topic B: Configure Channels Topic C: Configure Tabs Additional course details: Nexus Humans Microsoft 365 Office for the Web (with Teams) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 Office for the Web (with Teams) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators. Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution. This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. Course Outline 1 - Solution Overview 2 - Branch Design 3 - Routing 4 - Policy Module #1 - Application Path and QoS Policy 5 - Policy Module #2 - NAT, ZBFW and Security 6 - Event Policy Management Services 7 - DNS and DHCP Services 8 - Operations and Troubleshooting 9 - CloudBlades 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation 11 - DevOps 12 - Next Steps Additional course details: Nexus Humans Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for New users of HP OperationsManagement (OMi) 9.21, including:? IT Tools engineers? Operations staff? Operations managers? Availability engineers? System administrators? Network administrators Overview At the end of the course, you should be able to:? Use OMi to effectively identify, prioritize, andresolve events? Use OMi to prioritize operational activities based onan event?s impact on key business services? Create event dashboards to meet the informationneeds of specific users? Describe CI resolution and correlation? Identify the health of services and technologycomponents based on Health Indicators (HIs) andKey Performance Indicators (KPIs) presented in OMi? Create and use OMi performance graphs? Create and use OMi tools? Create and tune Topology Based Event Correlation(TBEC) correlation rules? Create and tune Stream Based Event Correlation(SBEC) correlation rules? Create and tune Time Based Event Automation(TBEA) automation rules? Create and tune event suppression rules? Manage OMi user access and permissions? Create and tune OMi notifications? Describe the deployment architecture and options? Configure integration between OMi and HPOperations Management (HPOM)? Configure integration between OMi and HPSiteScope? Configure integration between OMi and NP EndUser Management (EUM) This course is recommended for individuals who are responsible for designing, implementing, or administering effective service operations capabilities for mission-critical business services. This course is recommended for individuals who are responsible for designing, implementing, or administering effective service operations capabilities for mission-critical business services. Additional course details: Nexus Humans OMI120 - Operations Manager i Software 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OMI120 - Operations Manager i Software 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Dieser Kurs richtet sich an Personen, die als Systemadministratoren, Informatiker, Netzwerktechniker oder Computeringenieure arbeiten und an alle, die mit Ubiquiti-Produkten bereits Erfahrung gesammelt haben. Overview Nach dem Training kennen Sie die wichtigsten WLAN-Konzepte und haben praktische Erfahrung bei der Installation und Administrierung von UniFi Controller, Access Point, Gateways und Switches gesammelt. Werden Sie zertifizierter Ubiquiti Enterprise Wireless Admin (UEWA). Der zweitâgige Kurs wurde von ubiquiti konzipiert, um Sie fÂr die Herausforderungen heutiger Enterprise Netzwerke vorzubereiten. Wlan Grundlagen Lizenzfreie Frequenzbânder Regularien fÂr die inbetriebnahme WLAN Standards Zugriffsm'glichkeiten Netzwerk Hardware WLAN Planung Abdeckung, Frequenzen und Leistung Antennentechnologie m'gliche St'rungen im System Airtime, Kapazitât und Features gemischte Netzwerke Inbetriebnahme Einmessen und Organisation Funkzellen und Å¡berlappungen Verkabelung und PoE Leistungsmessung Basiskonfigurieren der Unifi Produkte Gruppen / Benutzer Layer 2 Adoptierung SSID, Sicherheit und VLANs Analyse Fortgeschrittenes Einbinden Âber Layer 3 Controller in der Cloud Layer-3 Adoptierung Methoden (SSH, DNS, DHCP) Minimum RSSI Roaming Zugriffskontrolle Gâste WLANs Am zweiten Tag findet eine PrÂfung Âber die erworbenen Kenntnisse statt. Die Kursunterlagen und die Online PrÂfung sind in englischer Sprache. Bitte bringen Sie zu dem Lehrgang ein Notebook mit Ethernet Anschluss, Win7 Pro oder h'her und Admin Rechten mit. Additional course details: Nexus Humans Ubiquiti Enterprise Wireless Admin (UEWA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ubiquiti Enterprise Wireless Admin (UEWA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.