Duration 3 Days 18 CPD hours This course is intended for This course is designed for: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Explain WAE basics, the purpose of WAE, and its capabilities Understand the Cisco WAE solution implementation Describe the network module configuration process Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis Describe Cisco WAE Design traffic engineering and QoS modeling Explain how to use API with WAE Design and WAE Server Describe the function, components, and processes of Cisco WAE Live The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco© WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.Additionally, you?ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions. Course Outline WAE Solution and Architecture Overview Implementing a Cisco WAE Solution Network Model Configuration WAE Design Fundamentals Cisco WAE Design Traffic Engineering and Optimization Introducing Cisco WAE API Cisco WAE Live Deployment Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for project team members and other key users (persons from special departments) responsible for creating and optimizing a cross location supply plan including production, procurement and distribution plans. In this course, students gain an understanding of how to create cross-location production plans, distribution resource plans, and procurement plans taking into account work center capacities, supplier capacities, and transportation capacities in SAP APO. Course Outline Overview of Supply Chain Planning in SAP SCM (APO), Integration with Demand Planning (DP) and Production Planning (PP/DS) Overview of exchanging master and transaction data with SAP ECC Master data for supply network planning, interchangeability and shelf live Configuring Supply Network Planning and interactive planning using planning books and macros Introduction to the Planner Home Page (EhP 3) Collaborative Supply Planning (supplier and manufacturer exchange data over the Internet) Integrated exception management in the alert monitor Discussions about the different planning methods: Heuristic including capacity leveling, optimization, capable-to-match, and VMI. Standard and advanced Cross-location safety stock planning Deployment: Implementing stock transport requisitions into manageable stock transport orders. Calculating and optimizing short-term replenishment plans for distribution centers and customers Transport Load Builder (TLB): Grouping stock transfers by threshold values for volumes, weight and pallets. Additional course details: Nexus Humans SCM230 SAP Supply Network Planning (APO-SNP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM230 SAP Supply Network Planning (APO-SNP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: C|ASE-certified professionals Application security professionals DevOps engineers IT security professionals Cybersecurity engineers and analysts Software engineers and testers Anyone with prior knowledge of application security who wants to build a career in DevSecOps Overview This course empowers you with the knowledge and skills to: Understand DevOps security bottlenecks and remediation Understand the DevSecOps toolchain and implement tools Integrate Eclipse and GitHub with Jenkins to build applications Align security practices Integrate threat modeling tools Understand and implement continuous security testing Integrate runtime application self-protection tools Integrate automated security testing Perform continuous vulnerability scans Use AWS and Azure tools to secure applications. Integrate compliance-as-code tools EC-Council Certified DevSecOps Engineer (E|CDE) is a hands-on, instructor-led comprehensive DevSecOps certification program that helps professionals build the essential skills to design, develop, and maintain secure applications and infrastructure. Course Outline Module 1: Understanding DevOps Culture Module 2: Introduction to DevSecOps Module 3: DevSecOps Pipeline?Plan Stage Module 4: DevSecOps Pipeline?Code Stage Module 5: DevSecOps Pipeline?Build and Test Stage Module 6: DevSecOps Pipeline?Release and Deploy Stage Module 7: DevSecOps Pipeline?Operate and Monitor Stage Additional course details: Nexus Humans EC-Council Certified DevSecOps Engineer (E|CDE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified DevSecOps Engineer (E|CDE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is primarily for Application Consultants, Business Analysts, Business Process Owners/Team Leaders/Power Users, and Developer Consultants. Overview At course completion students will know- The basic functions and navigation options of BusinessObjects Analysis for Microsoft Office- The special functions and layout design options of BusinessObjects Analysis for Microsoft Office In this course, students learn the basic functions and navigation options of the Analysis edition for Microsoft Office. Students will also learn the special functions and layout design options of Analysis. Components and Data Sources for Analysis Using Analysis Components and Data Sources Customization for Workbook Data Analysis Using the Basic Components of Analysis Sorting and Filtering Workbook Members Filtering Selected Workbook Members by Measure for Enhanced Analysis Using Hierarchies for Data Analysis in Workbooks Using Inserted Components to Add Workbook Functionality Configuring Filter Components Using Formulas to Enhance the Workbook Layout Defining Conditional Formatting Options for Workbooks Using a Prompting Dialog in Workbook Queries Extending Workbook Display Options with Functions and Microsoft Excel VBA Using Styles to Customize Workbook Appearance Setting Preferences to Control Workbook Behavior Publishing Analysis Documents to the BI Platform Server Presentation of Workbook Analysis Data Presenting Analysis Data for Business Users Additional course details: Nexus Humans BOAN10 SAP BusinessObjects Analysis for Microsoft Office training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOAN10 SAP BusinessObjects Analysis for Microsoft Office course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for anyone who is responsible for day-to-day management of many FortiGate devices via the FortiManager platform. Overview Describe capabilities of FortiManager Add FortiGate devices to Device Manager and import their running configuration Use provisioning templates and scripts for device-level changes across many devices Identify the synchronization states Manage the revision history of managed devices Offer a local FortiGuard Distribution Server to your Fortinet devices Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Explain high availability, backup, and recovery options for FortiManager Compare methods for centrally managing IPsec VPNs Explain the restricted ''admin'' profile and API high-level usage Use workspaces and workflow mode Identify steps to replace a managed FortiGate device Manage FortiGate devices' firmware centrally In this 2-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. Example use cases include large enterprise and carrier networks. Course Outline Module1 - Introduction and Initial Configuration Module2 - Administration and Management Module3 - Device Registration Module4 - Device Level Configuration and Installation Module5 - Policy and Objects Module6 - Manager Panes Module7 - Diagnostics and Troubleshooting Module8 - Advanced Configuration Additional course details: Nexus Humans FortiManager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the FortiManager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
Duration 3 Days 18 CPD hours This course is intended for This is an introductory level course, designed for web developers that need to upgrade core skills leveraging modern scripting and web development languages and standards. This course provides an excellent foundation for continued learning to gain in-demand skills in in-demand skills and technologies such as Angular, React, NodeJS, JQuery and more. This course can also be tuned for non-developers. Please inquire for details. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment guided by our expert team, attendees will explore: HTML5: How to effectively meet requirements using the full range of HTML5 semantic and structural elements To work with technologies such as web storage, application caching, and cross-domain messaging to improve performance and the user experience CSS: What features CSS3 supports and how they can be effectively used with HTML5 and other technologies To adapt to varying degrees of browser support for HTML5 and CSS3 JavaScript: What JavaScript is, how it relates to other programming languages, and how to script your web pages with it To traverse and manipulate the DOM and handle events in ways that work in all browsers To work with closures and prototypes and other exotic features of JavaScript Debugging What is needed to effectively debug these web technologies How to use both browser-based and proxy-based debuggers and tools Introduction to HTML5, CSS3 & JavaScript is geared for developers who need to understand the latest web technologies and responsive design practices central to targeting the entire spectrum of user platforms and browsers. This jumpstart style course provides a balanced mixture of theory and practical labs designed to take students through HTML5, CSS3 and JavaScript. Students who attend this course will leave this course armed with the new skills to begin to design, implement, and deploy robust, flexible, and safe web applications HTML Refresher HTML Review Introduction to HTML5 Introduction to CSS CSS Basics CSS3 Overview CSS3 Advanced Selectors CSS3 Visual Effects Introduction to JavaScript JavaScript Basics Debugging Tools JavaScript Functions JavaScript Arrays, Math and Date JavaScript Event Handling and the DOM Object-Oriented JavaScript
Duration 4 Days 24 CPD hours This course is intended for This intermediate course is designed for technical support personnel who implement, operate, and perform day-to-day administration of IBM MQ V8 on z/OS. Overview Describe message-oriented middleware and the capabilities it must provideIdentify the key components of IBM MQ for z/OSSummarize the responsibilities of the IBM MQ administratorConfigure IBM MQ IBM V8 for z/OSEnable IBM MQ for z/OS eight-byte RBA and buffers above 2 GBDemonstrate how to create and change queues and place and retrieve messages from a queueDefine and demonstrate how to set up and work with distributed queuingDifferentiate between an IBM MQ queue manager and an IBM MQ clientDescribe and demonstrate how to set up an IBM MQ clusterContrast point-to-point and publish/subscribe messaging stylesDescribe shared queues and queue sharing groupsSummarize IBM MQ for z/OS recovery and restart activitiesDemonstrate how to use IBM MQ events for monitoringSummarize performance considerationsDescribe security considerations for IBM MQ for z/OSDescribe and implement connection authentication and channel authorizationIdentify correct problem determination techniques for IBM MQ for z/OSSummarize basic use and configuration of IBM MQ Managed File TransferDescribe IBM MQ support for CICS and IMS interfaces This course provides the skills that are necessary to configure and manage an IBM MQ V8 queue manager on z/OS. Through lectures and hands-on lab exercises, students learn how to install, customize, operate, and administer IBM MQ V8. Course Outline Course introduction IBM MQ review IBM MQ architecture, installation, and configuration Exercise: Configuring an IBM MQ for z/OS queue manager IBM MQ for z/OS administrative interface options Exercise: Working with queues Distributed queuing Exercise: Working with channels IBM MQ clients Exercise: Working with IBM MQ clients IBM MQ cluster basics Exercise: Working with IBM MQ clusters Publish/subscribe basics Exercise: Publish/subscribe basics Queue sharing groups Using IBM MQ events and the dead-letter queue utility Exercise: Working with IBM MQ events Security considerations Exercise: Security Problem determination IBM MQ Managed File Transfer Exercise: IBM MQ Managed File Transfer configuration for z/OS IBM MQ for z/OS backup, recovery, and related file tasks Exercise: Working with file handling utilities Support for CICS, IMS, and HTTP applications Course summary
Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles Tâcnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabrâ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Quâ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el âxito Construir una base s¢lida Impulsar el cambio