• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2189 Courses delivered Live Online

WA190 Administering WebSphere Application Server Liberty Profile V9

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for administrators of IBM WebSphere Application Server Liberty Profile. Overview After completing this course, you should be able to: Describe the WebSphere Liberty Profile architecture Create a Liberty profile server Use the Admin Center to manage Liberty servers Deploy clusters of Liberty servers Use the collective controller Use Jython scripts to administer Liberty servers Configure Dynamic Routing Configure the auto scaling feature and define auto scaling policies Configure SSL communication in Liberty Use the IBM HTTP and web server plug-in with Liberty servers his course teaches you the skills that are needed to manage Liberty servers and collectives.The course is designed for application server administrators. You learn how to use the graphical Admin Center and the command line scripting to manage servers from a collective controller. The course also covers how to deploy a cluster of packaged servers for Liberty runtimes, view the deployment environment, and view basic performance metrics.You learn how to use the Dynamic Routing feature of Liberty to enable routing of HTTP requests to collective members. You also configure the auto-scaling and health management features for Liberty.Finally, you learn how to secure Liberty and enable SSL communication in Liberty. Course introduction Introduction to Liberty administration and runtime architecture Multi-server management Exercise: Managing Liberty collectives with the Admin Center Administration and application deployment with scripting Exercise: WebSphere Liberty administration by using Jython Scripts Dynamic Routing Exercise: Dynamic Routing Auto-scaling in Liberty Exercise: Auto-scaling Securing Liberty Exercise: Using the IBM HTTP Server with SSL to a Liberty server Course summary

WA190 Administering WebSphere Application Server Liberty Profile V9
Delivered OnlineFlexible Dates
Price on Enquiry

SCM600 SAP Sales Order Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is aimed at consultants, project managers, project team members and key users. In this course, participants learn about the fundamental business processes in sales and distribution. Participants learn how to perform the most important functions in the process chain, from presales to customer payment, in the SAP system. Course Outline Organizational structures in sales and distribution Working with the relevant master data for the processes Overview of the process chain Introduction to the availability check Sales and distribution processing with make-to-order production Complaints processing Introduction to sales and distribution reporting Additional course details: Nexus Humans SCM600 SAP Sales Order Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM600 SAP Sales Order Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM600 SAP Sales Order Management
Delivered OnlineFlexible Dates
Price on Enquiry

6F87G IBM Sterling B2B Integrator Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for EDI End Users, Connect: End Users, Web Developers, as well as System Administrators. Overview After completing this course, students should be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course provides students with a detailed examination of Sterling B2B Integrator, which provides end-to-end enterprise integration server for dynamic real-time and near-real time business collaboration and commerce automation.This course teaches students techniques, tools and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator Exercise. About Sterling B2B Integrator Basic BPML Concepts Exercise. Basic BPML Concepts XPath Basics Exercise. XPath Basics Graphical Process Modeler (GPM) Exercise. Graphical Process Modeler (GPM) Using the GPM Exercise. Using the GPM Troubleshooting a Business Process Exercise. Troubleshooting a Business Process Introduction to Service Management Exercise. Introduction to Service Management Case Study Sterling B2B Integrator Mapping Exercise. Sterling B2B Integrator Mapping Typing Map Exercise. Typing Map Tracking System Health Exercise. Tracking System Health Best Practices Exercise. Best Practices Case Study Course Wrap Up

6F87G IBM Sterling B2B Integrator Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Spring Security

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring Security
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructors such as virtual services, pools, health monitors, and related components Understand and modify application behavior through profiles, policies, and DataScripts Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© Advanced Load Balancer? (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 20.x release. Features include the overall infrastructure, virtual services and application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic Virtual Service components such as Application Profiles, Network Profiles Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog, and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups Modifying Application Behavior Design and apply application solutions leveraging application profiles Design and apply application solutions leveraging Network and HTTP Policies and DataScripts Explain DataScript fundamentals Explain and leverage NSX Advanced Load Balancer analytics to understand application behavior Describe and configure Client SSL Certificate Validation Describe and configure Virtual Service DDoS, Rate Limiting, and Throttling capabilities Modify Network Profiles properties such as TCP connection properties Design and apply application solutions leveraging Persistence Profiles NSX Advanced Load Balancer Infrastructure Architecture Deep dive on the management, control, data, and consumption planes and functions Describe Control Plane Clustering and High Availability Describe Controller Process Sharding Describe Controller Sizing Describe Service Engine CPU and NIC Architecture Explain Tenants Deep dive and configure properties of Service Engine Groups Explain Service Engine Group High Availability Modes Describe and configure Active/Standby High Availability Mode Describe and configure Elastic HA High Availability Mode (Active/Active, N+M) Explain Service Engine Failure Detection and Self-Healing Describe Service Engine as a Router Deep dive on Virtual Service scale out options, such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Introduction to Cloud Connector Introduce Cloud Connectors Review Cloud Connector integration modes Introduce Cloud Connector types Install, Configure and Manage NSX Advanced Load Balancer in No-Access Cloud Explain No Access Cloud concepts Configure No Access Cloud integration Explain and Configure Linux Server Cloud Describe the Advanced Configuration options available in Bare-Metal (Linux Server Cloud) Install, Configure and Manage NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware No Access Cloud Connector Explain and configure VMware Write Access Cloud Connector Describe VMware Write with NSX-V Access Cloud Connector Describe VMware NSX-T integration AWS Cloud Configuration Describe NSX Advanced Load Balancer Public Cloud integrations Explain and demonstrate AWS Public Cloud Integration DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing Introduce Global Server Load Balancing Concepts and Benefits Explain and configure NSX Advanced Load Balancer infrastructure Explain and configure DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB Sites Explain and configure basic GSLB Services to include pools and health monitors Describe GSLB Service Load Balancing algorithms Explain and configure Data and Control Plane-based Health Monitors Describe GSLB Health Monitor Proxy NSX Advanced Load Balancer: Troubleshooting Introduce Infrastructure and Application Troubleshooting Concepts Describe Control Plane and Data Plane-based Troubleshooting Explain Application Analytics and Logs Describe client logs analysis Explain Headers troubleshooting and Packet Capture mechanism Leverage CLI for detailed data plane troubleshooting Explain Service Engine Logs Explain Health Monitors troubleshooting Explain BGP session troubleshooting Describe Control Plane Troubleshooting, Clustering, and Cloud Connector issues Events and Alerts Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities, leveraging SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface, leveraging browser and command line utility Explain Swagger-based API documentation Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)
Delivered OnlineFlexible Dates
Price on Enquiry

GRC100 Principles of SAP Governance, Risk, and Compliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration

GRC100 Principles of SAP Governance, Risk, and Compliance
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Android Studio Development Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who want to learn how to program Android applications using the Java Programming Language. Overview Upon successful completion of this course, students will have an understanding of basic application Android development. This course will teach the basics of Android Development using the Java Programming Language and Android Studio. Introduction and Setup Android Studio Development Essentials Introduction Setting up an Android Studio Development Environment Creating an Example Android App in Android Studio A Tour of the Android Studio User Interface Creating an Android Virtual Device (AVD) in Android Studio Using and Configuring the Android Studio AVD Emulator Testing Android Studio Apps on a Physical Android Device The Basics of the Android Studio Code Editor Android Architecture and State Changes An Overview of the Android Architecture The Anatomy of an Android Application Understanding Android Application and Activity Lifecycles Handling Android Activity State Changes Android Activity State Changes by Example Saving and Restoring the State of an Android Activity Views and Layouts Understanding Android Views, View Groups and Layouts in Android Studio A Guide to the Android Studio Layout Editor Tool A Guide to the Android ConstraintLayout A Guide to using ConstraintLayout in Android Studio An Android Studio Layout Editor ConstraintLayout Tutorial Manual XML Layout Design in Android Studio Creating an Android User Interface in Java Code Event Handling An Overview and Example of Android Event Handling A Guide to using Instant Run in Android Studio Android Touch and Multi-touch Event Handling Detecting Common Gestures using Android Studio and the Gesture Detector Class Implementing Custom Gesture and Pinch Recognition on Android Advanced Layout and Transitions An Introduction Android Fragments Using Fragments in Android Studio - An Example Creating and Managing Overflow Menus on Android Animating User Interfaces with the Android Transitions Framework An Android Transition Tutorial using beginDelayedTransition Implementing Android Scene Transitions ? A Tutorial Working with the Floating Action Button and Snackbar Creating a Tabbed Interface using the TabLayout Component Working with the RecyclerView and CardView Widgets An Android RecyclerView and CardView Tutorial Working with the AppBar and Collapsing Toolbar Layouts Implementing an Android Navigation Drawer An Android Studio Master/Detail Flow Tutorial Intents, Threads, Services, and Notifications An Overview of Android Intents Android Explicit Intents ? A Worked Example Android Implicit Intents ? A Worked Example Android Broadcast Intents and Broadcast Receivers A Basic Overview of Threads and Thread Handlers An Overview of Android Started and Bound Services Implementing an Android Started Service - A Worked Example Android Local Bound Services - A Worked Example Android Remote Bound Services - A Worked Example An Android 7 Notifications Tutorial An Android 7 Direct Reply Notification Tutorial Data Access and Storage Integrating Firebase Support into an Android Studio Project An Android 7 Firebase Remote Notification Tutorial An Introduction to Android 7 Multi-Window Support An Android Studio Multi-Window Split-Screen and Freeform Tutorial An Overview of Android SQLite Databases in Android Studio An Android TableLayout and TableRow Tutorial An Android SQLite Database Tutorial Understanding Android Content Providers Implementing an Android Studio Content Provider in Android Studio Accessing Cloud Storage using the Android Storage Access Framework An Android Storage Access Framework Example Multimedia, Maps and Printing Video Playback on Android VideoView and MediaController Classes Video Recording and Image Capture using Camera Intents Making Runtime Permission Requests in Android Android Audio Recording and Playback using MediaPlayer and MediaRecorder Working with the Google Maps Android API in Android Studio Printing with the Android Printing Framework An Android HTML and Web Content Printing Example A Guide to Android Custom Document Printing Final Build An Android Fingerprint Authentication Tutorial Handling Different Android Devices and Displays Signing and Preparing an Android Application for Release Integrating Google Play In-app Billing into an Android Application An Overview of Gradle in Android Studio An Android Studio Gradle Build Variants Example Additional course details: Nexus Humans Android Studio Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Studio Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Android Studio Development Essentials
Delivered OnlineFlexible Dates
Price on Enquiry