Duration 2 Days 12 CPD hours This course is intended for This course is primarily for Application Consultants, Business Analysts, Business Process Owners/Team Leaders/Power Users, and Developer Consultants. Overview At course completion students will know- The basic functions and navigation options of BusinessObjects Analysis for Microsoft Office- The special functions and layout design options of BusinessObjects Analysis for Microsoft Office In this course, students learn the basic functions and navigation options of the Analysis edition for Microsoft Office. Students will also learn the special functions and layout design options of Analysis. Components and Data Sources for Analysis Using Analysis Components and Data Sources Customization for Workbook Data Analysis Using the Basic Components of Analysis Sorting and Filtering Workbook Members Filtering Selected Workbook Members by Measure for Enhanced Analysis Using Hierarchies for Data Analysis in Workbooks Using Inserted Components to Add Workbook Functionality Configuring Filter Components Using Formulas to Enhance the Workbook Layout Defining Conditional Formatting Options for Workbooks Using a Prompting Dialog in Workbook Queries Extending Workbook Display Options with Functions and Microsoft Excel VBA Using Styles to Customize Workbook Appearance Setting Preferences to Control Workbook Behavior Publishing Analysis Documents to the BI Platform Server Presentation of Workbook Analysis Data Presenting Analysis Data for Business Users Additional course details: Nexus Humans BOAN10 SAP BusinessObjects Analysis for Microsoft Office training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOAN10 SAP BusinessObjects Analysis for Microsoft Office course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is targeted towards developers looking to build a career as a Node.js developer. This course offers you a deep but gentle dive into Node.js. You will start off by discovering the basic building blocks of the modern JavaScript language, which are necessary for you to have a good grasp of Node.js, before delving into the fundamentals of Node.js.Most courses quickly dive into Node.js forgetting that, at the end of the day, Node.js is still JavaScript. This can be challenging for JavaScript newbies who are then trying to build a solid house on a shaky foundation.This course overcomes that obstacle by beginning with a quick introduction to the modern JavaScript language (ES6+). You will then discover Node's asynchronous programming model and examine Node's module system, including built-in modules and application modularization, as well as the NPM third-party module registry. We will finish off by working on a simple web application API using the Hapi.js and Knex.js frameworks. Introduction to Node.js The Basics of Node.js The Module System Asynchronous Programming with Node.js Building the API: Part 1 Building a Basic HTTP Server Setting up Hapi.js Understanding Requests Building the API: Part 2 Working with the DB Using Knex.js Authenticating Your API with JWT Testing Your API with Lab Additional course details: Nexus Humans Beginning API Development with Node.js training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning API Development with Node.js course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for IT professionals who support a Cisco ACI data center network, including: Data center engineers Field engineers Network engineers Systems engineers Overview After taking this course, you should be able to: Operationalize and troubleshoot the ACI fabric Understand Cisco Application Policy Infrastructure Controller (APIC) and its monitoring, management, and troubleshooting capabilities Avoid common mistakes and recognize common symptoms The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v1.0 course shows you how to operate and troubleshoot Cisco© data center network infrastructure running Cisco ACI. Through expert instruction and hands-on practice, you will learn about operational tools, and best practices and caveats for configuration management, performance tracking, and more. You will practice troubleshooting common issues on a live fabric. Based on lessons learned in over 100 production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment. Course Outline ACI Overview and Configuration Review ACI Configuration Management Installing, Upgrading, Backing Up, and Restoring ACI Fabric Monitoring ACI Always-On and On-Demand Monitoring Tools Exercises: Visore, CLI Commands, Audit Logs, Traffic Map Troubleshooting ACI Methodologies, Tools, and Specific Examples Exercises: iPing, End Point Tracker, Troubleshooting Tool, Contract Drops, Contracts, Traceroute, Atomic Counters Additional course details: Nexus Humans Cisco ACI Operations and Troubleshooting Boot Camp (DCACIO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ACI Operations and Troubleshooting Boot Camp (DCACIO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner should be able to meet these overall objectives: Provide a comprehensive overview of Cisco Unified Intelligence Center. Demonstrate how to install, administer, and provide security for the Cisco Unified Intelligence Center solution. Describe reporting concepts and capabilities and features of Cisco Unified Intelligence Center reports. Provide a detailed description of how custom reports from normal data sources (Cisco Unified CCE and Cisco Unified CVP) and new data sources can be created to meet specific customer requirements. Deploying Cisco Unified Intelligence Center (DUIC) 1.0 is a three-day ILT course. Cisco Unified Intelligence Center 8.0.4 is a comprehensive, end-to-end reporting solution, designed to make the task of creating reports and managing disparate data sources easier on the customer and, at the same time, present a consistent user interface and a common tool to access the varied data across multiple Cisco product families. Course Outline Module 1: Cisco Unified Intelligence Center Overview. Module 2: Cisco Unified Intelligence Center Installation, Administration, and Security. Module 3: Cisco Unified Intelligence Center Reports. Module 4: Cisco Unified Intelligence Center Custom Reporting Additional course details: Nexus Humans Cisco Deploying Cisco Unified Intelligence Center v1.1 (DUIC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Deploying Cisco Unified Intelligence Center v1.1 (DUIC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Become a Certified Digital Leader Designed for: IT managers and business managers Consultants Project managers Key take aways from this leadership course (non-technical): Be comfortable with digital trends and technologies Leverage digital for your business Organise digital and manage digital transformation successfully Module 1 - Digital concepts Digital building blocks Digital lifecycle Big Data strategy Module 2 - Digital strategy Strategy Golden triangle of digital transformation Opportunity analysis Module 3 - Digital marketing Advertising Funnels E-commerce Module 4 - Digital economy Competitive landscape Influencers Legislation Module 5 - Digital finance Digital investments Defining budgets for digital ROI of digital marketing Module 6 - Information risks Information security concepts AI risks Privacy and Intellectual Property Module 7 - Organising digital Organisational design Iterative approaches Module 8 - Leading the digital workforce Digital mindset Robots & human workforce Industry 4.0 Module 9 - Leading Digital Transformation programmes Product development & Innovation Programme management Organisational change Case studies 3 business cases
Join me on Wednesday 18th May to discuss Staff Retention: We will share ideas and hopefully learn new ideas. We will explore the most effective ways to connect your team. Lets look at how leading in an emotionally Intelligent way can help retain staff.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Technical support personnel Channel partners and resellers Overview Upon completion of this course, the learner should be able to meet the following objectives: Installing a Cisco Meeting Server in a single combined deployment Installing a Cisco Meeting Server in a single split deployment Troubleshooting tools Integrating Cisco Meeting Server with Cisco TelePresence Video Communication Server (VCS), Cisco Unified Communications Manager and Microsoft Skype for Business In this course, you will learn how to install, troubleshoot, and maintain a single server and single server split deployment of Cisco Meeting Servers This course is designed to establish a minimum level of knowledge and competency among Cisco Meeting Server resale and installation partners. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Cisco Meeting Server Single Server Solution Cisco Meeting Server Solution Reviewing Authentication and Encryption Single Server Solution Preparing for Cisco Meeting Server Installation Installing Cisco Meeting Servers Configuring the Web Admin Configuring the Call Bridge Configuring the Web Bridge Module 2: Troubleshooting Tools Seven call detail record (CDR) record types and the information contained in each Capture server configuration files (.json), crash log files, media and application .dmp files. Cisco Meeting App crash files, and Cisco Meeting App diagnostic logs Employ the built-in commands to identify Cisco Meeting Server solution issues including PKI, DNS Lookup, Ping, and Service Status Common issues for end users using the Cisco Meeting Server solution Module 3: Firewall Traversal and Unified Communications Application Integration Deploying a TURN Server Deploying Firewall and NAT Traversal Integrating with UC Platforms Additional course details: Nexus Humans Cisco Meeting Server Intermediate (COLLAB250) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Meeting Server Intermediate (COLLAB250) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.