Duration 3 Days 18 CPD hours This course is intended for Application Consultant Business Process Owner / Team Lead / Power User Help Desk/CoE Support Trainer Overview This course will prepare you to: Configure organizational structure elements and service products for SAP S/4HANA Service Perform general configuration of service processes in SAP S/4HANA Service Configure an on-site service process in SAP S/4HANA Service Configure an in-house repair process in SAP S/4HANA Service Configure service contracts in SAP S/4HANA Service This course will prepare you to configure the most important business processes in SAP S/4HANA Service. The configuration for both and on-site service process and an in-house repair process is explained. Service contract configuration is also a topic. The integration with Controlling, the Cross-Application Time Sheet (CATS) and integration with Logistics in SAP S/4HANA is also discussed. Service Processing in SAP S/4HANA - Overview and Process Steps Executing a Service Process in SAP S/4HANA Configuring Organizational Structure Elements and Service Products Configuring Organizational Structure Elements for SAP S/4HANA Service Configuring Service Products General Configuration of Service Processes Configuring a Transaction Type Configuring an Item Category Configuring Item Category Determination Copying Control for Business Transactions Configuring the Integration with Controlling Configuring the Integration with the Cross-Application Time Sheet (CATS) Configuring Pricing for Service Transactions Other Basic Settings for Business Transactions Configuring an On-site Service Process Settings for Service Requests Settings for Service Order Quotations and Service Orders Settings for Service Confirmations and Service Billing Test the New Configuration in the System Configuring In-House Repair In-House Repair Processing In-House Repair Customizing Configuring Service Contracts Configuring Service Contracts
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls
Duration 4 Days 24 CPD hours This course is intended for This course is for people who have on the job experience doing project management activities and running projects, regardless of their job title. It is for those who wish to become certified project managers, or those that want to build or reinforce a foundation in project management. This course is ideal for a person who wants to grow and formalize their project management skills on an industry neutral, global standard, the Project Management Institute. Overview After completing this course, students will be able to: Demonstrate an understanding of the various project life cycles and processes. Distinguish between predictive and adaptive approaches. Demonstrate an understanding of project management planning. Demonstrate an understanding of project roles and responsibilities. Explain the importance of the role the project manager plays. Determine how to follow and execute and respond to planned strategies or frameworks (e.g., communication, risks, etc.). Demonstrate an understanding of common problem-solving tools and techniques. Identify the suitability of a predictive, plan-based approach for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Determine and give examples of the activities within each process. Demonstrate an understanding of a project management plan schedule. Determine how to document project controls of predictive, plan-based projects. Explain when it is appropriate and sustainable to use an adaptive approach for the organizational structure. Compare the pros and cons of adaptive and predictive, plan-based projects. Identify the suitability of adaptive approaches for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Identify organizational process assets and environmental factors that facilitate the use of adaptive approaches. Determine how to plan project iterations. Determine how to document project controls for an adaptive project. Distinguish between the components of different adaptive methodologies (e.g., Scrum, Extreme Programming (XP), Scaled Adaptive Framework (SAFe), Kanban, etc.). Determine how to prepare and execute task management steps. Demonstrate an understanding of business analysis (BA) roles and responsibilities. Demonstrate the importance of communication for a business analyst between various teams and stakeholders. Determine how to gather requirements and using the best approach for a situation. Explain the application of a product roadmap. Determine how project methodologies influence business analysis processes. Validate requirements through product delivery. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Managers or consultants involved in Environmental Management, Expert advisors seeking to master the implementation of an Environmental Management System, Individuals responsible for maintaining conformance with EMS requirements , EMS team members Overview Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an EMS Learn how to interpret the ISO 14001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an EMS Acquire the expertise to advise an organization in implementing Environmental Management System best practices ISO 14001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Environmental Management System (EMS) based on ISO 14001. During this training course, you will also gain a thorough understanding of the best practices of Environmental Management Systems, consequently reducing an organization?s negative environmental impacts and improving its overall performance and efficiency Introduction to ISO 14001 and initiation of an EMS Course objective and structure Standard and regulatory framework Environmental Management System (EMS) Fundamental principles of environmental management Initiating the EMS implementation Understanding the organization and clarifying the environmental objectives Analysis of the existing management system Plan the implementation of the EMS Leadership and approval of the EMS project EMS scope Policies for environmental management Risk assessment Definition of the organizational structure of environmental management Implementation of an EMS Definition of the document management process Design of controls and drafting of specific policies & procedures Communication plan Training and awareness plan Implementation of controls Incident Management Operations Management EMS monitoring, measurement, continuous improvement and preparation for certification audit Monitoring, measurement, analysis and evaluation Internal audit Management review Treatment of problems and non-conformities Continual improvement Preparing for the certification audit Competence and evaluation of implementers Closing the training
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MS devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MS Switches Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MS Switches. Students will also learn how to configure the Meraki Dashboard. Student will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki Switching MS Switch Platforms and Features MS Feature: Multi-gigabit Ethernet Cisco Meraki MS Access Switches Cisco Meraki MS Aggregation Switches Using Tags to search, monitor and configure Meraki Switches Meraki Switch Configuration Port Configuration Meraki Switch Monitoring Troubleshooting Tools Managing Firmware Upgrades
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming
Duration 4 Days 24 CPD hours This course is intended for The audience for this course should have previous experience with functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role Overview After completing this course, students will be able to: Understand the tasks expected to be completed by the solution architect for Dynamics implementation Complete the solution blueprint artifacts Know where to find technical information to address their customer's questions This course is developed for those aspired to be and new to the solution architect role. This course provides the technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role. The Architect Role The solution architect role Manage Interactions with FastTrack Get to know FastTrack Make the most of FastTrack templates Solution Blueprint Solution blueprint definition and components Project governance and timeline Solution architecture and organizational structure Working with business process catalog Define Environments, Tools, and Deployment Strategy Understand environment planning Application lifecycle management and deployment strategy Using LCS and Azure DevOps Determine Data Management Strategy Data management overview Develop data migration strategy Determine Integration and Interfaces Strategies Develop integration strategy Integration options Define Security Architecture Important security aspects Security framework Define security strategy Define Testing Strategy Testing strategy overview Testing planning and execution Define Performance Testing Strategy Prepare for performance topics Utilize performance testing tools Business Intelligence and Reporting Implement business intelligence and reporting Determine Licensing and Support Understand licensing estimation Understand support options Prepare for Go-Live Complete solution blueprint Prepare for go-live Class recap Additional course details: Nexus Humans MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.