• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2570 Courses in Cardiff delivered Online

AS27 IBM Advanced System Operator Workshop for IBM i

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .

AS27 IBM Advanced System Operator Workshop for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

GRC100 Principles of SAP Governance, Risk, and Compliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration

GRC100 Principles of SAP Governance, Risk, and Compliance
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Product Owner Certified (SPOC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This certification is for anyone who interfaces with stakeholders or works as a Product Owner in a Scrum Team. Scrum Product Owner Certified (SPOC?) certification exam is designed to confirm applicants practical and working knowledge of Scrum that equips them to handle the business aspects and stakeholders in a Scrum environment. Successful candidates will be awarded the Scrum Product Owner Certified (SPOC?)certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Agile & Scrum Overview What is Agile? Why use Agile? The Agile Manifesto Principles of the Agile Manifesto Agile Methods Other Agile Methods Scrum Overview Scrum Summary Scrum Roles Scrum Roles The Product Owner The Scrum Team The Scrum Master Advantages of Cross-functional Teams Planning in Scrum Scrum Flow Requirements in Scrum Prioritizing the Product Backlog Adaptive Project Management Scrum Planning User Stories The Concept of Persona Acceptance Criteria Generic Done Criteria Criteria for a Good User Story Estimation Importance of Value Risk Burndown Graphics Scrum Board Sprint Planning Sprints (from Product Owner?s point of view) Sprint Planning Meeting Planning Game Task Estimation The Sprint Backlog Implementation of Scrum Daily Stand-up Meeting Sprint Review Meeting Sprint Retrospective Meeting Product Backlog Grooming Scrum for Large Projects Scrum for Large Projects The Chief Product Owner Distributed teams in Scrum Transition to Scrum Mapping Traditional Roles to Scrum Maintaining Stakeholder Involvement Note SCRUMstudy has authored the SBOK? Guide as a comprehensive guide to deliver successful projects using Scrum. SCRUMstudy works through its large global partner network of Authorized Training Providers (A.T.P.s) to deliver trainings and certifications. New Horizons is a proud Authorized Training Provider of SCRUMstudy.

Scrum Product Owner Certified (SPOC)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodology Assess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deployment Apply advanced authentication and load balancing principles In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, you will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare you for the Citrix Certified Expert in Networking (CCE-N) exam. Module 1: Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirementrs User Segmentation Application Assessment Capabilities Assessment Module 2: Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Module 3: Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Module 4: Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Module 5: Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Module 6: Advanced Load Distribution and Link Load balancing Advanced Load Balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Module 7: Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new)

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

B6008 Overview of IBM Cognos Analytics (v11.0)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Multi-role (consumers, business authors, professional authors, developers, administrators, modelers, project managers) This course provides students with an overview of the IBM Cognos Analytics suite of products and their underlying architecture. Students will examine each component as it relates to an Analytics solution & will be shown a range of resources. IBM Cognos Analytics Describe IBM Cognos Analytics Describe IBM Cognos Analytics components Describe IBM Cognos architecture at a high level Describe IBM Cognos security at a high level Consume Content in IBM Cognos Analytics Where do consumers access BI content? Use published reports Drill through to related data Specify run report options Specify properties of an entry Alerts and Watch Items Create Reports in IBM Cognos Analytics Overview of reporting and report authoring Identify package types, uploaded files, and data modules available for reporting Examine IBM Cognos Analytics - Reporting Examine the interface Explore different report types Create a simple, sorted, and formatted report Create a report view Create a subscription Create an Active Report Import and report on personal data Create Dashboards in IBM Cognos Analytics Describe IBM Cognos Dashboarding Identify the IBM Cognos Dashboarding user interface Add report content and tools to create dashboards Widget-to-widget communication Filter data in the dashboard Sort, group and ungroup, and calculate data Create Metadata Models in IBM Cognos Analytics Define IBM Cognos Framework Manager and its purpose Describe the IBM Cognos Framework Manager environment Describe IBM Cognos Cube Designer Get high-level content from Dynamic Cubes course and/or FM course Web-based Modeling Create Data Modules Extend IBM Cognos Analytics Introduction to IBM Cognos Mobile Key features Examine Cognos Mobile architecture Identify supported products Introduction to IBM Cognos BI for Microsoft Office Describe Cognos Analysis for Excel (CAF) Compare IBM Cognos Analytics & IBM Cognos BI New features in IBM Cognos Analytics Changes from IBM Cognos BI to IBM Cognos Analytics Legacy option Examine Event Studio Examine the role of Event Studio in Performance Management List the benefits of Event Studio Examine Metric Studio Identify scorecards, metrics, and metric types Organize metrics with strategies Track initiatives with projects

B6008 Overview of IBM Cognos Analytics (v11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Installers System Integrators System Administrators Network Administrators Solution Designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the architecture and function of the Cisco IOS XR Broadband Network Gateway Configure and verify Authentication, Authorization, and Accounting (AAA) in a Broadband Network Gateway deployment Define policies to control subscriber traffic Establish and verify subscriber sessions Prioritize subscriber traffic using QoS Implement subscriber features Deploy redundancy for subscriber sessions The Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) course teaches you how to successfully deploy, configure, operate, maintain, and support a Cisco IOS© XR Broadband Network Gateway (BNG) solution. This course will show you how to implement and verify BNG on a Cisco IOS XR device to manage subscriber access. You will also learn how to implement and verify subscriber management functions, including authentication, authorization, and accounting of subscriber sessions, address assignment, security, policy management, and Quality of Service (QoS). Course Outline Module 1: Broadband Network Gateway Overview Module 2: Configuring and Verifying Authentication, Authorization, and Accounting Module 3: Activating Control Policy Module 4: Establishing Subscriber Sessions Module 5: Deploying Quality of Service Module 6: Configuring Subscriber Features Module 7: BNG Geo Redundancy and XML Support Additional course details: Nexus Humans Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-226: Implement Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNS-226: Implement Citrix ADC 13.x with Citrix Gateway
Delivered OnlineFlexible Dates
Price on Enquiry