Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders engaged in improving the delivery of products and services that meet user needs through the use of Microsoft SharePoint; Anyone who wants to improve their Business Analysis skills; Project stakeholders concerned with SharePoint requirements. Overview Plan, manage and close requirements for a project in reduced time using good business analysis practices Minimize project uncertainty and risk by applying good techniques Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your team that will be able to continuously align the delivered product or services with desired business needs, easily adapting to changing requirements throughout the process. Requirements can change frequently during a SharePoint project, and therefore projects need a streamlined, flexible approach to requirements change management. SharePoint professionals want to develop systems and services which are both high-quality and high-value, and the easiest way to achieve this is to implement the highest priority requirements first. This enables the projects to maximize value for their stakeholders. Introduction ? Roles involved in a SharePoint project The opportunities and challenges of a SharePoint project The business analysis process BA role vs. project manager role BA / PM competencies Case Study Exercise Understanding SharePoint Requirements Business, User, Functional, Quality-of-service and implementation requirements Requirements vs. specifications Requirements vs. business rules Risk management and risk response strategies Analyzing requirements Characteristics of effective requirements Case Study Exercise SharePoint Requirements Modeling Identify high level scope Identify initial requirements stack Identify an architectural vision Plan your iteration Iteration modeling Model storming Test driven development Case Study Exercise The Change Management Process Managing the Solution Scope and Requirements Capturing the Requirements Traceability Maintaining the Requirements for re-use Managing Requirements Conflicts Preparing the Requirements Package Building the Requirements communications plan Case Study Exercise Assessing & Validating Requirements Validating and verifying SharePoint Requirements Creating a master test plan Create test scenarios and test cases Case Study Exercise Additional Information Useful books and links on managing requirements and projects for SharePoint initiatives
Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types
Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
This course is designed for those already using Power BI Desktop and are ready to work with more comprehensive elements of analysing and reporting in Power BI. The course maintains a balanced look at data analysis including the Power Query Editor, with a deep dive into writing DAX formulas, and enhanced dashboard visualisations. The aim of this course is to provide a more complete understanding of the whole Power BI analytics process, by working with business examples that will equip you with the necessary skills to output comprehensive reports and explore Power BI's analytical capabilities in more depth. 1 The Query Editor Grouping rows in a table Split row by delimiter Add days to determine deadlines The query editor 2 Fuzzy Matching Joins Matching inconsistencies by percentage Matching with transformation table 3 The Query Editor M Functions Adding custom columns Creating an IF function Nested AND logics in an IF function 4 DAX New Columns Functions Including TRUE with SWITCH Using multiple conditions The FIND DAX function The IF DAX function Logical functions IF, AND, OR 5 Editing DAX Measures Making DAX easier to read Add comments to a measure Using quick measures 6 The Anatomy of CALCULATE Understanding CALCULATE filters Add context to CALCULATE with FILTER Using CALCULATE with a threshold 7 The ALL Measure Anatomy of ALL Create an ALL measure Using ALL as a filter Use ALL for percentages 8 DAX Iterators Anatomy of iterators A closer look at SUMX Using RELATED with SUMX Create a RANKX RANKX with ALL 9 Date and Time Functions Overview of functions Create a DATEDIFF function 10 Time Intelligent Measures Compare historical monthly data Create a DATEADD measure Creating cumulative totals Creating cumulative measures Visualising cumulative totals 11 Visualisations In-Depth Utilising report themes Applying static filters Group data using lists Group numbers using bins Creating heatmaps Comparing proportions View trends with sparklines 12 Comparing Variables Visualising trendlines as KPI Forecasting with trendlines Creating a scatter plot Creating dynamic labels Customised visualisation tooltips Export reports to SharePoint
Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles Tâcnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabrâ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Quâ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el âxito Construir una base s¢lida Impulsar el cambio
Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Total SAGE Training (Sage 50 Accounts + Sage Payroll Training) Want to open the door to working in Finance and Accountancy Industry? Starting our Total Sage Training courses will enhance your career potentials and give you the skills and knowledge you need to get started in Finance and Accountancy Industry. Total Sage Training courses are combined with Sage 50 Accounts and Sage Payroll Training. You will receive a CPD Completion Certificate from Osborne Training once you finish the course. You also have an Option to attain Certificate from SAGE(UK) subject to passing the exams. What qualification will I gain for Sage Training Courses? CERTIFICATION FROM SAGE (UK) As Osborne Training is a Sage (UK) Approved training provider, you could gain the following qualifications provided that you book and register for exams and pass the exams successfully: Sage 50c Computerised Accounting Course (Level 1) Sage 50c Computerised Accounting Course (Level 2) Sage 50c Computerised Accounting Course (Level 3) Sage 50c Computerised Payroll Course (Level 1) Sage 50c Computerised Payroll Course (Level 2) Sage 50c Computerised Payroll Course (Level 3) Level 1 Working with Sage 50 Accounts Program Basics. Creating Account names, Numbers & Bank Payments Financials Bank Reconciliations Generating Customers Invoices Monitoring Customer Activity Generating Product Invoices & Credit Notes Compiling & Sending Customer Statements Creating Customer Receipts & Purchase Invoices Supplier Payments Managing Recurring Entries Generating Reports & Information The Active Set-Up Wizard VAT Changes. Level 2 An overview of the Sage program Entering opening balances, preparing and printing a trial balance Creating customer records Creating supplier records Setting up opening assets, liabilities and capital balances, Producing routine reports Checking data, Entering supplier invoices Posting error corrections, amending records Invoicing, generating customer letters, entering new products, checking communication history Banking and payments, producing statements, petty cash Audit trails, correcting basic entry errors, reconciling debtors and creditors Creating sales credit notes, Processing purchase credit notes Preparing journals Verifying Audit Trail Purchase orders, processing sales orders Processing Trial Balance Creating Backups Restoring data Writing-off bad debts Level 3 Creating a Chart of Accounts to Suit Company Requirements Sole Trader Accounts preparation The Trial Balance preparation Errors in the Trial Balance Disputed Items Use of the Journal Prepare and Process Month End Routine Contra Entries The Government Gateway and VAT Returns Bad Debts and Provision for Doubtful Debts Prepare and Produce Final Accounts Management Information Reports Making Decisions with Reports Using Sage The Fixed Asset Register and Depreciation Accruals and Prepayments Cash Flow and Forecast Reports Advanced Credit Control
Payroll Accounting Training Fast Track (Level 1-3): This course brings you the skills you need to use this popular payroll program to confidently process any businesses payroll. Being able to use Sage 50 Payroll should lead to greater productivity. But it also helps the business conform to employment legislation and data security requirements. Furthermore, broken down into practical modules this course is a very popular and well-received introduction to moving from manual payroll to computerised payroll. Moreover, it incorporates all the new government requirements for RTI reporting. Finally, Payroll is a vital role within any organisation. A career in payroll means specialising in a niche field with excellent progression opportunities. In this course, you will be learning from Level 1 to Level 3 of Sage Computerised Payroll which could help you to land your dream job in the Payroll sector. As Osborne Training is a Sage (UK) Approved training provider, you could gain the following qualifications provided that you book and register for exams and pass the exams successfully: Sage 50c Computerised Payroll Course (Level 1) Sage 50c Computerised Payroll Course (Level 2) Sage 50c Computerised Payroll Course (Level 3) All exams are conducted online through Sage (UK). Level 1: Introduction to payroll Introduction to Real-Time Information (RTI) Preparing employee records Starters - new employees Calculation of Gross Pay The PAYE and National Insurance systems Creating Payslips and analysis Creating Backups and Restoring data Payment analysis Processing National Insurance contributions Voluntary deductions Processing Leavers Completing the Payroll Procedures Level 2: Introduction to Payroll Introduction to Real Time Information (RTI) Preparing employee records Creating Backup and Restoring Data Starters - new employees Calculation of Gross Pay Deductions - Pension schemes and pension contributions Processing the payroll - introduction to the PAYE system Processing the payroll - income tax National Insurance contributions - Processing in the payroll Voluntary deductions Student Loan repayments Attachment of Earnings Orders & Deductions from Earnings Orders Processing Leavers Introduction to statutory additions and deductions Processing Statutory sick pay (SSP) Processing Statutory Paternity Pay (SPP) Statutory paternity pay and paternity leave Completing the processing of the payroll Creating Payslips and analysis Reports and payments due to HMRC Level 3: Advanced processing of the payroll for employees Preparation and use of period end preparation of internal reports Maintaining accuracy, security and data integrity in performing payroll tasks. Deductions - Pension schemes and pension contributions Processing the payroll -complex income tax issues Payroll Giving Scheme processing Processing Statutory Adoption Pay (SAP) Advanced Income tax implications for company pension schemes Student Loan repayments Processing Holiday Payments Processing Car Benefit on to the Payroll System Attachment of Earnings Orders & Deductions from Earnings Orders Leavers with complex issues Advanced processing of statutory additions and deductions Recovery of statutory additions payments - from HMRC Completing the processing of the payroll Complex Reports and payments due to HMRC Cost Centre Analysis Advanced, routine and complex payroll tasks Calculation of complex gross pay
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow
Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. Getting Started with Data ONTAP List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems Use the CLI and GUI for administrative purposes Hardware Basics Describe the NetApp storage system hardware platforms and the types of disks that they support Describe the hardware components of NetApp storage controllers Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Creating & Managing Aggregates Describe aggregates and RAID groups Create aggregates in Data ONTAP operating in 7-Mode Create aggregates in the clustered Data ONTAP operating system Manage aggregates Managing NAS Client Access Configure NAS client access in Data ONTAP operating in 7-Mode Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP Create FlexVol volumes and qtrees Managing SAN Client Connections Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Use OnCommand System Manager to create iSCSI-attached LUNs Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs Access and manage a LUN from a Windows host Managing Volumes Explain the relationship between space guarantees, volumes, and aggregates Define thin provisioning and explain how it is used Define deduplication and describe the benefits that it provides Use OnCommand System Manager to set quotas Managing Snapshot Copies Define the function of Snapshot copies Create and delete a Snapshot copy Create Snapshot policies in the clustered Data ONTAP operating system Restore a volume from a Snapshot copy Create FlexClone volume clones that are backed by Snapshot copies Steps to Certification Recall the steps to NetApp Certification