• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25528 Courses delivered Online

Salesforce.com - Sales Cloud for Sales Representatives

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for sales representatives who are managing their sales territories, with the goal of converting sales leads into sales opportunities and sales opportunities into closed sales. You may be selling products or services, or you may or may not be familiar with other CRM systems and may be new to Salesforce CRM. Overview In this course, students will create and manage records in the trial version of Salesforce© Sales Cloud© Lightning Enterprise Edition.Students will:- Create a basic Salesforce Sales Cloud environment and navigate the interface.- Optimize lead qualification.- Manage accounts and contacts.- Manage the opportunity pipeline.- Use Salesforce email.- Work with reports and dashboards. This course will give students the knowledge and skills they need to use Salesforce© in the real world?ultimately enabling them to meet and exceed their sales targets. Getting Started with Salesforce Set Up a Trial Version of Salesforce Sales Cloud Enterprise Edition Navigate the Salesforce LE Interface Navigate in the Salesforce Classic Interface Optimizing Lead Qualification View Leads Manage Leads Work Leads Convert Leads Managing Accounts and Contacts Manage Accounts Manage Contacts Managing the Opportunity Pipeline Manage Opportunities Work Opportunities Close Opportunities Using Salesforce Email Use Salesforce Email in Salesforce Classic Use Salesforce Email in Salesforce LE Working with Reports and Dashboards View Reports and Dashboards Create and Edit Reports and Dashboards

Salesforce.com - Sales Cloud for Sales Representatives
Delivered OnlineFlexible Dates
Price on Enquiry

DSP01 SAP Introduction to SAP Data Warehouse Cloud

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Developer Enterprise Architect Solution Architect Trainer Overview This course will prepare you to: Understand the basic concepts of SAP data warehousing Position the value-added of SAP Data Warehouse Cloud Integrate on-premise SAP Sources Model in SAP Data Warehouse Cloud Consume Data in SAP Analytics Cloud This course will prepare you to:Understand the basic concepts of SAP data warehousingPosition the value-added of SAP Data Warehouse CloudIntegrate on-premise SAP SourcesModel in SAP Data Warehouse CloudConsume Data in SAP Analytics Cloud Course Outline Getting started with data warehousing and the training environment Short introduction in SAP BW Bridge and other sources SAP Data Warehouse Cloud: -Introducing SAP Data Warehouse Cloud -Describing Spaces, integration options, operations and best practices -Introducing modeling in the Data Builder -Introducing modeling the Business Layer Describing consumption options in SAP Analytics Cloud Additional aspects in SAP Data Warehouse Cloud Outlook and roadmap Additional course details: Nexus Humans DSP01 SAP Introduction to SAP Data Warehouse Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DSP01 SAP Introduction to SAP Data Warehouse Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DSP01 SAP Introduction to SAP Data Warehouse Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry

SCM650 SAP Cross-Functional Customizing in Sales and Distribution

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this class are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, and Program/Project Managers Overview Explore settings to map requirements in the area of Sales and Distribution (S&D) that require knowledge of cross-application Customizing functionsUnderstand and consider complex relationships in mapping organizational structuresConfigure and adapt special functions like copy control, text control, output controlUnderstand system modification options and personalization techniques This course is ideal for students who are requiring detailed cross-application configuration knowledge to map requirements integrated to sales and distribution. Copy Control Modifying Copy Control Text Control Identifying Text Sources Configuring Text Control Output Adjusting Output Determination Adjusting Output Types Using PDF-Based Forms in the Sales Process Enhancements & Modifications Using Enhancement Technology Adjusting the Screen Setup of a Transaction Using Table Controls Adjusting Lists in Sales and Distribution Controlling Customer Master Data Using Account Groups Adjusting the Screen Setup of a Transaction Using Transaction Variants Adding New Fields Performing System Modifications Using Classic Enhancement Technology Performing System Modifications Using the Enhancement Framework Additional course details: Nexus Humans SCM650 SAP Cross-Functional Customizing in Sales and Distribution training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM650 SAP Cross-Functional Customizing in Sales and Distribution course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM650 SAP Cross-Functional Customizing in Sales and Distribution
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Modelling Business Processes

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Modelling Business Processes (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Modelling Business Processes principles and techniques. Key areas are: The role of business process modelling Modelling core business processes at an organizational level Modelling business processes at the process level Documenting and analyzing tasks The use of gap analysis in improving business processes The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered. The course provides in-depth knowledge and practice in Modelling Business Processes Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Process Modelling Exam Details Business Analysis Certification Scheme The Context for Business Process Modelling Purpose and benefits of business process modelling Three levels of business process hierarchy (Organization, process and task level) Process view versus the functional view of an organization Assessing the impact of a new process design (POPIT model) Implementation of a business change (Pilot, phased, direct changeover, parallel running) The Organizational Context for Business Processes Construction of an organizational level model of a business process External and internal elements of an organizational model Supporting the value proposition Modelling the Business Processes Construction of a business process model Standard notation Process, task and step OPOPOT External, internal and time-based events Internal performance measures and customer expectations of performance Documenting Tasks A task description UML activity diagram notation and structured english Improving Business Processes task automation, removal of gaps and disconnects, process reengineering business rules and assumptions Unsatisfactory performance Combinations of conditions Gap analysis

Business Analysis - Modelling Business Processes
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus CyberSAFE (CBS-410)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability. This course is also designed for you to prepare for the CyberSAFE credential. You can obtain your CyberSAFE certificate by completing the CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify security compliance measures. Address social engineering attempts. Secure devices such as desktops, laptops, tablets, smartphones, and more. Use the Internet securely. Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:Understand both security and compliance needs and requirements.Recognize and avoid phishing and other social engineering attempts.Recognize and avoid viruses, ransomware, and other malware.Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Identifying Security Compliance Measures Topic A: Identify Organizational Compliance Requirements and Resources Topic B: Identify Legal Compliance Requirements and Resources Topic C: Identify Industry Compliance Requirements and Resources Recognizing and Addressing Social Engineering Attacks Topic A: Recognize Phishing and Other Social Engineering Attacks Topic B: Defend Against Phishing and Other Social Engineering Attacks Securing Devices Topic A: Maintain Physical Security of Devices Topic B: Use Secure Authentication Methods Topic C: Protect Your Data Topic D: Defend Against Malware Topic E: Use Wireless Devices Securely Using the Internet Securely Topic A: Browse the Web Safely Topic B: Use Email Securely Topic C: Use Social Networks Securely Topic D: Use Cloud Services Securely Topic E: Work from Remote Locations Securely

CertNexus CyberSAFE (CBS-410)
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Data Science for Business Professionals (DSBIZ)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who want to increase their knowledge of and familiarity with concepts surrounding data science. Other individuals who want to know more about basic data science concepts are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DSBIZ™ (Exam DSZ-110) credential. Overview In this course, you will identify how data science supports business decisions. You will: Explain the fundamentals of data science Describe common implementations of data science. Identify the impact data science can have on a business The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improve and expand the success of the business. Data Science Fundamentals What is Data Science? Types of Data Data Science Roles Data Science Implementation The Data Science Lifecycle Data Acquisition and Preparation Data Modeling and Visualization The Impact of Data Science Benefits of Data Science Challenges of Data Science Business Use Cases for Data Science Additional course details: Nexus Humans CertNexus Data Science for Business Professionals (DSBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Science for Business Professionals (DSBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Data Science for Business Professionals (DSBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Fundamentals for the Business or End User

By Nexus Human

Duration 0.5 Days 3 CPD hours Overview By the end of the course, delegates will know: The difference between cybersecurity and physical security Identify what information is sought after How to protect valuable data and accounts How to detect a data breach How to respond to an incident How to recover from a data breach A security checklist Why You Should Care What are cybersecurity threats How to improve cybersecurity Account access best practices How to protect cloud-based information How to prevent phishing Detecting a data breach Responding to a data breach Protection against scams

Cybersecurity Fundamentals for the Business or End User
Delivered OnlineFlexible Dates
Price on Enquiry