Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 2 Days 12 CPD hours This course is intended for The Professional Scrum Master course is for anyone involved in software development using the Scrum framework. It is particularly beneficial for those people within an organization accountable for getting the most out of Scrum, including Scrum Masters, managers, and Scrum Team members. Overview Students are challenged to think within the Scrum framework and the underlying values and principles to better understand what to do when returning to the workplace and facing complex decisions. This course covers the principles and (empirical) process theory underpinning the Scrum framework, and the role of the Scrum Master in it. This course is a combination of instruction and team based exercises, and teaches what is at the heart of the Scrum and Agile movement. Scrum theory and principlesThe Scrum FrameworkThe Definition of DoneRunning a Scrum projectWorking with people and teamsScrum in your organizationThe role of the Scrum Master
Duration 2 Days 12 CPD hours This course is intended for Applications consultants, business analysts, business process owners, developer consultants, help desk consultants, project managers, and technology consultants. Overview This course will prepare you to: Give an overview of the S/4HANA embedded analytics architecture Explain the analytical offerings per user type Give an Introduction to SAP Best Practices for Analytics with SAP S/4HANA Explain the integration scenarios with SAP Business Warehouse In this course, students will gain an overview of the S/4HANA embedded analytics real-time operational reporting, its offerings per user type for the S/4HANA 610 and its integration with SAP Business Warehouse. Module 1 S/4HANA and S/4HANA embedded analytics introduction Module 2 S/4HANA embedded analytics architecture overview Module 3 Analytical Consumption Module 4 SAP Best Practices for Analytics with SAP S/4HANA Module 5 SAP Business Warehouse Integration Scenarios
Duration 3 Days 18 CPD hours This course is intended for Application ConsultantBusiness AnalystBusiness Process ArchitectBusiness Process Owner / Team Lead / Power UserExecutiveIndustry SpecialistProgram/Project Manager Overview This course will prepare you to:Describe the motivation for S/4HANA Enterprise ManagementExecute innovative logistics processes in the areas of logistics planning and execution in S/4HANA, especially in manufacturing, procurement, and salesLearn about the simplification listOutline the SAP User Experience strategyUse SAP Fiori among other user interfaces to execute logistics processesOutline different migration strategies Students will learn to execute innovative logistics processes in the areas of logistics planning and execution in S/4HANA, especially in manufacturing, procurement, and sales. Motivation and Functional Overview of SAP S4/HANA (Materials Management and Operations)Simplification ListSAP User Experience, especially SAP FioriInnovative Logistics Processes in the Areas of Logistics Planning and Execution in S/4HANA, especially in Manufacturing, including MRP Life and Production Planning / Detailed Scheduling (PP/DS) Procurement, Sales, including Back Order Processing, and Extended Warehouse Management (EWM) Migration Scenarios
Duration 5 Days 30 CPD hours This course is intended for This advanced course is for: AIX technical support personnel Performance benchmarking personnel AIX system administrators Overview Define performance terminology Describe the methodology for tuning a system Identify the set of basic AIX tools to monitor, analyze, and tune a system Use AIX tools to determine common bottlenecks in the Central Processing Unit (CPU), Virtual Memory Manager (VMM), Logical Volume Manager (LVM), internal disk Input/Output (I/O), and network subsystems Use AIX tools to demonstrate techniques to tune the subsystems In this course, students will develop the skills to measure, analyze, and tune common performance issues on IBM Power Systems running AIX. Day 1 Performance analysis and tuning overview Data collection Monitoring, analyzing, and tuning CPU usage Day 2 Virtual memory performance monitoring and tuning Day 3 Physical and logical volume performance File system performance monitoring and tuning Day 4 File system performance monitoring and tuning Network performance Day 5 NFS performance Performance management methodology
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features
Duration 3 Days 18 CPD hours This course is intended for Application consultants Overview In this course, participants use and customize functions in delivery processing. In this course, students learn the customizing settings of delivery documents and the set-up of corresponding functions. Idea and Function of the Delivery Document Explaining the Concept and Structure of the Delivery Document Basic Organizational Units for the Delivery Process Maintaining the Organizational Units for Delivery Processes Controlling Deliveries Controlling Delivery Documents The Goods Issue Process Based on the Delivery Adjusting Automatic Determination of Relevant Fields for Outbound Delivery Creation Adjusting Delivery and Transportation Scheduling Processing Outbound Deliveries Using the Outbound Delivery Monitor Processes and Functions based on the Delivery Picking Outbound Deliveries Packing Materials Handling Goods Issues Using Special Functions in Deliveries Further Application Areas of the Delivery Document Transferring Stock Between Plants Performing Goods Receipts Using Deliveries Specified Delivery Scenario Setting Up a Specified Delivery Scenario
Duration 3 Days 18 CPD hours This course is intended for Security administrators, developers, developer consultants, system administrators, and technology consultants. Overview This training course will focus on the authorization, security, and integrated scenario. In this course, students will focus on the authorization, security, and integrated scenarios for SAP HANA. Module 1 Creation of authorizations and authorization roles Module 2 User management Module 3 Access control for HANA native models Module 4 Authorization trace Module 5 Auditing Module 6 Authentication and single sign-on options Module 7 Encryption options Module 8 Security considerations for Multitenant Database Containers Module 9 SAP GRC Integration for Governance Risk and Compliance Module 10 HANA use case scenarios and security requirements Module 11 SAP Netweaver Identity Management integration Module 12 Reusing of BW authorizations for SAP HANA applications Module 13 HANA Cloud Platform (HCP) security Module 14 HANA Enterprise Cloud security
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for students who have experience using the Windows 10 operating system and need to start using the Windows 11 operating system. Overview In this course, you will use the new and updated features of Windows 11. You will: Navigate the Windows environment. Use apps available in Windows 11. Manage available apps. Configure Windows 11 settings. As an experienced Windows© 10 user, when you are ready to move to Windows 11, you might like some guidance in using the new and updated features. This course will help you identify and use those features efficiently and effectively. Navigating the Windows 11 Environment Topic A: Log in to Windows 11 Topic B: Use the Start Menu Topic C: Use the Taskbar Using Apps Topic A: Use Built-In Apps Topic B: Use the Updated File Explorer Managing Apps Topic A: Use Virtual Desktops Topic B: Obtain Apps from the Microsoft Store Configuring Windows 11 Settings Topic A: Use the Configuration Apps Topic B: Configure Accessibility Features
Duration 2 Days 12 CPD hours This course is intended for Support Consultant System Administrator Technology Consultant Overview The objective of this course is to enable students to use the one-step migration procedure (DMO - Database Migration Option) to SAP HANA autonomously. This course covers the most important tasks for an SAP HANA administrator for the combined update & migration of an SAP system to the SAP HANA database. Furthermore, it provides details about the procedure and technical details of the process. Getting Familiar with Database Migration Option (DMO) Listing DMO Benefits Explaining DMO Basics Preparing Database Migration Option (DMO) Procedure Ensuring DMO Prerequisites are Fulfilled on the Host Configuring SAP Host Agent for DMO Examining the SUM UI Configuration of Database Migration Option (DMO) Procedure Starting the DMO Run Continuing DMO with Roadmap Steps Configuration and Checks Continuing DMO with Roadmap Steps Preprocessing Listing DMO Procedure Steps Monitoring the Migration Resetting the DMO Procedure Tuning the DMO Downtime Listing the DMO Steps After Roadmap Step Preprocessing Explaining the DMO Release Schedule Listing Migration Options to SAP HANA