Duration 2 Days 12 CPD hours This course is intended for SAP professionals Overview Explain the motivation and need for a next generation business suite and how SAP S/4HANA enables a digital organizationDescribe the SAP S/4HANA business and technical architectureGain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoptionExplain how SAP S/4HANA supports the business users with a new user experience (e.g.: SAP Fiori UX)Describe key business processes of SAP S/4HANA Enterprise ManagementExplain SAP S/4HANA embedded analytics capabilitiesGain basic knowledge about SAP S/4HANA LoB solutions and add-on supportDescribe integration scenarios between SAP S/4HANA and SAP Cloud solutions In this course, students learn a broad range of topics including the motivation behind the development of SAP S/4HANA. Course Outline Introduction to SAP S/4HANA SAP S/4HANA user experience SAP HANA powers SAP S/4HANA SAP Activate for SAP S/4HANA SAP S/4HANA Enterprise Management, LoB solutions and add-ons SAP S/4HANA embedded analytics Integration between SAP S/4HANA Core and SAP Cloud solutions Additional course details: Nexus Humans S4H01 SAP Business Suite to SAP S/4HANA Delta training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H01 SAP Business Suite to SAP S/4HANA Delta course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability. This course is also designed for you to prepare for the CyberSAFE credential. You can obtain your CyberSAFE certificate by completing the CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify security compliance measures. Address social engineering attempts. Secure devices such as desktops, laptops, tablets, smartphones, and more. Use the Internet securely. Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:Understand both security and compliance needs and requirements.Recognize and avoid phishing and other social engineering attempts.Recognize and avoid viruses, ransomware, and other malware.Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Identifying Security Compliance Measures Topic A: Identify Organizational Compliance Requirements and Resources Topic B: Identify Legal Compliance Requirements and Resources Topic C: Identify Industry Compliance Requirements and Resources Recognizing and Addressing Social Engineering Attacks Topic A: Recognize Phishing and Other Social Engineering Attacks Topic B: Defend Against Phishing and Other Social Engineering Attacks Securing Devices Topic A: Maintain Physical Security of Devices Topic B: Use Secure Authentication Methods Topic C: Protect Your Data Topic D: Defend Against Malware Topic E: Use Wireless Devices Securely Using the Internet Securely Topic A: Browse the Web Safely Topic B: Use Email Securely Topic C: Use Social Networks Securely Topic D: Use Cloud Services Securely Topic E: Work from Remote Locations Securely
Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This is a basic course for IBM Engineering Requirements Management DOORS users. Overview Upon completion of the course, students will be able to: Navigate within a DOORS database Create structured data in a DOORS formal module Modify existing data in a DOORS formal module Review existing data in a DOORS formal module Create relationships in a DOORS database Report on relationships in a DOORS database This course is for new IBM Engineering Requirements Management DOORS (DOORS) users. It introduces basic DOORS concepts and functionality. It includes hands-on exercises that teach users to create, edit, manipulate, and analyze requirements data in DOORS. Unit 1 Navigating a DOORS Database Unit 2 Viewing information Unit 3 Editing information Unit 4 Structure Unit 5 Capturing additional information Unit 6 Working with Microsoft Word documents Unit 7 Locating information Unit 8 Manipulating the display Unit 9 Creating traceability Unit 10 Traceability analysis Unit 11 Object linking and embedding Unit 12 Discussions Additional course details: Nexus Humans QN101G IBM Engineering Requirements Management DOORS V9.6 - Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QN101G IBM Engineering Requirements Management DOORS V9.6 - Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Application Consultants and Technical Consultants Overview Understand and have a clear overview of SAP MIIUnderstand SAP MII data, service enablement, messaging, visualization, and business logic servicesUse SAP MII tool to integrate various data from different data sources (Synchronous and Asynchronous)Use SAP MII to connect manufacturing shop floor system and SAP ERP system in addition to XML functions and document buildingUse SAP MII new features: Self-Service Composition Environment, Manufacturing Data Objects, Plant Information Catalog, KPI and Alert Frameworks This is a fundamental course students should take in order to gain an understanding of the SAP MII product, which is the foundational product of SAP Connected Manufacturing. Course Outline Introduction to SAP MII SAP MII Administration and linkages to NetWeaver Administration Data Server and Enterprise Configuration Navigation and Home Page Themes Developing with SAP MII Workbench & Self-Service Composition Environment (SSCE) Query & HTML5 Display Templates Time Engine MII HTML5 JavaScript functions MII Reporting and Localization Business Logic Services (Basics) Plant Information Catalog and SAP Plant Connectivity KPI and Manufacturing Data Objects (MDO) Alerting Framework Additional course details: Nexus Humans SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?
Duration 2 Days 12 CPD hours This course is intended for System administrators Overview Prepare you to perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. In this course, students perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. SAP BusinessObjects Business Intelligence (BI) Platform Identifying the Components of the SAP BusinessObjects Business Intelligence BI Platform Content and Objects in the SAP BusinessObjects Business Intelligence (BI) Platform Viewing and Modifying Objects in the BI Platform Organizing Objects in the BI Platform Searching for Content in the BI Platform User and User Group Security in the SAP BusinessObjects Business Intelligence (BI) Platform Setting Up Users and Groups Administering Rights Application Security in the SAP BusinessObjects Business Intelligence (BI) Platform Managing Access to Applications Securing Applications Content Distribution Using Scheduling and Alerting Scheduling Objects Managing Instances Managing Calendars Managing Events Configuring Alerts and Alerting Publications and Publishing Designing Publications Additional course details: Nexus Humans BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this class are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, and Program/Project Managers Overview Explore settings to map requirements in the area of Sales and Distribution (S&D) that require knowledge of cross-application Customizing functionsUnderstand and consider complex relationships in mapping organizational structuresConfigure and adapt special functions like copy control, text control, output controlUnderstand system modification options and personalization techniques This course is ideal for students who are requiring detailed cross-application configuration knowledge to map requirements integrated to sales and distribution. Copy Control Modifying Copy Control Text Control Identifying Text Sources Configuring Text Control Output Adjusting Output Determination Adjusting Output Types Using PDF-Based Forms in the Sales Process Enhancements & Modifications Using Enhancement Technology Adjusting the Screen Setup of a Transaction Using Table Controls Adjusting Lists in Sales and Distribution Controlling Customer Master Data Using Account Groups Adjusting the Screen Setup of a Transaction Using Transaction Variants Adding New Fields Performing System Modifications Using Classic Enhancement Technology Performing System Modifications Using the Enhancement Framework Additional course details: Nexus Humans SCM650 SAP Cross-Functional Customizing in Sales and Distribution training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM650 SAP Cross-Functional Customizing in Sales and Distribution course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, Business Process Owners/Team Leads/Power Users, Data Consultants /Managers, Program/Project Managers, and Solution Architects. Overview Gain hands-on experience in running SAP BusinessObjects BI tools on top of SAP NetWeaver BW data In this course, students are provided with detailed knowledge on the integration for reporting of SAP BusinessObjects BI Platform 4.x with SAP NetWeaver 7.x. Overview of SAP BusinessObjects Business Intelligence(BI) 4.x and SAP NetWeaver Describing SAP BusinessObjects 4.x Semantic Layer in SAP BusinessObjects BI 4.x and Data Connectivity Describing Semantic Layer Technology Creating a Universe with the Information Design Tool SAP BusinessObjects Analysis, Edition for Microsoft Office and SAP NetWeaver BW Creating a Workbook in SAP BusinessObjects Analysis, Edition for Microsoft Office Creating a Workbook with SAP BusinessObjects Analysis, Edition for Microsoft Office and SAP BW SAP BusinessObjects Analysis, Edition for OLAP and SAP NetWeaver BW Creating a Workspace with SAP BusinessObjects Analysis, Edition for OLAP Creating a Workspace in SAP BusinessObjects Analysis, Edition for OLAP Based on a BW Query SAP BusinessObjects Design Studio and SAP NetWeaver BW Creating an Analytical Application in SAP BusinessObjects Design Studio Creating an Analytical Application with Scripting SAP BusinessObjects Dashboards and SAP NetWeaver BW Creating a Dashboard with SAP BusinessObjects Dashboards Creating a Dashboard with BEx Query SAP Crystal Reports and SAP NetWeaver BW Creating a Report with SAP Crystal Reports for Enterprise Creating a Report with SAP Crystal Reports 2013 Creating a Report with SAP Crystal Reports 2013 and SAP NetWeaver BW Differentiating SAP Crystal Reports 2013 and SAP Crystal Reports for Enterprise SAP BusinessObjects Web Intelligence and SAP NetWeaver BW Creating a Web Intelligence Document Creating a Web Intelligence Document for SAP NetWeaver BW SAP BusinessObjects Explorer and SAP NetWeaver BW Creating an SAP BusinessObjects Explorer Information Space Describing Data Connectivity between SAP BusinessObjects Explorer and SAP NetWeaver BW Information Distribution Reporting with Mobile Devices Creating Publications with SAP Crystal Reports and SAP BusinessObjects Web Intelligence Integrating BI Content with SAP NetWeaver Enterprise Portal