• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43359 Courses delivered Online

Architecting Adv HPE Server Solutions Rev 16.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidate for this course Consultants Pre-sales Engineers Sales Engineers Systems Engineers Solutions Architects Overview This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills Recognizing Industry Trends Describe trends affecting enterprises and explain how these trends lead to the four Transformation Describe key business challenges enterprises are facing. Review the role of a server architect, emphasizing how the architect helps companies. Provide an overview of the HPE enterprise server solutions covered in this course: Apollo solutions Moonshot Integrity Superdome X Gathering Customer Requirements Identify key decision makers and explain how to engage them in a discussion about the company?s business requirements and challenges Obtain data and documentation required to understand the company? business requirements Explain best practices for creating requirements statements and documents Advanced Architecture for Server Solutions Analyze the special needs of data, High Performance Computing (HPC), and mission-critical workloads Given a customers? specific requirements, architect a solution for a data, HPC, and mission critical workloads HPE Apollo Solutions for HPC Explain the features and benefits of HPE Apollo 2000, 6000, and 8000 solutions Position HPE Apollo 2000 and 6000 solutions for the right use cases and workloads Create an implementation plan for an HPE Apollo 2000 or 6000 solution, including plans for the proper performance, scalability, high availability, and management HPE Apollo 4000 for Data-Driven Organizations Briefly describe the HPE Apollo 4000 portfolio Position HPE Apollo 4000 solutions for the right use cases Create an implementation plan for an HPE Apollo 4000 solution, including plans for the proper performance, scalability, and high availability HPE Moonshot Solutions Briefly describe the HPE Moonshot portfolio Position HPE Moonshot solutions for the right use cases Explain options and best practices for designing the networking component of an HPE Moonshot solution HPE Moonshot Workloads Position HPE Moonshot cartridges for the right use cases and workloads Create an implementation plan for the following solutions, including plans for the proper performance, scalability, and high availability: Big data and analytics solution Video processing solution Mobile workspace solution Web infrastructure solution HPE Integrity Superdome X Solutions Explain the benefits of the HPE Integrity Superdome X and describe its available options Explain the benefits of nPar and RAS features for HPE Integrity X solutions Position HPE Integrity Superdome X solutions for the right use cases Create an implementation plan for HPE Integrity X solutions, including plans for the proper performance, scalability, fault tolerance, high availability, and manageability Monitoring and Managing HPE Solutions Recommend and substantiate the HPE management tools that optimize administrative operations for various customer environments Explain the benefits of the HPE Representational State Transfer (REST) application program interface (API) Working with Customer Business Financials Demonstrate business acumen through an ability to analyze financial statements Define basic financial terms used when talking with a customer's executive officers Calculate key performance indicators (KPIs) to analyze a customer's financial health and understand industry and company trends Use HPE tools analyze a company's financial position Additional course details: Nexus Humans Architecting Adv HPE Server Solutions Rev 16.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting Adv HPE Server Solutions Rev 16.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting Adv HPE Server Solutions Rev 16.21
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Drive Sales with the Pardot Lightning App (PDX101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Pardot Marketers and Salesforce Administrators responsible for designing, building, and implementing marketing workflows and reports in the Pardot Lightning App. It's also for Business Users looking to learn more about the Pardot Lightning App. This course is a great foundation builder for anyone looking to take the Salesforce Pardot Specialist Certification Exam. Overview When you complete this course, you will be able to: Enable the Pardot Lightning App. Explain the relationship created between Pardot and Salesforce once the Pardot Lightning App has been enabled. Generate leads with Pardot Lightning App's various lead generation tools including forms, landing pages, and custom redirects. Manage leads with Pardot Lightning App's lead management tools including page actions, automation rules, segmentation rules, dynamic lists, and completion actions. Engage leads with Pardot Lightning App's lead engagement tools including email, personalization, dynamic content, and Engagement Studio. Qualify leads with Pardot Lightning App's scoring and grading functionality. Interpret data generated via Pardot Lightning App's reporting capabilities. Design and execute successful end-to-end marketing workflows using the Pardot Lightning App. Discover how to drive more qualified leads, nurture prospects through the sales cycle, and sell more effectively using the Pardot Lightning App. In this 3-day class, Pardot experts will show you how to design and implement marketing workflows in the Pardot Lightning App to make data-driven decisions and drive your company?s business forward. Learn how to create and automate dynamic emails, generate and qualify leads, and leverage reports and data to boost sales. Course Introduction Review Course Objectives Set Learner Expectations Review Housekeeping Items Review Additional Course Resources Explore Course Case Study Salesforce Integration Understand the Pardot-Salesforce Relationship Sync Data Between Salesforce and Pardot Enable the Pardot Lightning App in Salesforce Create Custom Fields Review Salesforce Campaigns Administration Create a Pardot Dashboard Authenticate Your Email Sending Domains Sync with Third-Party Applications Using Connectors Restore Assets from the Recycle Bin Create and Assign Users and User Groups Understand Usage Governance Visitors and Prospects Understand Pardot Visitors Understand Pardot Prospects List Management Create List Types Organize Prospects Using Static Lists Test Emails Using Test Lists Personalization and Email Marketing Personalize Your Emails with HML and Advanced Dynamic Content Automate Email Marketing Create Email Templates See What Works Best for Your Audience Using AB Testing Track Email Performance Using Email Reports Forms and Landing Pages Capture Leads with Forms Convert Visitors to Leads Using Landing Pages Track Leads with Forms and Landing Page Reports Track Clicks Using Custom Redirects Create Custom Redirect Reports Lead Management Trigger Page Actions Automate Actions from a Marketing Element Using Completion Actions Create a List of Prospects and Apply a Segmentation Action Using Segmentation Rules Create Repeatable, Criteria-Based Automation Rules Create Dynamic Lists Choose an Automation Tool Lead Qualification Understand Prospect Scoring Grade Prospects Based on Profiles Lead Nurturing Build an Engagement Program Create Engagement Program Reports Additional course details: Nexus Humans Salesforce Drive Sales with the Pardot Lightning App (PDX101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Drive Sales with the Pardot Lightning App (PDX101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Drive Sales with the Pardot Lightning App (PDX101)
Delivered OnlineFlexible Dates
Price on Enquiry

Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course includes professionals who are new to Looker who are interested in leveraging Looker for data analysis, visualization, and reporting. The course is designed for individuals seeking to gain a comprehensive understanding of Looker's functionalities and apply these skills in their organizations to drive data-driven decision-making. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore and gain: Solid foundation in Looker's platform: Acquire a comprehensive understanding of Looker's key features, functionality, and interface, enabling you to effectively utilize the platform for your data analysis and visualization needs. Proficiency in LookML and data modeling: Develop essential skills in Looker's unique data modeling language, LookML, to create efficient and customized data models tailored to your organization's specific requirements. Expertise in creating Explores: Learn how to build, customize, and save Explores with dimensions, measures, filters, and calculated fields, empowering you to analyze your data and uncover valuable insights in a short amount of time. Mastery of dashboard design and visualization: Gain the skills to design visually appealing and informative dashboards, create various types of visualizations, and customize them to effectively communicate your data story. Improved content organization with folders and boards: Understand how to effectively use folders and boards in Looker to organize, manage, and discover content, making your data insights easily accessible for you and your team. Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker is a one day, hands-on course designed to equip professionals from a variety of backgrounds with the knowledge and skills needed to harness the full potential of their data using Looker's powerful platform. With the guidance of our expert trainers, you will gain a basic understanding of Looker's features, enabling you to create visually engaging, interactive, and insightful reports and dashboards to drive informed decision-making. Throughout this interactive workshop, you will explore Looker's key functionalities, including connecting to data sources, mastering LookML, building custom Explores, and designing captivating dashboards. With about 40% of the course dedicated to hands-on labs and a guided project, you will have ample opportunity to apply the skills you've learned in real world scenarios. Don't miss this opportunity to elevate your data analysis and visualization capabilities, enhance your professional skill set, and unlock the power of data-driven decision making. Getting Started with Looker Overview of Looker and its key features Navigating the Looker interface Connecting to Data Sources and LookML Basics Setting up and managing data connections Exploring database schemas Understanding LookML: Looker's data modeling language Creating and Customizing Explores Building and customizing Explores Adding dimensions, measures, and filters Creating calculated fields Data Visualization and Dashboard Design Creating visualizations using Looker's visualization library Customizing chart types, colors, and labels Displaying visualizations in dashboards Organizing Content with Folders and Boards Introduction to folders and boards in Looker Creating and managing folders for organizing content Setting up boards for easy content discovery Hands-on Workshop and Project Participants work on a guided project to apply the skills learned Wrap-up and Q&A Additional course details: Nexus Humans Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)
Delivered OnlineFlexible Dates
Price on Enquiry

GRC300 SAP Access Control Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GRC300 SAP Access Control Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build Application Architect Expertise (ARC901)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Application Architect Expertise (ARC901)
Delivered OnlineFlexible Dates
Price on Enquiry

Apple - Mac Final Cut Pro X - Level 101

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for anyone looking to edit professional-quality video with Final Cut Pro X and who prefers hands-on and interactive instruction to best explore its functionality. Overview Start with basic video editing techniques and work all the way through Final Cut Pro's powerful advanced features. Students work with dramatic real-world media to learn the practical techniques used daily in editing projects. Final Cut Pro X is a revolutionary video editing application that makes it possible for beginners and professionals to achieve stunning results. This course teaches students to perform editing functions and becoming familiar with the user interface. Exploring the Final Cut Pro X Interface Following a Workflow Opening Final Cut Pro X Exploring the Interface Using Menus and Shortcuts Viewing and Sorting Events Skimming Clips and Changing Views Viewing and Creating Projects Working in the Project Library Viewing Projects in the Timeline Hiding and Quitting Final Cut Pro Importing Importing Media into an Event Importing Folders as Keyword Collections Analyzing and Correcting Imported Clips Importing from a Camera Importing from the Finder Importing from Other Applications Organizing Clips in an Event Using Metadata to Customize an Event Adding Keywords to Clips Assigning Multiple Keywords to Clips Applying Keywords to a Clip Range Rating, Sorting and Searching Clips Creating Smart Collections Building a Rough Cut Creating a New Project Screening and Marking Clips Appending Clips in the Timeline Viewing and Arranging Clips in the Magnetic Timeline Inserting Clips into the Primary Storyline Changing Edited Clips Connecting Clips to the Primary Storyline Closing your Project Finetuning a Rough CutAdding to the Primary Storyline Duplicating a Project Removing Clip Selections and Adding Gaps Understanding Trimming, Applying the Trim Tool Trimming with Precision Applying Transitions Preparing for Transitions Applying a Video Transition Using the Transitions Browser Modifying Transitions Changing Transition Parameters in the Inspector Adding Transitions to Other Storylines and Compound Clips Exploring Audio Transitions Working with Sound Monitoring and Adjusting Audio in the Timeline Adding Music and Sound Effects, Adjusting Levels in the Audio Inspector Creating Audio Fades Recording a Narration Track Correcting Problem Audio Working with Titles, Generators and Themes Using the Titles Browser Adding a Lower Third Modifying Titles Adding Bumpers and Credits Working with Video Generators Using Themes Retiming and Transforming Clips Understanding Motion Properties Retiming Clips Creating Holds and Variable Speed Segments Applying Preset Speed Effects Transforming an Image Cropping an Image Adding a Ken Burns Effect Creating Keyboard Shortcuts Applying Effects and Enhancing Color Applying Video Effects Modifying Effect Parameters Auditioning and Animating Effects Applying Audio Effects Enhancing Color in Final Cut Pro Exporting and Sharing Your Project Preparing a Project for Exporting and Sharing Detecting Audio Peaks Adjusting Video Levels for Broadcast Exporting Movie File Publishing a Project to Apple Devices Publishing a Project to Video Sharing Sites Exporting an Image from your Project Exporting for Blue-Ray Disc, DVD, or Disk Image Certification Exam Students can take an end user exam to earn Apple Certified Pro, Final Cut Pro X Level One status Additional course details: Nexus Humans Apple - Mac Final Cut Pro X - Level 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac Final Cut Pro X - Level 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Apple - Mac Final Cut Pro X - Level 101
Delivered OnlineFlexible Dates
Price on Enquiry

Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5)

By Nexus Human

Duration 5 Days 30 CPD hours This one of kind Cisco UC in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco UC Components. Students will have extensive labs in which they will Administer and troubleshoot a Cisco 12.5 UC Deployment.Participants will gain in-depth practical knowledge with exercises on administering and troubleshooting of all Cisco UC Components. Tools for Managing UC Collaboration 12.5 Prime Collaboration Deployment Manager Overview 12.5 Bulk Admin Tool (BAT) Importing and Exporting Settings Importing and Exporting Users Importing and Exporting Phones Phone Migrations Unsupported IP Phone Models CUCM Upgrades Loading COP Files Unified Communication Manager 12.5 Cisco Smart Licensing Cisco Unified Communication Manager Overview Cisco UCM Configuration Redundancy Services Service Parameters Enterprises Parameters User Configuration LDAP Integration Synchronization Authentication Attribute Mapping Filters Endpoint Configuration Creating and Modifying Phone and Configuration Call Routing Implementing Calling Privileges Partitions and CSSs Configuration Implementing Extension Mobility Media Resources Cisco Meeting Server Troubleshooting UCM Features CAR (CDR Accounting and Reporting) Tool Reports Dialed Number Analyzer RTMT Log Collection Use RTMT to View Performance Counters Troubleshooting Common Endpoint Registration Issues Disaster Recovery System Remote Site Redundancy Gateway Gateway Overview Cisco H323 Gateways Cisco MGCP Gateways Cisco IOS SIP Gateways Troubleshooting IOS Gateways Cisco Emergency Responder (CER) 12.5 CER Overview Emergency Notifications CER Redundancy and Clustering Integration with CUCM Cisco Emergency Responder Administration Interfaces Configuring Users and Role-Based System Access Configuring Cisco Emergency Responder Notification by IP Subnet SNMP Overview Adding new switches Notification by Switch Port Cisco Unified Communications Mobile and Remote Access (MRA) MRA Overview Expressway Edge MRA Licensing MRA Components Certificates Integrating Cisco Unified IM and Presence 12.5 IM&P and Jabber Overview Configure Service Discovery DNS Record Requirements Install Cisco Jabber Cisco Jabber in Softphone Mode Set Up Cisco Jabber in Full UC Mode Integrating CUCM and IM&P Configuring CUCM Services for Jabber Troubleshooting Jabber Integrating Cisco Unity Connection 12.5 Cisco Unity Connection Overview Cisco Unity Connection Integration Using SIP Cisco Unity Connection Call Handlers Configuring Search spaces and Partitions Cisco Unity Connection Administration Cisco Unity Connection Integration Troubleshooting Tools RTMT Using Port Monitor to Troubleshoot Voice Mails Cisco Unity Audiotext Application Unified Messaging Cisco Meeting Server (CMS) Introduction to Cisco Meeting Server Configuring CMS Configuring Meetings with CMS Configuring Spaces with CMS Scheduling Meeting with TMS Cisco UCCX Cisco Unified Contact Center Express Overview Cisco Unified Contact Center Express Administration Agents Skills Queues Basic Scripting (Overview) Finesse Reporting CUIC Cisco Paging Server (InformaCast) InformaCast Overview InformaCast Administration IP Phone Paging Analog Paging Multicast Requirements Using InformaCast Troubleshooting Using Troubleshooting Methodology Analyze the Troubleshooting Process Troubleshooting Methodology in Complex Environments Define the Problem Gather Facts Consider Possibilities Create an Action Plan Implement an Action Plan Observe Results Restart the Problem-Solving Process Document Facts Using Troubleshooting and Monitoring Tools Cisco Unified Serviceability Cisco Unified RTMT Performance Monitor and Data Logging Trace File Collection Troubleshooting Common Gateway and Endpoint Registration Issues IP Phone Initialization Common DHCP-Related and TFTP-Related Issues Using Ping to Cisco IP Phones Cisco Unified IP Phone Status Messages Cisco Unified IP Phone Network Configuration Additional course details: Nexus Humans Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Administering Cisco Unified Communications (Call Manager) (ACUCC v12.5)
Delivered OnlineFlexible Dates
Price on Enquiry

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: Advanced Integrations [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence™ and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience

VMware Workspace ONE: Advanced Integrations [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry