Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who want to learn how to program Android applications using the Java Programming Language. Overview Upon successful completion of this course, students will have an understanding of basic application Android development. This course will teach the basics of Android Development using the Java Programming Language and Android Studio. Introduction and Setup Android Studio Development Essentials Introduction Setting up an Android Studio Development Environment Creating an Example Android App in Android Studio A Tour of the Android Studio User Interface Creating an Android Virtual Device (AVD) in Android Studio Using and Configuring the Android Studio AVD Emulator Testing Android Studio Apps on a Physical Android Device The Basics of the Android Studio Code Editor Android Architecture and State Changes An Overview of the Android Architecture The Anatomy of an Android Application Understanding Android Application and Activity Lifecycles Handling Android Activity State Changes Android Activity State Changes by Example Saving and Restoring the State of an Android Activity Views and Layouts Understanding Android Views, View Groups and Layouts in Android Studio A Guide to the Android Studio Layout Editor Tool A Guide to the Android ConstraintLayout A Guide to using ConstraintLayout in Android Studio An Android Studio Layout Editor ConstraintLayout Tutorial Manual XML Layout Design in Android Studio Creating an Android User Interface in Java Code Event Handling An Overview and Example of Android Event Handling A Guide to using Instant Run in Android Studio Android Touch and Multi-touch Event Handling Detecting Common Gestures using Android Studio and the Gesture Detector Class Implementing Custom Gesture and Pinch Recognition on Android Advanced Layout and Transitions An Introduction Android Fragments Using Fragments in Android Studio - An Example Creating and Managing Overflow Menus on Android Animating User Interfaces with the Android Transitions Framework An Android Transition Tutorial using beginDelayedTransition Implementing Android Scene Transitions ? A Tutorial Working with the Floating Action Button and Snackbar Creating a Tabbed Interface using the TabLayout Component Working with the RecyclerView and CardView Widgets An Android RecyclerView and CardView Tutorial Working with the AppBar and Collapsing Toolbar Layouts Implementing an Android Navigation Drawer An Android Studio Master/Detail Flow Tutorial Intents, Threads, Services, and Notifications An Overview of Android Intents Android Explicit Intents ? A Worked Example Android Implicit Intents ? A Worked Example Android Broadcast Intents and Broadcast Receivers A Basic Overview of Threads and Thread Handlers An Overview of Android Started and Bound Services Implementing an Android Started Service - A Worked Example Android Local Bound Services - A Worked Example Android Remote Bound Services - A Worked Example An Android 7 Notifications Tutorial An Android 7 Direct Reply Notification Tutorial Data Access and Storage Integrating Firebase Support into an Android Studio Project An Android 7 Firebase Remote Notification Tutorial An Introduction to Android 7 Multi-Window Support An Android Studio Multi-Window Split-Screen and Freeform Tutorial An Overview of Android SQLite Databases in Android Studio An Android TableLayout and TableRow Tutorial An Android SQLite Database Tutorial Understanding Android Content Providers Implementing an Android Studio Content Provider in Android Studio Accessing Cloud Storage using the Android Storage Access Framework An Android Storage Access Framework Example Multimedia, Maps and Printing Video Playback on Android VideoView and MediaController Classes Video Recording and Image Capture using Camera Intents Making Runtime Permission Requests in Android Android Audio Recording and Playback using MediaPlayer and MediaRecorder Working with the Google Maps Android API in Android Studio Printing with the Android Printing Framework An Android HTML and Web Content Printing Example A Guide to Android Custom Document Printing Final Build An Android Fingerprint Authentication Tutorial Handling Different Android Devices and Displays Signing and Preparing an Android Application for Release Integrating Google Play In-app Billing into an Android Application An Overview of Gradle in Android Studio An Android Studio Gradle Build Variants Example Additional course details: Nexus Humans Android Studio Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Studio Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for New users of IBM SPSS Statistics Users who want to refresh their knowledge about IBM SPSS Statistics Anyone who is considering purchasing IBM SPSS Statistics Overview Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders Additional course details: Nexus Humans 0G53BG IBM SPSS Statistics Essentials (V26) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G53BG IBM SPSS Statistics Essentials (V26) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Whether you want to close a business deal or sell a house effective negotiation skills can help you seal the deal. This craft can take you a long way in both your personal and professional life. Learn this useful skill set from the comfort of your home with the Negotiation Skills Certificate course. This course will take your skills to the next level in no time. This course will provide quality training on negotiation. Through the informative and engaging modules, you will get a clear understanding of collaborative negotiation. Then it will provide elaborate lessons on the seven steps of successful negotiation. Next, you will learn how to apply these steps in your home. The course will also teach you tips and tricks to negotiate with different personalities. In addition to this valuable skill set you will also receive a certificate of achievement which will add significant value to your resume. Join now! Learning Outcomes Get introduced to the essentials of collaborative negotiation Learn about the 7 steps of successful negotiation in detail Know how to use these 7 steps in your home Develop the skills to negotiate with different personality types Identify the practices you should avoid while negotiating Who is this Course for? Anyone who wants to improve their negotiation skills can join the course. The Negotiation Skills Certificate course will equip the learners with excellent negotiation techniques and help them close lucrative deals. Entry Requirements Individuals from any background can take the course A good understanding of the English language, numeracy and ICT Any smart device such as a laptop, pc, or smartphone with an internet connection CPD Certificate from Course Gate After completing the final assignment, you will receive a CPD-accredited certificate. The PDF copy of the certificate will cost you £9. You can order the hard copy for £15, or you can get both the hard copy and PDF certificate for £22. Career Path This course will provide the learners with an in-depth understanding of the subject. After completing the course, the learners will develop the skills and knowledge to explore career opportunities in the following fields Sales Executives Customer Service Executives Project Managers Estate Agent Contract Specialist Course Curriculum Introduction and The Principles of Collaborative Negotiation Welcome and Course Overview 00:06:00 Why Good Negotiation Practice Leads to Better Relationships 01:03:00 Shameless Book Plug 00:01:00 Millie's Cookie Story 00:07:00 Exercise 1: Intentions / Objectives for This Programme 00:01:00 Giving Structure to Your Negotiation Strategy Negotiation is not 00:02:00 Distinguishing Negotiation from -Haggling 00:07:00 The 7 Steps to Negotiation Success 00:06:00 Exercise 2: Giving Structure to your Negotiations 00:01:00 Step One - Preparing Yourself for Collaborative Negotiation Preparing Yourself and Your WIN Outcomes 00:06:00 Exercise 3: Securing Commitment to Negotiate 00:01:00 The 4 P's 00:01:00 The Importance of Personality 00:02:00 We, Then Me 00:02:00 Exercise 4: The 4 P's 00:01:00 Step Two - Preparation - Understanding the Power of Variables Introduction to Variables 00:04:00 Video Examples of Excellent Creativity in Variables 00:03:00 Exercise 5: Understanding the Power of Variables 00:01:00 Using the WIN Matrix 00:03:00 Exercise 6: Write Your Win Matrix 00:02:00 Step Three - Understanding Your Partner's Point of View Introduction 00:01:00 Example Story- Maps of the World - Dyl's Den 00:03:00 Exercise 7: Stepping Into Your Partner's Shoes 00:01:00 Step Four - Discussing Introduction- Stating Intentions 00:04:00 Co-Active Listening- Are You Really Listening 00:02:00 The Power of Pause 00:01:00 Exercise 8: Using Open Questions 00:01:00 Exercise 9: Going Above and Beyond Their Wildest Dreams 00:01:00 Exercise 10: Socratic Questioning 00:04:00 Exercise 11: Creating a Discussion Agreement Statement= 00:01:00 Step Five - Proposing Introduction to the Propose Stage 00:05:00 Exercise 12: Putting Your Proposal into Writing 00:01:00 Step Six - Bargaining Introduction 00:02:00 Exercise 13: Creating a Bargaining Agreement Statement 00:02:00 The Power of Silence 00:04:00 Exercise 14: Developing Your Time-Out Strategy 00:01:00 Step Seven - Agreeing Introduction to Bargaining 00:04:00 The Written Columbo 00:02:00 Exercise 15: Drafting an 'Agreement In Principle' 00:01:00 Getting Yourself Out of the Way - The Human Operating System Introduction - The Missing Link 00:04:00 Exercise 16: Noticing Your Thinking 00:02:00 What Does this Mean in Your Negotiations? 00:03:00 Understanding Personality Why Personality? 00:05:00 Introducing the 4 Colours 00:04:00 Introducing the 8 Aspects 00:04:00 Inspiration v Discipline Driven 00:04:00 Exercise 17: Teddy Bear 00:01:00 Big Picture vs Down to Earth 00:03:00 Exercise 18: Football Club Trip 00:01:00 People Focused vs Outcome Focused 00:02:00 Splash App 00:02:00 Exercise 19: Completing Your Own Assessment 00:01:00 Negotiation with Different 'Personality Types' 00:04:00 Using the Seven Steps at Home Introduction 00:04:00 Avoiding Common Gambits Some Negotiators Use Nibbling - The Columbo 00:02:00 The Flinch 00:02:00 The Red Herring 00:01:00 Higher Authority 00:02:00 The Reluctant Buyer - Seller 00:01:00 The Best of a Bad Choice 00:01:00 Conclusion - Can You Really Get More by Giving More? Conclusion & Thank You 00:02:00 Bonus Lecture 00:01:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Fashion Design Course Online Introducing: Dress Making and Fashion Design Online Course Unlock Your Creative Potential and Master the Art of Dressmaking! Are you passionate about fashion design? Do you dream of creating your own unique fashion design patterns and breathtaking fashion design garments? If so, our Fashion Design Course is the perfect way for you to transform your fashion design hobby into a profitable and rewarding fashion design profession! With our Fashion Design Course, you have the freedom to learn whenever and wherever you want. You can study this extensive Fashion Design: Fashion Design Course at your own pace and revisit lessons whenever you need to. Throughout the Fashion Design Course, you will immerse yourself in various fashion design projects, creating your own unique fashion design pieces and garments. By the end of this comprehensive Fashion Design Course, you will have a diverse fashion design portfolio that showcases your creativity and technical abilities in fashion design, setting you apart in the competitive fashion design industry. Whether you aspire to start your own fashion design label, work in a prestigious fashion design house, or become a sought-after freelance fashion designer, our Fashion Design Course will equip you with the essential skills and knowledge to turn your fashion design dreams into reality. Don't let your passion for fashion design go to waste. Enroll in our Fashion Design Course today and take the first step towards a glamorous and rewarding career in the dynamic world of fashion design! Main Course: Dress Making and Fashion Design Free Courses included with Fashion Design: Fashion Design Course: Course 01: Hopi Ear Candling Course 02: Salon Management Course 03: Massage Therapy [ Note: Free PDF certificate as soon as completing Fashion Design Course] Fashion Design Course Online Unlock your potential with our Fashion Design course! Master Fashion Design techniques and trends with expert guidance. Transform your creativity into stunning designs through our Fashion Design curriculum. Enroll today in our Fashion Design program and start your journey towards becoming a leading Fashion Design professional. Fashion Design awaits you! This Fashion Design Course consists of 10 modules. Who is this course for? Fashion Design Course Online This Fashion Design: Fashion Design Course is open to everyone. Requirements Fashion Design Course Online To enrol in this Fashion Design Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Fashion Design: Fashion Design Course. Be energetic and self-motivated to complete our Fashion Design: Fashion Design Course. Basic computer Skill is required to complete our Fashion Design: Fashion Design Course. If you want to enrol in our Fashion Design: Fashion Design Course, you must be at least 15 years old. Career path Fashion Design Course Online
Floristry: Floristry Online Course Do you want to engage in a fascinating floral journey? You may improve your skills in the nuances of this intriguing area of floristry by taking our full Floristry: Floristry course. You will get crucial knowledge about floral concepts and techniques through this floral design curriculum. Giving students a firm understanding of floral methods is the main objective of this floral design course. Once this Floristry: Floristry course is over, you will have the ability to use them in a range of scenarios. The Floristry: Floristry course includes lessons in marketing, customer service, floral design, and flower arrangements. During this floral design course, you will learn how to create wreaths, bouquets, and funeral flowers. Participate in our Floristry: Floristry course to explore the endless career opportunities and learn about the intriguing field of floral design! Main Course: Floristry Course Free Courses included with Floristry: Floristry Course: Along with the Floristry Course, you will get free Garden Design and landscaping Along with the Floristry Course, you will get free Level 2 Certificate in Understanding Climate Change and Environmental Awareness Special Offers of this Floristry: Floristry Course: This Floristry: Floristry Course includes a FREE PDF Certificate. Lifetime access to this Floristry: Floristry Course Instant access to this Floristry: Floristry Course 24/7 Support Available to this Floristry: Floristry Course [ Note: Free PDF certificate as soon as completing the Floristry: Floristry Course] Floristry: Floristry Online Course This Floristry: Floristry programme will provide you with essential insights into Floristry ideas and practises. The major goal of this Floristry: Floristry course is to provide learners with a solid grasp of Floristry techniques. You will be able to apply them in a variety of situations after completing this Floristry: Floristry course. Marketing, customer service, floral design, and flower arrangements are lesson parts of the Floristry: Floristry course. You will learn how to produce funeral flowers, wreaths, and bouquets in this Floristry: Floristry course. Who is this course for? Floristry: Floristry Online Course A wide range of persons who wish to advance their knowledge and skills in floristry are the target audience for the floristry course. Requirements Mastering Psychology Diploma Course Online To enrol in this Floristry: Floristry Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Floristry: Floristry Course. Be energetic and self-motivated to complete our Floristry: Floristry Course. Basic computer Skill is required to complete our Floristry: Floristry Course. If you want to enrol in our Floristry: Floristry Course, you must be at least 15 years old. Career path Floristry: Floristry Course Online The course on floristry is designed for a broad range of individuals who wish to advance their skills and understanding in the field.