• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3394 Design courses delivered Live Online

GRC300 SAP Access Control Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GRC300 SAP Access Control Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

EA/PA Excellence Workshop Virtual

5.0(1)

By Own Your Success

Discover how to elevate your career as an executive assistant or personal assistant with our comprehensive EA Mastery Workshop. Gain new skills, strategies, and tools to maximize your impact and achieve success.

EA/PA Excellence Workshop Virtual
Delivered OnlineFlexible Dates
£130 to £345

Cisco Deploying Cisco SD-Access (ENSDA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers Network Engineers Technical Architects Technical Support Personnel Channel Partners Resellers Overview Upon completing the course, the learner will be able to meet these overall objectives: Describe Cisco SD-Access and how it relates to Cisco DNA Orchestrate a Cisco SD-Access solution using the Cisco DNA Center™ orchestration platform Use the Network Data Platform to demonstrate the assurance and analytics capabilities of SD-Access The Deploying Cisco SD-Access (ENSDA) v1.0 course is an instructor-led, lab based, hands-on course that teaches students how to successfully deploy the Cisco© Software-Defined Access (SD-Access) solution within their enterprise networks. The course discusses how Cisco SD-Access fits into the Cisco Digital Network Architecture (Cisco DNA?). It covers SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. Module 1: Cisco SD-Access Overview Lesson 1: Exploring Cisco SD-Access Lesson 2: Describing the Cisco SD-Access Architecture Lesson 3: Exploring Cisco DNA Center Lesson 4: Configuring Underlay Automation Module 2: Cisco SD-Access Implementation Lesson 1: ISE Integration in DNA Center Lesson 2: Policy Provisioning Basics Lesson 3: Navigating and Managing the Policy Application Workflows Module 3: Cisco SD-Access Border Operations Lesson 1: Cisco SD-Access Deployment Models Lesson 2: Connecting the Fabric to External Domains Module 4: Wireless Integration Orchestration Lesson 1: Integrating Wireless with the Cisco SD-Access Solution Lesson 2: Workflow of Cisco SD-Access Wireless Lesson 3: Cisco SD-Access Wireless Network Design Lesson 4: Cisco SD-Access Wireless Basic Operation Module 5: Cisco SD-Access Assurance and Migration Lesson 1: Cisco Network Data Platform Lesson 2: Cisco SD-Access Migration Strategies

Cisco Deploying Cisco SD-Access (ENSDA)
Delivered OnlineFlexible Dates
Price on Enquiry

DAX In A Day (DAXIAD)

By Online Productivity Training

OVERVIEW Prerequisites—DIAD training and Advanced Data Modeling and Shaping training or equivalent working experience This course has been designed specifically for experienced model developers and gives a more advanced treatment of DAX formulas than either DIAD or the PL-300 course. We recommend that attendees have prior experience working with Power BI Desktop to create data models. During this course you will review: Writing DAX formulas. Defining calculated tables and columns. Defining measures. Using DAX iterator functions. Modifying filter context. Using DAX time intelligence functions. After completing this training, the attendees should be able to work with Data Analysis Expressions (DAX), perform calculations and define common business calculations for use in reports, address performance and functionality concerns. COURSE BENEFITS: Understand Analytic queries in Power BI Create calculated tables, calculated columns and measures Use DAX functions and operators to build DAX formulas Use DAX iterator functions Create formulas that manipulate the filter context Use DAX time intelligence functions WHO IS THE COURSE FOR? Analysts with experience of Power BI wishing to develop more advanced formulas in DAX Power BI developers who wish to deepen their understanding of the process of calculating formulas so as to make development faster and more reliable LAB OUTLINE Lab 1 Setup Connect to data and understand the objectives of the future labs Lab 2 Write DAX Formulas For Power BI Create a measure Use variables in the measure definition Lab 3 Add Calculated Table And Columns Duplicate a table Create a hierarchy Create a date table Add calculated columns Lab 4 Add Measures To Power BI Desktop Models Add an implicit measure to a report Add an explicit measure Add a compound measure Add a quick measure Lab 5 Use DAX Iterator Functions In A Power BI Desktop Model Complex summarization Higher grain summarization Create ranking measure Lab 6 Modify DAX Filter Context In Power BI Desktop Models Apply Boolean expression filter Remove filters: use ALL Remove filters: use AllSelected Preserve filters: use KeepFilters HASONEVALUE ISINSCOPE Context transition Lab 7 Use DAX Time Intelligence Functions In Power BI Desktop Models TOTALYTD SAMEPERIODLASTYEAR Calculate new occurrences Snapshot calculations

DAX In A Day (DAXIAD)
Delivered OnlineFlexible Dates
£400

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 1 2023/24

By Coach Academic

This coaching programme is for aspiring women leaders in higher education, delivered in real time, fully online. Five workshops have been designed to support you in a group environment to work actively towards realising your professional goals, whatever they may look like, focused on leadership at all levels in higher education. HE needs leaders like you - workshops with Coach Academic will help to propel you to becoming one. For all academics who are female/identify as female. During this coaching experience you will explore and learn from: - your values and beliefs, and how they impact on your professional identity and actions - your beliefs about higher education, leadership, and yourself - your strengths and how to harness them for impact - your areas for development, and embracing the actions you choose to address these - your internal and external blockers, and how to manage these - your motivation - why do you want to lead in HE? From these you will be able to build your confidence and your leadership identity, and take concrete steps towards becoming the leader you aspire to be.

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 1 2023/24
Delivered OnlineFlexible Dates
£300

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 2 2023/24

By Coach Academic

This coaching programme is for aspiring women leaders in higher education, delivered in real time, fully online. Five workshops have been designed to support you in a group environment to work actively towards realising your professional goals, whatever they may look like, focused on leadership at all levels in higher education. HE needs leaders like you - workshops with Coach Academic will help to propel you to becoming one. For all academics who are female/identify as female. During this coaching experience you will explore and learn from: - your values and beliefs, and how they impact on your professional identity and actions - your beliefs about higher education, leadership, and yourself - your strengths and how to harness them for impact - your areas for development, and embracing the actions you choose to address these - your internal and external blockers, and how to manage these - your motivation - why do you want to lead in HE? From these you will be able to build your confidence and your leadership identity, and take concrete steps towards becoming the leader you aspire to be.

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 2 2023/24
Delivered OnlineFlexible Dates
£300

SAP Business Planning and Consolidation 11.0 version for SAP BW/4HANA: Consolidation

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Project Team Members IT Support Team Members Advanced Business Analysts System Administrators Application Consultants Business Process Owners / Team Leads / Power Users Program / Project Managers Trainers Overview Learn how to design, configure, consolidate, and report with BPC Standard In this course, students learn all of the key steps to set up Consolidation based on the SAP Business Planning and Consolidation, version for SAP NetWeaver. SAP Business Planning and Consolidation Overview Describing SAP Business Planning and Consolidation Running Consolidation Tasks Implementing BPC Standard Consolidation Modeling Consolidation Structures and Reporting Configuring Environments and Dimensions Creating Models for Consolidation Creating Reports and Formats in the EPM Add-In Report on BPC Standard Data in Analysis for Office Data Collection and Preparation Collecting Transforming Data for Consolidation Scenarios Creating Consolidation Logic Configuring Reclassifications Configuring Balance Carryforward Managing Journals Consolidations and Eliminations Translating Local Currency Configuring Intercompany Matching and Booking Using the Ownership Manager Configuring Integration Rules Eliminating Intercompany Transactions Configuring Intercompany US Elimination Designing Management, Matrix, and Multiple Accounting Standard Solutions Describing Consolidation and Elimination Principles Consolidating Investments Describing Stage Consolidation Configuring Scope Variation Configuring Equity Pickup Consolidation Process Monitoring Configuring Work Status Using the Controls Monitor to Validate Data Configuring Consolidation Business Process Flows

SAP Business Planning and Consolidation 11.0 version for SAP BW/4HANA: Consolidation
Delivered OnlineFlexible Dates
Price on Enquiry

Mental Health First Aid Champion

5.0(1)

By Strongmind Resiliency Training Ltd

Become a Mental Health First Aid Champion Mental Health First Aid (MHFA) is an internationally recognised training course, which teaches people how to spot the signs and symptoms of mental ill health and to provide help on a first aid basis. This course is designed for people who want to promote and positively affect attitudes on mental health in the workplace.

Mental Health First Aid Champion
Delivered OnlineFlexible Dates
£180

FortiGate Infrastructure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate appliances. Overview Analyze a FortiGate's route table. Route packets using policy-based and static routes for multi-path and load balanced deployments. Configure SD-WAN to load balance traffic between multiple WAN links effectively. Inspect traffic transparently, forwarding as a Layer 2 device. Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs). Establish an IPsec VPN tunnel between two FortiGate appliances. Compare policy-based to route-based IPsec VPN. Implement a meshed or partially redundant VPN. Diagnose failed IKE exchanges. Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory. Deploy FortiGate devices as an HA cluster for fault tolerance and high performance. Deploy implicit and explicit proxy with firewall policies, authentication, and caching. Diagnose and correct common problems. In this two-day course, you will learn how to use advanced FortiGate networking and security. Course Outline Module 1. Routing Module 2. Software-Defined WAN (SD-WAN) Module 3. Layer 2 Switching Module 4. Virtual Domains Module 5. Site-to-Site IPsec VPN Module 6. Fortinet Single Sign-On (FSSO) Module 7. High Availability (HA) Module 8. Web Proxy Module 9. Diagnostics

FortiGate Infrastructure
Delivered OnlineFlexible Dates
Price on Enquiry

C)DRE-Certified Disaster Recovery Engineer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates

C)DRE-Certified Disaster Recovery Engineer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry