Duration 1 Days 6 CPD hours This course is intended for Certification Preparation for Administrator is designed for experienced Salesforce administrators who are planning to take the Salesforce Administrator Certification. Overview Understand the different exam objectives and their weighting on the exam Know which product areas to focus on to best prepare for your exam How to approach exam questions Additional resources available to help prepare for the exam Are you ready to take the next step in your career by becoming a Salesforce Certified Administrator? By covering the details around the exam objectives, this course will help hone your problem-solving skills and reinforce your knowledge of key topics. Instructors will present different administration and configuration scenarios tied to the exam objectives. Questions related to these scenarios will help prepare you to help prepare you for your exam. Introduction and OverviewSecurity and Record AccessStandard and Custom Objects Automation and ValidationData Management Reports and DashboardsPractice Test and DiscussionConclusion and Next Steps Additional course details: Nexus Humans Salesforce Certification Preparation for Administrator (CRT101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Certification Preparation for Administrator (CRT101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This basic course is for users and developers familiar with earlier versions of IBM InfoSphere Information Server or IBM InfoSphere MDM who want to learn about new features in V11.3 Overview The objectives of this course are as follows:- Learn about the new features of DataStage V11.3- Learn about the new features of Information Analyzer V11.3- Learn about the new features of Data Click V11.3- Learn about the new features of the Information Governance Catalog V11.3 This course is designed to introduce you to new features in data integration and governance in IBM InfoSphere Information Server V11.3 and IBM InfoSphere MDM V11.3. Outline Unit DS: New Features in IBM InfoSphere DataStage V11.3 Unit DC: New Features in IBM InfoSphere Data Click V11.3 Unit IA: New Features in IBM InfoSphere Information Analyzer V11.3 **All units are accompanied by hands-on lab exercises. Additional course details: Nexus Humans KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network Designers Network Administrators Network Engineers Systems Engineers Data Center Engineers Consulting Systems Engineers Technical Solutions Architects Cisco Integrators/Partners Field Engineers Server Administrators Network Managers Storage Administrators Cisco Integrators and Partners Overview After completing the course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features The Implementing Cisco Application Centric Infrastructure (DCACI) v1.2 course shows you how to deploy and manage the Cisco© Nexus© 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI©) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and the fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course earns you 40 Continuing Education (CE) credits towards recertification.This course helps prepare you for the following exam:300-620 Implementing Cisco Application Centric Infrastructure (DCACI) Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration Knob Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Explaining Cisco ACI Management Out-of-Band Management In-Band Management
Duration 1 Days 6 CPD hours This course is intended for This course is designed for people who need to use Microsoft Teams to communicate, share files, and conduct online meetings with colleagues. No experience with Teams is required; however, a basic understanding of Office apps will be useful. Overview In this course, you will use Microsoft Teams to communicate and collaborate with your colleagues. You will: Send messages to colleagues using Teams. Call and meet with people in Teams. Lead a meeting. Configure your Teams environment. Share files and app content. Create and configure Teams. This course is designed to help you master Microsoft© Teams©, the key communications tool in the suite of Microsoft© 365© productivity apps. Microsoft Teams enables individuals and organizations to chat, share ideas, collaborate on files, and essentially, work together. You can use Teams to have a quick chat with a colleague, participate in a virtual meeting, make an online call, and share files and resources. The Microsoft Teams app is available in three versions: a desktop app, a web app, and a mobile app. Once you are familiar with the Teams desktop app, you can easily transfer that knowledge and work in the web and mobile apps to take advantage of connecting through Teams wherever your work takes you. Messaging Colleagues Using Teams Topic A: Navigate in Teams Topic B: Chat with Contacts Topic C: Post in Team Channels Calling and Meeting in Teams Topic A: Call People in Teams Topic B: Meet in Teams Leading Meetings in Teams Topic A: Conduct Presentations Topic B: Manage Meetings Configuring Your Teams Environment Topic A: Configure General Application Settings Topic B: Configure Notifications and Privacy Settings Topic C: Configure Call and Device Settings Sharing Files and App Content in Teams Topic A: Share Files Topic B: Add Apps and Connectors Creating and Configuring Teams Topic A: Create and Manage a Team Topic B: Create and Configure Channels Topic C: Add and Configure Channel Tabs
Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .
Duration 3 Days 18 CPD hours This course is intended for Anyone who wants to qualify as a professional tester. The certification also offers good qualifications for builders, designers, programmers and project managers Overview This three-day training provides a general introduction to information systems testing. The objective of the training is to prepare the students for the ISTQB Foundation exam. Some important topics that will certainly be discussed here are the importance of testing, testing in relation to system development and the fundamentals of a structured testing process. The different phases in a test project are explained, after which some test techniques (both black box and white box) are also discussed. This foundation training therefore contains the basis in testing for both test managers and testers. In addition to theory, the training also includes a number of mock exams, so that the topics covered are placed even better in the exam context. Course Outline test principles life cycle testing static techniques test specification techniques blackbox techniques whitebox techniques and experienced based techniques Additional course details: Nexus Humans Certified Tester Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Tester Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for operators and schedulers who perform duties that are related to batch workload automation. Overview In this course, you learn how to perform the following tasks:Explain the production terminology used with IBM Workload Scheduler and its production planning processMonitor production batch workload processesManage production batch workloadCreate and modify scheduling objectsSchedule new workloadsForecast future workloadsMigrate workload definitions from test to production environmentsCreate and maintain reports about production workloads This course provides professional report authors an opportunity to learn report building techniques using relational data models. Demonstrations and exercises will illustrate and reinforce key concepts during this learning opportunity. IBM Workload Scheduler Introduction About Workload Automation IBM workload automation offerings IBM Workload Scheduler terminology Workload Scheduler user interfaces Getting started with Application Lab Getting started with the Dynamic Workload Console Connecting the console to Workload Scheduler Getting started with the command-line interfaces Using the Application Lab Interface Using the processes status overview page Managing processes Using other Application Lab functions Monitoring Workload Scheduler Production Monitoring Workload Scheduler production by using queries Using the Workload Dashboard Monitoring system status and health Monitoring plan objects Using the What-if Analysis interface Monitoring the plan graphically Managing Workload Scheduler Production Managing the scheduling environment Managing scheduling objects in the plan Creating Scheduling Objects Using the Workload Designer Creating scheduling objects Creating variables and variable tables Creating prompts and resources Creating calendars Defining jobs Scheduling, Forecasting, and Migrating Workloads Creating job streams Applying jobs to job streams Setting time and date restrictions Using advanced scheduling options Creating job stream definitions by using composer Creating and using event rules Forecasting and previewing future dates Exporting and importing scheduling definitions Using Workload Application Templates Reporting with Workload Scheduler Using reporting features Using Common Reporting with Workload Scheduler Using the batch reporting utility Using the preformatted text-based report utilities
Duration 1 Days 6 CPD hours This course is intended for This is an entry level course, no experience necessary Overview In this course the student will learn IAITAM Best Practice Library's 12 Key Process Areas (KPAs) The roles and responsibilities that affect an ITAM program ITAM core functional areas KPA indicators ITAM strategic positioning How ITAM can be brought into other frameworks The Certified Asset Management Professional (CAMP) Course is designed to impart an extensive overview of IT Asset Management (ITAM) best practices and processes as well as ways to embrace multiple organizational frameworks such as ITAM & IT Service Management (ITSM). This course includes the comprehensive online examination necessary for achieving CAMP Certification. Course Outline The 12 IAITAM KPAs for ITAM ITAM Business Practices Find Savings Core Functional Areas Software Asset Management Hardware Asset Management ITAM Program Core Functional Components ITAM Roles and Responsibilities Program Management Acquisition Management Asset Identification Management Communication & Education Management Compliance Management Disposal Management Documentation Management Financial Management Legislation Management Policy Management Project Management Vendor Management Additional course details: Nexus Humans Certified Asset Management Professional (CAMP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Asset Management Professional (CAMP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability. This course is also designed for you to prepare for the CyberSAFE credential. You can obtain your CyberSAFE certificate by completing the CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify security compliance measures. Address social engineering attempts. Secure devices such as desktops, laptops, tablets, smartphones, and more. Use the Internet securely. Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:Understand both security and compliance needs and requirements.Recognize and avoid phishing and other social engineering attempts.Recognize and avoid viruses, ransomware, and other malware.Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Identifying Security Compliance Measures Topic A: Identify Organizational Compliance Requirements and Resources Topic B: Identify Legal Compliance Requirements and Resources Topic C: Identify Industry Compliance Requirements and Resources Recognizing and Addressing Social Engineering Attacks Topic A: Recognize Phishing and Other Social Engineering Attacks Topic B: Defend Against Phishing and Other Social Engineering Attacks Securing Devices Topic A: Maintain Physical Security of Devices Topic B: Use Secure Authentication Methods Topic C: Protect Your Data Topic D: Defend Against Malware Topic E: Use Wireless Devices Securely Using the Internet Securely Topic A: Browse the Web Safely Topic B: Use Email Securely Topic C: Use Social Networks Securely Topic D: Use Cloud Services Securely Topic E: Work from Remote Locations Securely