Duration 1 Days 6 CPD hours This course is intended for This course is intended for business professionals in a variety of roles who want to learn about Agile methodologies as a prelude to Agile adoption or migration, and for those who work on projects that require more flexibility and adaptability than traditional project management approaches. Overview In this course, participants will identify the Agile project management principles and use the Scrum methodology of Agile to manage projects. You will: Identify basic concepts, core values, principles, and methodologies of Agile. Address the myths, challenges, and benefits of Agile. Define the Scrum methodology of Agile. Execute sprint ceremonies using Scrum tools and techniques. Agile project management is growing in popularity as a method for delivering value quickly. This course presents the tenets of Agile methodologies using the Scrum framework as a primary example to demonstrate the Agile approaches, their benefits, and challenges. Getting Started with Agile Overview of Agile Core Values of Agile Principles of Agile Common Methodologies of Agile Addressing the Myths, Challenges, and Benefits of Agile Overcome the Myths and Misunderstandings of Agile Overcome the Challenges of Agile The Benefits of Agile Introducing the Scrum Methodology Identify Roles and Responsibilities in Scrum Define the Sprint Ceremonies Executing Sprint Ceremonies Estimate a Scrum Project Conduct a Sprint Planning Meeting Conduct a Sprint Conduct a Sprint Review Meeting Conduct a Sprint Retrospective Meeting Additional course details: Nexus Humans Introduction to Agile and Scrum Methodologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Agile and Scrum Methodologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Reporting Fundamentals in Lightning Experience is ideal for Sales Rep/Managers, Service Rep/Managers, Beginning Admin, and Business Analyst/Solution Architects. Overview When you complete this course, you will be able to:Work with standard reports.Establish a report building process.Build custom reports using different reporting formats in Lightning.Group and summarize reports in Lightning.Use field filters and filter logic.Add charts and conditional highlighting.Create dashboards in Lightning This course will teach you how to customize existing reports as well as use the Salesforce reporting toolset to create your own reports. Introducing the CourseReports Tab, Folders, and Formats Navigate the Reports Tab to Find Suitable Reports Create Custom Folders in Classic to be Used in Lightning Describe the Different Formats of Reports Run and Modify Existing Reports Using the Report Builder Establish a Report Building Process Navigate the Report Builder Create Custom Reports Using a Standard Report Type Use Filters and Filter Logic Export Your Report Summarizing Your Data Understand the Difference Between a Summary and Matrix Report Use Bucket Fields to Segment Your Data Use Custom Summary Formulas to Perform Calculations on Your Report Data Getting More Insight from Your Data Add Conditional Highlighting to a Report Create Charts to Display Summary Data Schedule and Email a Report to Run Dashboards Articulate What a Dashboard Is Understand the Benefits of Creating Dashboards in Lightning Create a Dashboard Using the Dashboard Builder Additional course details: Nexus Humans Salesforce Reporting Fundamentals in Lightning Experience (RPX101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Reporting Fundamentals in Lightning Experience (RPX101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Individuals taking this course are business professionals seeking to develop or increase their emotional intelligence. Overview In this course, you will explore the concept of emotional intelligence. You will: Identify the components of emotional intelligence and recognize how emotional intelligence benefits organizations. Assess and develop your personal emotional intelligence competencies. Assess and develop your social emotional intelligence competencies. Practice emotional intelligence in common workplace scenarios. It was once believed that intelligence was the metric that would determine a person's success in the workplace. Intelligence matters because it contributes to your ability to do your job. But intelligence is not the best indicator of whether or not you'll succeed. Your ability to understand and manage your own emotions, and get along well with others, has at least as much impact on your performance and effectiveness as intelligence. In this course, you'll explore strategies to increase your awareness of your emotions, develop your ability to manage your emotions, and improve your social skills. Recognizing the Benefits of Emotional Intelligence Define Emotional Intelligence Recognize EQ's Impact on Work Experience Increasing Your Personal Emotional Intelligence in the Workplace Develop Your Level of Self-Awareness Develop Your Self-Regulation Skills Develop Your Motivation Increasing Your Social Emotional Intelligence in the Workplace Develop Your Empathy Develop Your Social Skills Practicing Emotional Intelligence in the Workplace Practice Emotionally Intelligent Leadership Build an Emotionally Intelligent Team Manage Change Manage Conflict Coach for Performance Additional course details: Nexus Humans Emotional Intelligence for Business Professionals (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Emotional Intelligence for Business Professionals (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Agile professionals, Project Managers and aspiring Project Managers who want to be able to combine PRINCE2 and Agile in the most effective way when using PRINCE2, Agile behaviours, concepts, frameworks, and techniques Other key delivery team staff, including Product Owners, Scrum Masters, and Developers Business professionals with an interest in iterative and incremental project delivery by collaborating working Overview At the end of this course, you will be able to: Understand the key concepts relating to PRINCE2. Understand the key concepts relating to projects and PRINCE2 Agile. Understand how PRINCE2 principles, themes, processes and management products are tailored and applied in an Agile context. Understand the agile ways of working, key terms and techniques. Understand the focus areas in an Agile context. PRINCE2 Agile is the world?s most complete project management solution, combining the flexibility and responsiveness of Agile with the clearly defined framework of PRINCE2©. As a PRINCE2© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. Course Outline Course Introduction and Agile Overview PRINCE2 Summary Culture Blending PRINCE2 and Agile Combining PRINCE2 and Agileÿ Combining PRINCE2 and Agile (Contd.) Homework Day 1ÿ PRINCE2 Agile Themes PRINCE2 Agile Processes Agile frameworks, Concepts, and Techniques Agile Focus Areas Mock Exam PRINCE2© is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 and PRINCE2 Nexus Humans PRINCE2 Agile Foundation with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PRINCE2 Agile Foundation with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who want to learn the Python programming language in preparation for using Python to develop software for a wide range of applications, such as data science, machine learning, artificial intelligence, and web development. Overview In this course, you will develop simple command-line programs in Python. You will: Set up Python and develop a simple application. Declare and perform operations on simple data types, including strings, numbers, and dates. Declare and perform operations on data structures, including lists, ranges, tuples, dictionaries, and sets. Write conditional statements and loops. Define and use functions, classes, and modules. Manage files and directories through code. Deal with exceptions. Though Python has been in use for nearly thirty years, it has become one of the most popular languages for software development, particularly within the fields of data science, machine learning, artificial intelligence, and web development?all areas in which Python is widely used. Whether you're relatively new to programming, or have experience in other programming languages, this course will provide you with a comprehensive first exposure to the Python programming language that can provide you with a quick start in Python, or as the foundation for further learning. You will learn elements of the Python 3 language and development strategies by creating a complete program that performs a wide range of operations on a variety of data types, structures, and objects, implements program logic through conditional statements and loops, structures code for reusability through functions, classes, and modules, reads and writes files, and handles error conditions. Lesson 1: Setting Up Python and Developing a Simple Application Topic A: Set Up the Development Environment Topic B: Write Python Statements Topic C: Create a Python Application Topic D: Prevent Errors Lesson 2: Processing Simple Data Types Topic A: Process Strings and Integers Topic B: Process Decimals, Floats, and Mixed Number Types Lesson 3: Processing Data Structures Topic A: Process Ordered Data Structures Topic B: Process Unordered Data Structures Lesson 4: Writing Conditional Statements and Loops in Python Topic A: Write a Conditional Statement Topic B: Write a Loop Lesson 5: Structuring Code for Reuse Topic A: Define and Call a Function Topic B: Define and Instantiate a Class Topic C: Import and Use a Module Lesson 6: Writing Code to Process Files and Directories Topic A: Write to a Text File Topic B: Read from a Text File Topic C: Get the Contents of a Directory Topic D: Manage Files and Directories Lesson 7: Dealing with Exceptions Topic A: Handle Exceptions Topic B: Raise Exceptions
Duration 2 Days 12 CPD hours This course is intended for This intermediate course is for Business and Technical Specialist working with the Matching, Linking, and Search services of InfoSphere MDM Virtual module. Overview Understand how Matching and Linking work for both the Virtual Implementations of InfoSphere MDM Understand the MDM configuration project and database tables used by the PME Understand the PME Algorithms (Standardization, Bucketing and Comparison steps) and how to create and customize the algorithms using the workbench Understand how to analyze the Bucketing steps in an algorithm Understand how to generate weights for a given algorithm and how those weights are generated based on a sample database set Understand how to analyze the weights that are generated using the workbench Understand how to deploy the PME configuration for the Virtual implementations of InfoSphere MDM The InfoSphere MDM Virtual Module Algorithms V.11 course prepares students to work with and customize the algorithm configurations deployed to the InfoSphere MDM Probabilistic Matching Engine (PME) for Virtual MDM implementations. PME and Virtual Overview Virtual MDM Overview Terminology (Source, Entity, Member, Attributes) PME and Virtual MDM ( Algorithms, Weights, Comparison Scores, Thresholds) Virtual MDM Linkages and Tasks Virtual MDM Algorithms Standardization Bucketing Comparison Functions Virtual PME Data Model Algorithm configuration tables Member Derived Data Bucketing Data Bucket Analysis Analysis Overview Attribute Completeness Bucket Analysis Weights Weights Overview (Frequency-based weights, Edit Distance weights and Parameterize weights) The weight formula Running weight generation Analyzing weights Bulk Cross Match process Pair Manager Threshold calculations Additional course details: Nexus Humans ZZ880 IBM Virtual Module Algorithms for InfoSphere MDM V11 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ZZ880 IBM Virtual Module Algorithms for InfoSphere MDM V11 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 2 Days 12 CPD hours This course is intended for Application Consultant Business Process Architect Business Process Owner / Team Lead / Power User Developer Development Consultant Enterprise Architect Solution Architect System Architect Technology Consultant Overview This course will prepare you to: Get an overview about the workflow functions and functionality in SAP S/4HANA, S/4HANA Cloud and SAP Cloud Platform Explain the possible extensions of workflows in these technologies You want to learn about the workflow functionality in S/4HANA, S/4HANA Cloud and SAP Cloud Platform? This course provides a business overview of processes, which are working 'right out-of-the box'. It explains possible extensions and comes with several exercises to deepen the theoretical lessons. Introduction Explain workflow @SAP and in SAP S/4HANA Use SAP Fiori My Inbox App, Setup and Configuration Explain the installation and set up of the My Inbox app Access the My Inbox app Add a BWF system as a task provider Add a SAP BPM system as a task provider Use roles for SAP Fiori Define the gateway scenario and catalogs Use the task gateway service Perform further settings Implement BADIs Create dynamic columns for SWF_USER_ATTR Create push notifications for the SAP Fiori Launchpad Flexible Workflow Explain Flexible Workflow Use a Workflow Scenario Explain SAP S/4HANA Cloud workflow Responsibility Management SAP Cloud Platform Workflow Service Use SAP Cloud Platform Workflow for workflow application development Strategy Recommendations and Migration Options Discuss strategy recommendations for enterprise workflow with SAP Discuss migration options for existing workflows Additional course details: Nexus Humans BIT602 SAP Workflow with SAP Fiori training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT602 SAP Workflow with SAP Fiori course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Messaging Administrator deploys, configures, manages, and troubleshoots recipients, permissions, mail protection, mail flow, and public folders in both on-premises and cloud enterprise environments. Responsibilities include managing message hygiene, messaging infrastructure, and hybrid configuration and migration. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with the Security Administrator and Microsoft 365 Enterprise Administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications. Overview After completing this course, students will be able to: Configure and manage the transport pipeline Manage and troubleshoot mail flow and transport issues Manage message hygiene and compliance Manage authentication for messaging Configure organizational settings and sharing Manage mobile devices Manage role-based permissions Create and manage recipient objects and resources Plan, implement, and troubleshoot public folders Plan a hybrid environment Perform mailbox migrations Deploy and troubleshoot a hybrid environment This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization. Managing the Transport Pipeline Overview of Transport Services Configuring Message Transport Managing Transport Rules Managing and Troubleshooting Mail Flow Managing Mail Flow Troubleshooting Mail Flow Troubleshooting Transport Issues Troubleshooting with Logs Managing Message Hygiene Planning for Message Hygiene Managing Anti-Malware and Anti-Spam Policies Managing Advanced Threat Protection Managing Compliance Messaging Compliance in the SCC Messaging Compliance in Exchange Managing Exchange Online Archiving and Auditing Managing Content Search Managing Organizational Settings Managing Authentication for Messaging Configuring Organizational Settings Configuring Organizational Sharing Managing Mobile Devices Mobile Device Mailbox Policies Managing Mobile Device Access Managing Role-Based Permissions Managing Admin Roles Managing User Roles Exchange Setup - RBAC and AD Split Permission Managing Recipient Objects and Resources Exchange Recipients Creating and Managing Exchange Recipients Managing Email Addresses, Lists, and Resources Managing Public Folders Planning the Public Folder Hierarchy Implementing and Managing Public Folders Troubleshooting Public Folders Planning a Hybrid Environment Exchange Hybrid Deployment Requirements Planning to Run the Hybrid Configuration Wizard Performing Mailbox Migrations Planning Mailbox Migrations Performing IMAP Migrations Performing Cutover and Staged Migrations Performing Advanced Migrations Deploying and Troubleshooting a Hybrid Environment Deploying and Managing an Edge Transport Server Configuring a Hybrid Deployment using the HCW Implementing Advanced Hybrid Functionality Troubleshooting Hybrid Deployments