Duration 1 Days 6 CPD hours This course is intended for This course is designed for existing Microsoft SharePoint site users who will create and manage SharePoint team or communication sites in SharePoint Online or SharePoint 2019. Overview In this course, you will create a SharePoint team site and a communication site, perform basic content management tasks on SharePoint sites, and configure workflows with Forms and Flow. You will: Create and configure new SharePoint sites. Create and configure document libraries. Create and configure lists. Assign permissions and access rights. Create and configure a communication site. Implement workflows with Forms and Flow. This course will empower you to use Microsoft© SharePoint© online to facilitate collaboration and allow you to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. Enable and configure SharePoint?s many distinct features and discover the many content structures that can be selected, added, and configured. Learn how to create, configure, and manage SharePoint sites so that your team or organization can share information and collaborate effectively.SharePoint content structures and configuration options are complex. As a site owner, it is critical that you understand what features, options, and content structures are available in SharePoint online, and how to properly configure them. With SharePoint sites, features, and content structures properly implemented, you will be able to securely share files, collaborate on documents, and access the information you need to work with your colleagues more effectively. Creating and Configuring a New Site Topic A: Create a Site in SharePoint Topic B: Configure Site Look and Layout Creating and Configuring Document Libraries Topic A: Create Document Libraries Topic B: Configure File Versioning and Checkout Topic C: Configure Content Approval Creating and Configuring Lists Topic A: Add List Apps to a Site Topic B: Create Custom Lists Topic C: Create Calculated and Validated Columns Assigning Permissions and Access Rights Topic A: Secure Sites with Permissions Topic B: Secure Apps, Documents, and Files Creating and Configuring a Communication Site Topic A: Create a Communication Site Topic B: Configure a Communication Site Implementing Workflows with Forms and Flow Topic A: Capture Data with Forms Topic B: Store Form Data in SharePoint with Flow Topic C: Automate Business Processes with Forms, Flow, and SharePoint
Duration 4 Days 24 CPD hours This course is intended for This basic course is for business data analysts who want to profile and assess data using Information Analyzer, also data quality analysts who need to measure data quality. Overview Analyze data structures to determine agreement with documented metadataDiscover data anomaliesIdentify invalid and incomplete data valuesDetermine potential primary keys to table structuresAdd business meaning to dataProduce deliverables that can be used by business users and ETL developersConfigure Information AnalyzerAdminister the Information Analyzer environmentUnderstand security considerations around data analysisUnderstand the methodology supporting data analysisUse Information Analyzer to analyze data content and structureUse Information Analyzer to construct data rules and utilize IBM-supplied data rule templates In this course, you will learn how to use the IBM InfoSphere suite to analyze data and report results to business users. Course Outline Information Analysis concepts Information Server overview Information Analyzer overview Information Analyzer Setup Column analysis Concepts Basic data profiling techniques in practice Data profiling techniques Primary key analysis Concepts Basic data profiling techniques in practice Foreign key and cross domain analysis Concepts Basic data profiling techniques in practice Baseline analysis Reporting and publishing Extending the meta data using Information Governance Catalog and Information Analyzer Data Rules and Metrics Additional course details: Nexus Humans KM803 IBM Information Analyzer Essentials v11.5 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM803 IBM Information Analyzer Essentials v11.5 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is ideal for developers, engineers and others including: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After taking this course, you should be able to: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization This course, Mulitcloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0, teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Lab outline Create Users, User Roles, and Cloud Permissions Create Cost Group and Billing Unit Use Cisco CloudCenter Suite Cost Optimizer Representational State Transfer (REST) API Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is targeted towards developers looking to build a career as a Node.js developer. This course offers you a deep but gentle dive into Node.js. You will start off by discovering the basic building blocks of the modern JavaScript language, which are necessary for you to have a good grasp of Node.js, before delving into the fundamentals of Node.js.Most courses quickly dive into Node.js forgetting that, at the end of the day, Node.js is still JavaScript. This can be challenging for JavaScript newbies who are then trying to build a solid house on a shaky foundation.This course overcomes that obstacle by beginning with a quick introduction to the modern JavaScript language (ES6+). You will then discover Node's asynchronous programming model and examine Node's module system, including built-in modules and application modularization, as well as the NPM third-party module registry. We will finish off by working on a simple web application API using the Hapi.js and Knex.js frameworks. Introduction to Node.js The Basics of Node.js The Module System Asynchronous Programming with Node.js Building the API: Part 1 Building a Basic HTTP Server Setting up Hapi.js Understanding Requests Building the API: Part 2 Working with the DB Using Knex.js Authenticating Your API with JWT Testing Your API with Lab Additional course details: Nexus Humans Beginning API Development with Node.js training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning API Development with Node.js course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for anyone who is responsible for day-to-day management of many FortiGate devices via the FortiManager platform. Overview Describe capabilities of FortiManager Add FortiGate devices to Device Manager and import their running configuration Use provisioning templates and scripts for device-level changes across many devices Identify the synchronization states Manage the revision history of managed devices Offer a local FortiGuard Distribution Server to your Fortinet devices Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Explain high availability, backup, and recovery options for FortiManager Compare methods for centrally managing IPsec VPNs Explain the restricted ''admin'' profile and API high-level usage Use workspaces and workflow mode Identify steps to replace a managed FortiGate device Manage FortiGate devices' firmware centrally In this 2-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. Example use cases include large enterprise and carrier networks. Course Outline Module1 - Introduction and Initial Configuration Module2 - Administration and Management Module3 - Device Registration Module4 - Device Level Configuration and Installation Module5 - Policy and Objects Module6 - Manager Panes Module7 - Diagnostics and Troubleshooting Module8 - Advanced Configuration Additional course details: Nexus Humans FortiManager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the FortiManager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Java Fundamentals is designed for tech enthusiasts who are familiar with some programming languages and want a quick introduction to the most important principles of Java. Overview After completing this course, you will be able to: Create and run Java programs Use data types, data structures, and control flow in your code Implement best practices while creating objects Work with constructors and inheritance Understand advanced data structures to organize and store data Employ generics for stronger check-types during compilation Learn to handle exceptions in your code Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. The course begins with an introduction to the language, its philosophy, and evolution over time, until the latest release. You'll learn how the javac/java tools work and what Java packages are - the way a Java program is usually organized. Once you are comfortable with this, you'll be introduced to advanced concepts of the language, such as control flow keywords. You'll explore object-oriented programming and the part it plays in making Java what it is. In the concluding lessons, you'll be familiarized with classes, typecasting, and interfaces, and understand the use of data structures, arrays, strings, handling exceptions, and creating generics. Introduction to Java The Java Ecosystem Our First Java Application Packages Variables, Data Types, and Operators Variables and Data Types Integral Data Types Type casting Control Flow Conditional Statements Looping Constructs Object-Oriented Programming Object-Oriented Principles Classes and Objects Constructors The this Keyword Inheritance Overloading Constructor Overloading Polymorphism and Overriding Annotations References OOP in Depth Interfaces Typecasting The Object Class Autoboxing and Unboxing Abstract Classes and Methods Data Structures, Arrays, and Strings Data Structures and Algorithms Strings The Java Collections Framework and Generics Reading Data from Files The Java Collections Framework Generics Collection Advanced Data Structures in Java Implementing a Custom Linked List Implementing Binary Search Tree Enumerations Set and Uniqueness in Set Exception Handling Motivation behind Exceptions Exception Sources Exception Mechanics Best Practices
Duration 1 Days 6 CPD hours This course is intended for Multi-role (consumers, business authors, professional authors, developers, administrators, modelers, project managers) This course provides students with an overview of the IBM Cognos Analytics suite of products and their underlying architecture. Students will examine each component as it relates to an Analytics solution & will be shown a range of resources. IBM Cognos Analytics Describe IBM Cognos Analytics Describe IBM Cognos Analytics components Describe IBM Cognos architecture at a high level Describe IBM Cognos security at a high level Consume Content in IBM Cognos Analytics Where do consumers access BI content? Use published reports Drill through to related data Specify run report options Specify properties of an entry Alerts and Watch Items Create Reports in IBM Cognos Analytics Overview of reporting and report authoring Identify package types, uploaded files, and data modules available for reporting Examine IBM Cognos Analytics - Reporting Examine the interface Explore different report types Create a simple, sorted, and formatted report Create a report view Create a subscription Create an Active Report Import and report on personal data Create Dashboards in IBM Cognos Analytics Describe IBM Cognos Dashboarding Identify the IBM Cognos Dashboarding user interface Add report content and tools to create dashboards Widget-to-widget communication Filter data in the dashboard Sort, group and ungroup, and calculate data Create Metadata Models in IBM Cognos Analytics Define IBM Cognos Framework Manager and its purpose Describe the IBM Cognos Framework Manager environment Describe IBM Cognos Cube Designer Get high-level content from Dynamic Cubes course and/or FM course Web-based Modeling Create Data Modules Extend IBM Cognos Analytics Introduction to IBM Cognos Mobile Key features Examine Cognos Mobile architecture Identify supported products Introduction to IBM Cognos BI for Microsoft Office Describe Cognos Analysis for Excel (CAFÂ) Compare IBM Cognos Analytics & IBM Cognos BI New features in IBM Cognos Analytics Changes from IBM Cognos BI to IBM Cognos Analytics Legacy option Examine Event Studio Examine the role of Event Studio in Performance Management List the benefits of Event Studio Examine Metric Studio Identify scorecards, metrics, and metric types Organize metrics with strategies Track initiatives with projects