• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1234 Enterprise courses delivered Online

Certified Mobile Asset Management (CMAM)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. Course Outline Mobile Asset Management and ITAM People & Mobile Assets Bring Your Own Device (BYOD) Tools Repository Management Assessment The 12 KPAs and Mobile Asset Management Program Management & Mobility Policy Management & Mobility Communication & Education Management & Mobility Education & Mobility Acquisition Management & Mobility Asset Identification Management & Mobility Legislation & Compliance Management & Mobility Software & Application Licensing Disposal Management & Mobility Documentation Management & Mobility Financial Management & Mobility Vendor Management & Mobility Data Protection

Certified Mobile Asset Management (CMAM)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Networking

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level network administrators, network support and help desk technicians. Overview Upon successful completion of this course, students will be able to build, connect and manage networks, and IP traffic routing. In this course the student will learn to install, operate, configure and secure basic and enterprise networks. Networking BasicsNetworking ModelsNetwork AddressingPacket DeliveryDevice ManagementNetwork Security BasicsAdvanced Network Security with ACLsSwitchesAdvanced Switching ConceptsRoutersAdvanced Routing ConceptsBasic Network ServicesCisco Device ManagementTroubleshooting and Data CollectionAdvanced Switch RedundancyOSPF ConfigurationEIGRP ConfigurationPPP WANsFrame Relay WANsSecure VPNs and Tunneling Additional course details: Nexus Humans Cisco Networking training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Networking course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Networking
Delivered OnlineFlexible Dates
Price on Enquiry

GRC100 Principles of SAP Governance, Risk, and Compliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration

GRC100 Principles of SAP Governance, Risk, and Compliance
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)
Delivered OnlineFlexible Dates
Price on Enquiry

IT Skills for Professionals (Database, Networking, Programming, Web Design & Development)

4.8(9)

By Skill Up

Flash Sale: Upto 50% OFF! CPD Certified| 15-in-1 Diploma Bundle | 15 Free PDF Certificate| Lifetime Access

IT Skills for Professionals (Database, Networking, Programming, Web Design & Development)
Delivered Online On Demand4 days
£74.99

Travel and Tourism Diploma

4.7(160)

By Janets

The global travel and tourism sector is one of the most dynamic, resilient and potentially-rewarding as a chosen career path. A multi-trillion-dollar global industry of mind-blowing proportions, hiring in all areas of travel and tourism is predicted to continue accelerating indefinitely. Do you have a keen sense of travel and exploration? Are you fascinated by unique cultures and famed world heritage sites? If so, this Travel and Tourism Diploma is designed for you! Through this exciting course you will learn how to undertake travel and tourism functions such as the management of cultural and natural resources, how to effectively coordinate travel and tourism activities, manage events and develop entrepreneurial skills to start your own enterprise. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who is this course for? Travel and Tourism Diploma is suitable for anyone who want to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all student from any academic backgrounds to learn more on this subject. Career path Training offered by the Travel and Tourism Diploma could potentially benefit a range of roles, but would particularly enhance careers in Tourism Hospitality Customer Service Sales Other professional travel roles

Travel and Tourism Diploma
Delivered Online On Demand43 hours
£9.99

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Business Startup Online

By Training Tale

Business Startup With the global financial markets in such turmoil, many people are looking for security in ways they may not have considered previously. This Business Startup course is designed for students who want to learn the skills and knowledge required to develop a start-up. It is crucial that you create an effective plan that will allow you to test your product or service and make any necessary changes and improvements. It all starts with developing a successful business idea. This Business Startup course comprises several modules that will look into a different aspects of this subject. It will provide learners with an understanding of the initial processes and requirements of a start-up, as well as knowledge of the first steps in Startup, including marketing, legal, and financial requirements, as well as an understanding of how to write a business plan. Learning Outcomes After completing this Business Startup course, you will be able to: Understand the steps for a business start-up. Understand what is required of you to start your own business. Polish your business idea. Build your competitive advantages. Increase self-awareness and aid personal development. Develop a Start-up Business Plan. Why Choose Business Startup Course from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the course. Other courses are included with Business Startup Bundle Course Course 01: Business Startup Course 02: Level 1 Business Management Course 03: Level 3 Business Administration [ Note: Free PDF certificate as soon as completing the course ] Business Startup Detailed course curriculum Module 1: Fundamental Steps for a Business Start-up Module 2: Strategic Thinking about New Business Module 3: The Best Business Ideas for You Module 4: Developing a Start-up Business Plan Assessment Method After completing each module of the Business Startup, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification After completing the MCQ/Assignment assessment for this course, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. Who is this course for? Business Startup This course is ideal for anyone who wants to start up his own business. Requirements Business Startup There are no specific requirements for this Business Startup course because it does not require any advanced knowledge or skills. Students who intend to enrol in this Business Startup course must meet the following requirements: Good command of the English language Must be vivacious and self-driven Basic computer knowledge A minimum of 16 years of age is required Career path Business Startup Upon successful completion of this Business Startup course, you may choose to become a: Business Owner Entrepreneur Business Analyst Business and Enterprise Advisor Business Development Executive Certificates Certificate of completion Digital certificate - Included

Business Startup Online
Delivered Online On Demand2 hours
£12

Cloud-Based Business Operations Mastery

By Compete High

🚀 Unlock the Future of Business: Master Cloud-Based Operations! 🚀   Are you ready to revolutionize your business operations and propel your success into the digital era? Introducing our groundbreaking online course: Cloud-Based Business Operations Mastery!   🌐 Why Cloud-Based Operations? In today's fast-paced business landscape, agility is key. The cloud offers unparalleled flexibility, scalability, and efficiency. Whether you're a startup, a small business, or a seasoned enterprise, embracing cloud-based operations is the game-changer you've been waiting for.   🔥 Benefits of Enrolling:   Boost Efficiency: Streamline your processes with cloud-based solutions. Cost Savings: Say goodbye to hefty infrastructure costs. Global Accessibility: Access your data and applications from anywhere in the world. Scalability: Grow your business without limitations. Enhanced Security: Fortify your digital assets against evolving cyber threats.   💼 Who Should Enroll? Entrepreneurs and business owners IT professionals and managers Operations and logistics professionals Anyone ready to future-proof their business   🌈 What's Included? Engaging video lessons Interactive quizzes and assessments Real-world case studies Live Q&A sessions Exclusive access to a thriving community of like-minded professionals   🔒 Secure Your Spot Today! Seize this opportunity to propel your business into the future. Enroll in Cloud-Based Business Operations Mastery now and join the ranks of industry leaders who are transforming their operations for unparalleled success.   🚀 Don't be left behind - evolve with the cloud and thrive in the digital age! 🌐   👉 Click [Enroll Now] to embark on your journey to Cloud-Based Business Operations Mastery! 👈   Course Curriculum Basic Overview 00:00 Hardware Needed 00:00 Google Chrome Based Tools 00:00 File Storage 00:00 File Management 00:00 E-Mail Management 00:00 E-Mail Management - Part 2 00:00 Social Media Messaging 00:00 Creating Audio Content 00:00 Audio Editing 00:00 Video Content Creation 00:00 Video Content Editing 00:00 Text and PDF Document Creation - Part 1 00:00 Text and PDF Document Creation - Part 2 00:00 Editing HTML Pages 00:00 Creating And Editing Graphics 00:00 Personal Project Management 00:00 Task Management 00:00 Password Management 00:00 Conclusion 00:00 Advanced Overview 00:00 Administration of Priviledges 00:00 Private Video Presentations 00:00 Semi Public Video Presentations 00:00 Real Time Written Collaboration 00:00 Real Time Public Presentations 00:00 Asynchronous Collaboration 00:00 Audio Content Collaboration 00:00 Written Content-Report Collaboration - Part 1 00:00 Written Content-Report Collaboration - Part 2 00:00 WordPress Collaboration 00:00 Cpanel Management in the Cloud 00:00 Cpanel Collaboration 00:00 JVZoo Collaboration 00:00 Warrior Plus Collaboration 00:00 Amazon S3 Collaboration 00:00 Social Media Collaboration 00:00 Phone SMS Communications 00:00 Collaborative Project Management 00:00 Conclusion 00:00

Cloud-Based Business Operations Mastery
Delivered Online On Demand1 hour
£25

VMware Spring: Core Training

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot with hands-on experience and a focus on fundamentals Overview By the end of the course, you should be able to meet the following objectives: Spring configuration using Java Configuration and Annotations Aspect oriented programming with Spring Testing Spring applications using JUnit 5 Spring Data Access - JDBC, JPA and Spring Data Spring Transaction Management Simplifying application development with Spring Boot Spring Boot auto-configuration, starters and properties Build a simple REST application using Spring Boot, embedded Web Server and fat JARs or classic WARs Implementing REST client applications using RestTemplate and WebClient Spring Security Enable and extend metrics and monitoring capabilities using Spring Boot actuator Utilize Spring Boot enhancements to testing This course offers hands-on experience with the major features of Spring and Spring Boot, which includes configuration, data access, REST, AOP, auto-configuration, actuator, security, and Spring testing framework to build enterprise and microservices applications. On completion, participants will have a foundation for creating enterprise and cloud-ready applications. Introduction to Spring Java configuration and the Spring application context @Configuration and @Bean annotations @Import: working with multiple configuration files Defining bean scopes Launching a Spring Application and obtaining Beans Spring JAVA Configuration: A Deeper Look External properties & Property sources Environment abstraction Using bean profiles Spring Expression Language (SpEL) Annotation-based Dependency Injection Component scanning Autowiring using @Autowired Java configuration versus annotations, mixing. Lifecycle annotations: @PostConstruct and @PreDestroy Stereotypes and meta-annotations Factory Pattern in Spring Using Spring FactoryBeans Advanced Spring: How Does Spring Work Internally? The Spring Bean Lifecycle The BeanFactoryPostProcessor interception point The BeanPostProcessor interception point Spring Bean Proxies @Bean method return types Aspect-oriented programming What problems does AOP solve? Defining pointcut expressions Implementing various types of advice Testing a Spring-based Application Spring and Test-Driven Development Spring 5 integration testing with JUnit 5 Application context caching and the @Dirties Context annotation Profile selection with @Active Profiles Easy test data setup with @Sql Data Accss and JDBC with Spring How Spring integrates with existing data access technologies Data Access Exception hierarchy Spring?s Jdbc Template Database Transactions with Spring Transactions overview Transaction management with Spring Transaction propagation and rollback rules Transactions and integration testing Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using Command Line Runner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application Spring Security Oauth (Optional Topic) OAuth 2 Overview Implementing OAuth 2 using Spring Security OAuth Reactive Applications with Spring (Optional Topic) Overview of Reactive Programming concepts Reactive Programming support in Spring Using Spring?s reactive WebClient Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring: Core Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring: Core Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring: Core Training
Delivered OnlineFlexible Dates
Price on Enquiry