Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for: Line of Business (LoB) owners, IT leaders, and executives Overview In this course, you will learn to: Explain the role of information technology (IT) in an organization for business transformation Explain the customer value proposition for using the cloud across industries Define key characteristics of cloud computing Explain the cloud business model Identify key security practices of cloud computing Frame the cloud business value using the Cloud Value Framework In this course, you will learn the fundamental concepts of cloud computing and how a cloud strategy can help companies meet business objectives. It explores the advantages and possibilities of cloud computing. It also introduces addresses concepts such as security and compliance to help facilitate better discussions with line of business (LOB) professionals, information technology (IT) LoB, IT leaders, and executives. Module 1: Course Introduction Course Introduction Module 2: Information Technology for Business Transformation Role of IT in an organization for business transformation Brief history of IT Legacy approach to IT What drives customers to move from traditional infrastructure to the cloud Module 3: Cloud Computing Define cloud computing Key characteristics of cloud technology The cloud business model Key security practices within the cloud Module 4: Business Value of the Cloud The customer value proposition Identify who is using cloud computing Industry trends Customer examples Module 5: The Cloud Value Framework Introduction to the Cloud Value Framework Cost Savings Staff Productivity Operational Resilience Business Agility Module 6: Business Value Activity Business Value Activity Additional course details: Nexus Humans AWS Cloud Essentials for Business Leaders training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Cloud Essentials for Business Leaders course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Individuals preparing for the Cisco Customer Success ManagerSpecialist certification Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technology Overview After taking this course, you should be able to: Describe the role of the Customer Success Manager Describe the tools that the Customer Success Manager uses to ensure customer experience Describe the lifecycle approach to customer experience The Cisco Customer Success Manager (DTCSM) v2.2 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.This course is based on understanding the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification. Course Outline Transition to Subscription Economy Customer and Industry Trends Defining Customer Success and the CSM Role Engaging the Customer for Success Engaging the Customer for Success Addressing Barriers Customer Success Management Activities Success Plan Elements Customer Success Management Activities Additional course details: Nexus Humans Cisco Customer Success Manager v2.2 (DTCSM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Customer Success Manager v2.2 (DTCSM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Become a Certified Digital Leader Designed for: IT managers and business managers Consultants Project managers Key take aways from this leadership course (non-technical): Be comfortable with digital trends and technologies Leverage digital for your business Organise digital and manage digital transformation successfully Module 1 - Digital concepts Digital building blocks Digital lifecycle Big Data strategy Module 2 - Digital strategy Strategy Golden triangle of digital transformation Opportunity analysis Module 3 - Digital marketing Advertising Funnels E-commerce Module 4 - Digital economy Competitive landscape Influencers Legislation Module 5 - Digital finance Digital investments Defining budgets for digital ROI of digital marketing Module 6 - Information risks Information security concepts AI risks Privacy and Intellectual Property Module 7 - Organising digital Organisational design Iterative approaches Module 8 - Leading the digital workforce Digital mindset Robots & human workforce Industry 4.0 Module 9 - Leading Digital Transformation programmes Product development & Innovation Programme management Organisational change Case studies 3 business cases
Duration 2 Days 12 CPD hours This course is intended for If you are a data analyst, data scientist, or a business analyst who wants to get started with using Python and machine learning techniques to analyze data and predict outcomes, this book is for you. Basic knowledge of computer programming and data analytics is a must. Familiarity with mathematical concepts such as algebra and basic statistics will be useful. Overview By the end of this course, you will have the skills you need to confidently use various machine learning algorithms to perform detailed data analysis and extract meaningful insights from data. This course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You?ll discover how to tune the algorithms to provide the best predictions on new and unseen data. As you delve into later sections, you?ll be able to understand the working and output of these algorithms and gain insight into not only the predictive capabilities of the models but also their reasons for making these predictions. Data Exploration and Cleaning Python and the Anaconda Package Management System Different Types of Data Science Problems Loading the Case Study Data with Jupyter and pandas Data Quality Assurance and Exploration Exploring the Financial History Features in the Dataset Activity 1: Exploring Remaining Financial Features in the Dataset Introduction to Scikit-Learn and Model Evaluation Introduction Model Performance Metrics for Binary Classification Activity 2: Performing Logistic Regression with a New Feature and Creating a Precision-Recall Curve Details of Logistic Regression and Feature Exploration Introduction Examining the Relationships between Features and the Response Univariate Feature Selection: What It Does and Doesn't Do Building Cloud-Native Applications Activity 3: Fitting a Logistic Regression Model and Directly Using the Coefficients The Bias-Variance Trade-off Introduction Estimating the Coefficients and Intercepts of Logistic Regression Cross Validation: Choosing the Regularization Parameter and Other Hyperparameters Activity 4: Cross-Validation and Feature Engineering with the Case Study Data Decision Trees and Random Forests Introduction Decision trees Random Forests: Ensembles of Decision Trees Activity 5: Cross-Validation Grid Search with Random Forest Imputation of Missing Data, Financial Analysis, and Delivery to Client Introduction Review of Modeling Results Dealing with Missing Data: Imputation Strategies Activity 6: Deriving Financial Insights Final Thoughts on Delivering the Predictive Model to the Client
Duration 2 Days 12 CPD hours This course is intended for This in an intermediate-level Java development course geared for students experienced with Java and Spring programming essentials. This course does not cover Java or Spring development basics. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core Cucumber and web testing skills, coupling the most current, effective techniques with the soundest industry practices. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will: Learn the request-response cycle of REST requests Implement a REST controller using Spring Map URLs to service endpoints Use Spring's template class to develop a REST client Bootstrap a Spring REST applications Return different media types for a service Setting the response headers Discuss Exceptions and HTTP Status codes Handle exceptions thrown by a service Spring REST focuses on providing an understanding of the fundamental principles and technologies that are used in the development of RESTful services and clients. This understanding is critical to being able to diagnose, troubleshoot, tune, and perform other lifecycle activities.Working with Spring REST is a two-day, fast-paced coding course geared for experienced developers who have prior working knowledge of Java. Throughout the course students learn the best practices for writing Restful services in Java using Spring Boot. The course provides an in-depth view of the APIs provided by Spring to develop both the REST service and the REST client. Implementing REST with Spring REST principles Introduction to RESTful Services in Spring Introduction to REST Clients in Spring Bootstrapping the REST application Content Representation Implementing the REST Service Error Handling Security and RESTful Services Securing Untrusted Input Defending RESTful Services Additional course details: Nexus Humans Working with Spring REST (TT3358) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Working with Spring REST (TT3358) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for individuals in a variety of job roles whose primary responsibility is not project management, but who manage projects on an informal basis; who contribute as members of a project team; or who wish to incorporate project management practices into their personal work. It is also beneficial for anyone who is considering a career path in project management and desiring a complete overview of the field and its generally accepted practices. Overview In this course, you will identify the elements of sound project management and apply the generally recognized project management practices to successfully manage or participate in projects. You will: Identify the key processes and requirements of project management. Initiate a project. Use a Predictive approach to plan for time and cost. Use an Adaptive approach to plan a project. Plan for project risks, communication, and change control. Manage the execution of a project. Close a project. This course teaches the fundamentals of project management and its underlying structure and elements, including project phases, project life cycles, stakeholders, and areas of expertise. These, coupled with the ability to identify the project management processes that are recognized industry wide as good practice, will help you to apply effective project management techniques to improve the efficiency of your projects and ensure their success. This course is designed to cover various project management approaches and is not intended to focus on a single methodology or framework. Lesson 1: Getting Started with Project Management Topic A: Identify the Characteristics of a Project Topic B: Identify the Project Approach Topic C: Identify the Leadership Roles in a Project Lesson 2: Initiating a Project Topic A: Create a Project Scope/Vision Statement Topic B: Identify the Essential Skills for a Project Team Topic C: Identify the Risks to a Project Lesson 3: Planning for Time and Cost in Predictive Projects Topic A: Create a WBS Topic B: Create a Project Schedule Topic C: Determine Project Costs Lesson 4: Planning for Adaptive Projects Topic A: Create Epics and User Stories Topic B: Build a Product Backlog Topic C: Create an Initial Release Plan Topic D: Conduct a Sprint Planning Meeting Topic E: Replan the Project Lesson 5: Planning for Project Risks, Communication, and Change Control Topic A: Analyze the Risks to a Project Topic B: Create a Communication Plan Topic C: Develop a Change Control Plan Lesson 6: Managing a Project Topic A: Begin Project Work Topic B: Execute the Project Plan Topic C: Track the Progress of an Adaptive Project Topic D: Report Project Performance Topic E: Implement Change Control Lesson 7: Closing a Project Topic A: Close a Sprint, a Release, or an Adaptive Project Topic B: Close a Predictive Project Topic C: Create a Final Report
Duration 4 Days 24 CPD hours This course is intended for This course is for people who have on the job experience doing project management activities and running projects, regardless of their job title. It is for those who wish to become certified project managers, or those that want to build or reinforce a foundation in project management. This course is ideal for a person who wants to grow and formalize their project management skills on an industry neutral, global standard, the Project Management Institute. Overview After completing this course, students will be able to: Demonstrate an understanding of the various project life cycles and processes. Distinguish between predictive and adaptive approaches. Demonstrate an understanding of project management planning. Demonstrate an understanding of project roles and responsibilities. Explain the importance of the role the project manager plays. Determine how to follow and execute and respond to planned strategies or frameworks (e.g., communication, risks, etc.). Demonstrate an understanding of common problem-solving tools and techniques. Identify the suitability of a predictive, plan-based approach for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Determine and give examples of the activities within each process. Demonstrate an understanding of a project management plan schedule. Determine how to document project controls of predictive, plan-based projects. Explain when it is appropriate and sustainable to use an adaptive approach for the organizational structure. Compare the pros and cons of adaptive and predictive, plan-based projects. Identify the suitability of adaptive approaches for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Identify organizational process assets and environmental factors that facilitate the use of adaptive approaches. Determine how to plan project iterations. Determine how to document project controls for an adaptive project. Distinguish between the components of different adaptive methodologies (e.g., Scrum, Extreme Programming (XP), Scaled Adaptive Framework (SAFe), Kanban, etc.). Determine how to prepare and execute task management steps. Demonstrate an understanding of business analysis (BA) roles and responsibilities. Demonstrate the importance of communication for a business analyst between various teams and stakeholders. Determine how to gather requirements and using the best approach for a situation. Explain the application of a product roadmap. Determine how project methodologies influence business analysis processes. Validate requirements through product delivery. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks.