• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2074 IT Certifications courses delivered Online

WM646 IBM Integration Bus V10 System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IBM Integration Bus administrators and developers who administer IBM Integration Bus. Overview After completing this course, you should be able to:Install and configure an IBM Integration Bus instanceEstablish, maintain, and manage an integration nodeAdminister IBM Integration Bus components and message flow applications by using the IBM Integration web user interface and command interfaceConfigure connectivity to IBM MQ to enable IBM Integration Bus to get messages from, or put messages to, queues on a local or remote queue managerImplement IBM Integration Bus administration and message flow securityUse problem determination aids to diagnose and solve development and runtime errorsUse the IBM Integration web user interface to generate and display message flow statisticsUse IBM MQ or MQTT to publish and subscribe to IBM Integration Bus topicsImplement an IBM Integration Bus global cache to store, reuse, and share data between integration nodesUse workload management policies to adjust the processing speed of messages and control the actions that are taken on unresponsive flows and threadsUse the IBM Integration web user interface and a database to record events and replay messagesEnable an integration node to connect to a database with ODBC and JDBCConfigure a Java Message Services (JMS) provider for use with the JMS nodesConfigure IBM Integration Bus for the secure file transfer protocol (SFTP)Find and install IBM Integration Bus SupportPac components In this course, students learn how to administer IBM Integration Bus on distributed operating systems, such as Windows and AIX, by using the IBM Integration Bus administrative interfaces. Course Outline Course introduction IBM Integration Bus overview Product installation, configuration, and security planning Exercise: Integration node setup and customization Connecting to IBM MQ Exercise: Connecting to IBM MQ Administration in the IBM Integration Toolkit Exercise: Using the IBM Integration Toolkit Administration basics Exercise: Administering the IBM Integration Bus runtime components Implementing IBM Integration Bus administration security Exercise: Using file-based security to control administration access Exercise: Using queue-based security to control administration access Implementing IBM Integration Bus message flow security Administering web services and web service security Exercise: Implementing web services and web services security Diagnosing problems Exercise: Using problem diagnosis tools Exercise: Identifying runtime problems Monitoring the integration node and message flow performance Publish/subscribe implementation overview Exercise: Viewing runtime statistics Configuring IBM Integration Bus for high availability Exercise: Administering workload management policies Monitoring, recording, and replaying message flow events Exercise: Recording and replaying message flow data Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM646 IBM Integration Bus V10 System Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM646 IBM Integration Bus V10 System Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM646 IBM Integration Bus V10 System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

S4270 Advanced Available-to-Promise in SAP S/4HANA

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Overview Describe and execute business processes in SAP S/4HANA aATP Through instructor lectures and demonstrations balanced with extensive system exercises you will gain a thorough understanding of how aATP can support your logistics processes. This course provides fundamental training regarding availability check in SAP S/4HANA. The availability check in S/4HANA Fundamentals of ATP-check during sales order processing Checking Methods in Detail (Planning Strategies and Requirement Classes, ATP-Check and Scheduling) Backorder Processing in S/4HANA Advanced Available-to-Promise (aATP) in S/4HANA Overview of the basic aATP process in S/4HANA Advanced Available-to-Promise aATP and Allocation: Single and multiple allocation checks, using manage Characteristic catalog Introducing Release for Delivery Fundamentals of Alternative-based-Confirmation Backorder Processing with aATP in S/4HANA Additional course details: Nexus Humans S4270 Advanced Available-to-Promise in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4270 Advanced Available-to-Promise in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4270 Advanced Available-to-Promise in SAP S/4HANA
Delivered OnlineFlexible Dates
Price on Enquiry

SAP Business Planning and Consolidation 11.0 version for SAP BW/4HANA: Consolidation

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Project Team Members IT Support Team Members Advanced Business Analysts System Administrators Application Consultants Business Process Owners / Team Leads / Power Users Program / Project Managers Trainers Overview Learn how to design, configure, consolidate, and report with BPC Standard In this course, students learn all of the key steps to set up Consolidation based on the SAP Business Planning and Consolidation, version for SAP NetWeaver. SAP Business Planning and Consolidation Overview Describing SAP Business Planning and Consolidation Running Consolidation Tasks Implementing BPC Standard Consolidation Modeling Consolidation Structures and Reporting Configuring Environments and Dimensions Creating Models for Consolidation Creating Reports and Formats in the EPM Add-In Report on BPC Standard Data in Analysis for Office Data Collection and Preparation Collecting Transforming Data for Consolidation Scenarios Creating Consolidation Logic Configuring Reclassifications Configuring Balance Carryforward Managing Journals Consolidations and Eliminations Translating Local Currency Configuring Intercompany Matching and Booking Using the Ownership Manager Configuring Integration Rules Eliminating Intercompany Transactions Configuring Intercompany US Elimination Designing Management, Matrix, and Multiple Accounting Standard Solutions Describing Consolidation and Elimination Principles Consolidating Investments Describing Stage Consolidation Configuring Scope Variation Configuring Equity Pickup Consolidation Process Monitoring Configuring Work Status Using the Controls Monitor to Validate Data Configuring Consolidation Business Process Flows

SAP Business Planning and Consolidation 11.0 version for SAP BW/4HANA: Consolidation
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

S4H01 SAP Business Suite to SAP S/4HANA Delta

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for SAP professionals Overview Explain the motivation and need for a next generation business suite and how SAP S/4HANA enables a digital organizationDescribe the SAP S/4HANA business and technical architectureGain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoptionExplain how SAP S/4HANA supports the business users with a new user experience (e.g.: SAP Fiori UX)Describe key business processes of SAP S/4HANA Enterprise ManagementExplain SAP S/4HANA embedded analytics capabilitiesGain basic knowledge about SAP S/4HANA LoB solutions and add-on supportDescribe integration scenarios between SAP S/4HANA and SAP Cloud solutions In this course, students learn a broad range of topics including the motivation behind the development of SAP S/4HANA. Course Outline Introduction to SAP S/4HANA SAP S/4HANA user experience SAP HANA powers SAP S/4HANA SAP Activate for SAP S/4HANA SAP S/4HANA Enterprise Management, LoB solutions and add-ons SAP S/4HANA embedded analytics Integration between SAP S/4HANA Core and SAP Cloud solutions Additional course details: Nexus Humans S4H01 SAP Business Suite to SAP S/4HANA Delta training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H01 SAP Business Suite to SAP S/4HANA Delta course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4H01 SAP Business Suite to SAP S/4HANA Delta
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Intermediate SQL Custom 3-Day Private Class Outline

By Nexus Human

Duration 3 Days 18 CPD hours In this 3 day customized Intermediate SQL course students will learn additional commands and functions using labs/activities/content that correlates with this content. By understanding SQL, you get the knowledge of fundamental queries associated with data management so that you can verify, monitor, and control all the activities operating in the database. Lesson 1 Substring Instr / CharIndex Convert (data types and with Formatting) Replace RowCount / RowNum / Top )n) ÿ(Oracle/SQL Server functions) Case / If Then Else statements Exists Clause Find Duplicates using Group by and have clause (and other tips for analyzing data) Lesson 2 Set operations (UNION, UNION ALL, INTERSECT, MINUS) GROUP BY extensions (ROLLUP, CUBE, and GROUPING SETS) Loops / Cursors Common Table Expressions (CTEs) Lesson 3 Temp Tables / Views Advanced Subqueries Regular Expressions (RegEx) Linked Server Queries Qualified subquery predicates Aggregate functions Optimizing queries SQL Injection Lesson 4 JSON Parsing With Partition By With Over Fuzzy Logic - MDS.mdq.[Similarity]ÿ Additional course details: Nexus Humans Intermediate SQL Custom 3-Day Private Class Outline training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate SQL Custom 3-Day Private Class Outline course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Intermediate SQL Custom 3-Day Private Class Outline
Delivered OnlineFlexible Dates
Price on Enquiry

CCTA Check Point Troubleshooting Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTA Check Point Troubleshooting Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Discovery Day - Cloud Practitioner Essentials

By Nexus Human

This event is designed to teach business leaders and IT technical professionals the benefits of computing in the AWS Cloud.

AWS Discovery Day - Cloud Practitioner Essentials
Delivered Online On Demand2 hours
FREE