Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for integration developers who configure service policies on IBM© DataPower Gateways. Overview After completing this course, you should be able to: Describe how DataPower gateways are configured Create and configure cryptographic objects Configure Secure Sockets Layer (SSL) to and from DataPower gateways Configure a multi-protocol gateway (MPGW) to handle multiple protocols from a single service Configure a service level monitoring (SLM) policy to control message traffic Use logs and probes to troubleshoot services Use patterns to define and deploy new services Configure message transformation and routing by using style sheets (XSL) and GatewayScripts Handle errors in service policies This course teaches you the essential skills that are required to configure, implement, and troubleshoot services that are developed on the IBM© DataPower Gateways (IDG) with firmware version 7.5.0, regardless of use case. The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its XML and web services deployments, and extend the capabilities of its service-oriented architecture (SOA) infrastructure. The gateways also extend these capabilities into the JSON, REST, and Mobile application areas. Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to develop and debug services that are implemented on the DataPower gateways. These skills include WebGUI and Blueprint Console navigation, service type selection, basic multi-protocol gateway configuration, creating and using cryptographic objects, and configuring SSL connections. You also learn how to use various problem determination tools such as logs, monitors, and probes, and techniques for testing DataPower services and handling errors. Hands-on exercises give you experience working directly with a DataPower Gateway. The exercises focus on skills such as creating multi-protocol gateways, working with cryptographic and SSL objects, configuring service level monitoring, troubleshooting services, handling errors in a service policy, and deploying a service from a pattern. Course introductionQuick introduction to developing on DataPowerExercise: First exposure to the DataPower developer environmentServices overviewStructure of a serviceExercise: Creating a BookingService gatewayMulti-protocol gateway serviceProblem determination toolsExercise: Enhancing the BookingService gatewayHandling errors in a service policyExercise: Adding error handling to a service policyDataPower cryptographic tools and SSL setupExercise: Creating cryptographic objects and configuring SSLService level monitoringExercise: Implementing a service level monitor in a multi-protocol gatewayPatterns for service configurationExercise: Using a DataPower pattern to deploy a serviceCourse summary
Duration 3 Days 18 CPD hours This course is intended for IT Professionals who deploy small-to- medium scale enterprise network solutions based on Aruba products and technologies Overview Upon completion of this course, you will be able to:Explain how Aruba networking solutions meet customers? requirementsExplain how Aruba AirWave provides unified wireless and wired network managementDescribe in-band management and out-of-band managementComplete the initial setup on ArubaOS switchesControl access to switches for both in-band and out-of-band managementManage software and configuration files on ArubaOS switchesExplain use cases for VLANs and configure port-based VLANs on ArubaOS switchesUnderstand and configure Rapid Spanning Tree Protocol (RSTP)Understand and configure Multiple Spanning Tree Protocol (MSTP)Differentiate between different types of link aggregation and understand the benefits of Link Aggregation Control Protocol (LACP)Configure and troubleshoot link aggregation on ArubaOS switchesConfigure static routes on ArubaOS switches and interpret IP routing tablesConfigure a basic Open Shortest Path First (OSPF) solutionDescribe how Virtual Switching Framework (VSF) works and the advantages that it providesConfigure and verify a simple VSF fabricDescribe the basics of wireless communications and 802.11 standardsDefine a wireless LAN (WLAN) and differentiate between wireless security optionsConfigure basic settings on Aruba Instant APsConfigure AirWave management settings on an IAP clusterConfigure SNMP v2c settings on ArubaOS switchesDiscover ArubaOS switches in AirWave and bring switches and IAPs under monitoring and managementImplement zero touch provisioning (ZTP) for Aruba IAPs and ArubaOS switches This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions. This course consists of approximately 20% lecture and 80% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 3-day course prepares network professionals for the HPE ATP - Aruba Mobile First Solutions V1 certification exam.In this course, participants learn about ArubaOS switch technologies including: VLANs, securing access, redundancy technologies such as MSTP, link aggregation techniques including LACP, and switch virtualization with Aruba?s Virtual Switching Framework (VSF). You also learn about IP Routing including static and dynamic IP routing with OSPF. This course teaches you how to deploy Aruba wireless Access Points and configure Aruba Clustering technology. It also teaches you how to configure, manage and monitor the network with the Aruba AirWave management solution. Introduction to Aruba, a Hewlett Packard Enterprise companySwitch CLI (Command Line Interface) NavigationProtecting Management AccessManagement of Software and ConfigurationsVLANSSpanning Tree Protocol (STP)Link AggregationIP RoutingVirtual Switching Framework (VSF)Wireless for Small-to-Medium Businesses (SMBs)Aruba AirWave
Course Overview This comprehensive course in Digital Marketing offers an in-depth exploration of the strategies that define modern online success. From brand positioning and content creation to platform-specific approaches across Facebook, Instagram, and YouTube, this guide covers every key area to help learners thrive in a fast-evolving marketing landscape. You will examine essential digital concepts such as SEO, mobile outreach, and email campaign structuring, all while gaining the strategic mindset needed to implement effective marketing solutions. By the end of this course, learners will have a strong understanding of how to structure marketing plans, reach targeted audiences through various channels, and evaluate digital performance metrics. This course is ideal for those looking to enhance their marketing knowledge, keep up with digital trends, and align themselves with career opportunities in a digitally driven economy. Course Description The course delves into the strategic core of digital marketing, equipping learners with the knowledge to understand consumer behaviour, design impactful campaigns, and master various online platforms. You will begin with the fundamentals before advancing through growth hacking techniques, customer journey mapping, and platform-specific strategies across Facebook, Instagram, Twitter, and more. Topics such as SEO, email communication, content strategy, and mobile marketing are presented with clarity, ensuring learners develop a thorough grasp of marketing logic and campaign planning. This course also explores how to build audience engagement and interpret campaign performance using reliable frameworks. Whether you're aiming to support a brand, manage digital channels, or enhance visibility through marketing strategies, this course offers a structured foundation that meets the demands of today’s digital environment. Course Modules Module 01: Fundamentals of Digital Marketing Module 02: Growth Hacking Module 03: Customer Journey Module 04: Content Marketing Module 05: SEO Module 06: E-Mail Marketing Module 07: Facebook Marketing Module 08: Instagram Marketing Module 09: Twitter Marketing Module 10: YouTube Marketing Module 11: Mobile Marketing (See full curriculum) Who is this course for? Individuals seeking to understand digital marketing strategy from the ground up. Professionals aiming to expand their expertise in multi-channel marketing. Beginners with an interest in online promotion, brand development, or digital outreach. Entrepreneurs, freelancers, and content creators wanting to enhance their marketing knowledge. Career Path Digital Marketing Executive Social Media Manager SEO Specialist Content Marketing Strategist Email Marketing Coordinator Digital Campaign Analyst Brand Engagement Consultant Online Marketing Assistant
Duration 1.5 Days 9 CPD hours This course is intended for Application developers on the beginner and intermediate level seeking to create and deploy secure Android applications. Overview Understand Android software architecture. Understand Android?s security model. Build Android applications with security best practices in mind. Build more secure and more robust application that appeals to clients. This is a two-day (12 hours) professional course, which thoroughly covers the Android security model and concerns of both the developer and end-user point of view. This course is mapped for AND-802 exam. PermissionsManaging the Policy FileUsers? Data Privacy and ProtectionSecuring Storage Additional course details: Nexus Humans Android Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for help desk specialists, technical coordinators, and entrylevel system administrators who implement and maintain networks using OS X Server. Give technical coordinators and entry-level system administrators the skills, tools, and knowledge to implement and maintain a network that uses OS X Server. Learn how to install and configure OS X Server to provide network-based services. Installing and Configuring OS X Server Installation, initial configuration, server administration tools, and troubleshooting installation issues. Authenticating and Authorizing Accounts Creating and administering accounts, configuring service access controls (SACLs), configuring VPN service, and troubleshooting Using Open Directory Configuring Open Directory, single sign-on, backing up directory data, troubleshooting Open Directory. Managing Accounts Using Profile Manager to manage devices, troubleshooting Profile Manager. Implementing Deployment Solutions Configuring and troubleshooting NetBoot/Network Install to deploy OS X. Using File Sharing Configuring and troubleshooting Apple File Service, share points for Windows users, WebDAV access for mobile devices, providing Time Machine network backups. Managing Web Services Hosting multiple web sites on a single server. Using Collaborative Services Setting up and configuring wikis and blogs, providing iChat and iCal services to assist people working together, and configuring Address Book service to share contact information amongst multiple computers, providing mail services. Certification Students can take the OS X Server Essentials 10.7 exam - one of two exams required for Apple Certified Technical Coordinator (ACTC) 10.7 certification. Additional course details: Nexus Humans Apple - Mac OS X Server Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac OS X Server Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is ideal for business users - the people who need to learn what's possible with Salesforce functionality across the suite of products, but aren't necessarily responsible for managing the application. If you're a customer service manager, business executive, business operations manager, sales operations manager, or any other operations, management, or process analysis 'super user,' this class is just what you need to better understand the business value of the Salesforce Platform. Overview Describe the primary business value of each major Salesforce Cloud. Manage users and data. Manage basic org configuration. Create email templates. Create reports and dashboards. Apply and champion Chatter. Understand the Salesforce implementation and maintenance lifecycle. Extend Salesforce functionality beyond basic configuration. Explore what?s possible with Salesforce. In this 3-day class, our Salesforce experts will walk you through the Salesforce Platform, its specific applications, and their business values and benefits. Familiarize yourself with Salesforce Cloud, and learn about platform features and processes to more effectively support day-to-day Salesforce operations within your organization. Through interactive lectures, discussions, and hands-on exercises, you?ll recognize the core elements of the implementation lifecycle, the key considerations to drive user adoption, and the important components of ongoing management of your Salesforce environment. Introduction Understand How Salesforce Works Explore Salesforce Applications Review Salesforce Organization Data Access and Security Control Org Access Manage Who Views and Modifies Objects Unlock Access to Records Share Access to Records Lock Down Individual Fields User Management and Troubleshooting Create New Users Troubleshoot Login, Record Access, and Field Visibility Issues Salesforce Customizations Think About Your Implementation Explore Custom Fields, Picklists, Page Layouts, and Record Types Create Email Templates Business Processes Automation Review Validation Rules Review Assignment and Escalation Rules Review Web-to-Lead and Entitlements Review Lightning Process Builder and Workflow Review Approval Processes and Visual Workflow Reports Explore the Reports Tab, Folders, and Formats Explore the Report Builder Summarize Your Data Dashboards and Data Insights Get More Insight from Your Data Visualize Your Data with Dashboards Create Your Analytics Strategy Everyday Salesforce Collaborate with Chatter, Groups, and Communities Share Feedback with Chatter Answers and Ideas Go Mobile with Salesforce1 Make Salesforce Part of Your Day Data Management Create a Data Migration Strategy Ensure Data Quality Extending Salesforce Drive a Salesforce Implementation Customize Salesforce Using Custom Objects, Apps, and the Salesforce AppExchange Build It Yourself Wrap-up and Certification Review the Certification Process and Resources
Duration 5 Days 30 CPD hours This course is intended for This class is targeted towards the professional developer new to HTML, self-taught HTML developers, graphics designers and those new to HTML development. Overview After completing this course, you will be able to: Create HTML5 compliant web pages. Test and validate HTML and CSS code. Create CSS for style pages. Work with experimental vendor prefixes. Work with fonts and CSS font effects. Work with color and color tools. Layout pages and content using DIVs, iFrames and Tables. Add and format images and CSS sprites. Create HTML5 forms. Embed and manage video and audio content. This course is an in-depth hands-on study of HTML5, CSS3 and modern web and mobile development. The course includes detailed hands-on labs and Q&A labs. The labs include multiple projects, including one beginning to end web site.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Brief History of HTML and the Web Welcome! History Details, Details, Details? The Life of a Web Page HTTP Status Codes Definitions Most Important Things to Know as a Web Developer Module 2: Core HTML Elements HTML and CSS Editors Text, Spaces and Tabs Working with Tags Attributes Comments Non-Standard Tags Every Page Includes? File Extensions Core Page Elements Nesting Testing HTML HTML and Text Module 3: Cascading Style Sheets Before CSS With CSS Cascading Style Sheets (CSS) Adding CSS to a Page Order of CSS Processing Experimental Vendor Prefixes CSS Units The CSS Box Mode Module 4: Fonts and Text Fonts CSS for Text CSS Text Ticks! Working with Lists Upgrading and to Windows 7 Module 5: Colors and Backgrounds Specifying Colors Applying Colors Gradients Module 6: Anchors and Hyperlinks HTML and CSS Hyperlinks with Images and Other Objects Buttons Module 7: Page Layout Page Layout Options Tables for Data DIVs Float SPAN HTML 5 DIV-like Tags IFRAMES Module 8: Images Favicon Preparing Images Image Files The IMG Tag Background Images Image Best Practices CSS Sprites Module 9: HTML Forms A Basic Form POST vs. GET name vs. id Basic Form Elements Basic Form Attribute Select Uploading Files HTML 5 Form Enhancements DataList Module 10: Multimedia Video and Audio HTML 5 Video CSS JavaScript Audio Hosting Videos in the Cloud Working with Animated GIFs
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for software testers, architects, engineers, or other related roles, who wish to apply AI to software testing practices within their enterprise. While there are no specific pre-requisites for this course, it would be helpful is the attendee has familiarity with basic scripting (Python preferred) and be comfortable with working from the command line (for courses that add the optional hands-on labs). Attendees without basic scripting skills can follow along with the hands-on labs or demos. Overview This course introduces AI and related technologies from a practical applied software testing perspective. Through engaging lecture and demonstrations presented by our expert facilitator, students will explore: Exploring AI Introduction to Machine Learning Introduction to Deep Learning Introduction to Data Science Artificial Intelligence (AI) in Software Testing Implementing AI in Test Automation Innovative AI Test Automation Tools for the Future Implementing AI in Software Testing / AI in Test Automation is an introductory-level course for attendees new to AI, Machine Learning or Deep Learning who wish to automate software testing tasks leveraging AI. The course explores the essentials of AI, ML and DL and how the integrate into IT business operations and initiatives. Then the course moves to specifics about the skills, techniques and tools used to apply AI to common software testing requirements. Exploring AI AI-Initiatives The Priority: Excellence AI- Intelligence Types The Machine Learning Types The Quality Learning Initiative The Inception in Academics AI - Importance & Applications The Re-visit Learning Re-visited via AI Teaching in the world of AI Exploring AI for Self-Development AI In Academics Beyond Academics Introduction to Machine Learning What is Machine Learning? Why Machine Learning? Examples - Algorithms behind Machine Learning Introduction to Deep Learning What is Deep Learning? Why Deep Learning? Example - Deep Learning Vs Machine Learning Introduction to Data Science What is Data Science? Why Data Science? Examples - Use Cases of Data Science Artificial Intelligence (AI) in Software Testing What is AI in Software Testing? The Role of AI Testing Why do we Need AI in Software Testing? Pros and Cons of AI in Software Testing Applications of AI in Software Testing Is it time for Testers or QA Teams to worry about AI? Automated Testing with Artificial Intelligence Implementing AI in Test Automation Training the AI Bots Challenges with AI-powered Applications Examples - Real World use cases using Artificial Intelligence Demo - Facial Emotion Detection Using Artificial Intelligence Demo - Text Analysis API Using Artificial Intelligence Demo - EYE SPY Mobile App Using Artificial Intelligence Innovative AI Test Automation Tools for the Future Tools used for Implementing AI in Automation Testing What is NEXT? AI Test Automation Demo using Testim