Duration 5 Days 30 CPD hours This course is intended for Motivations: Quickly learn the foundations of containerization and orchestration with Docker Swarm, and become familiar with all the features of Docker Enterprise. Roles: System Operators & Administrators Overview This course combines all topics of CN100 , CN110 , CN210 In this intense cloud native bootcamp, you?ll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible. In this intense cloud native bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible.
Duration 5 Days 30 CPD hours This course is intended for Motivations: Use and manage containers from first principles & architect basic applications for Kubernetes Roles: general technical audiences & IT professionals CN251 is an intensive cloud native training bootcamp for IT professionals looking to develop skills in deploying and administering containerized applications in Kubernetes. Over the course of five days, students will start with learning about first principles for application containerization followed by learning how to stand up a containerized application in Kubernetes, and, finally, ramping up the skills for day-1 operating tasks for managing a Kubernetes production environment. CN251 is an ideal course for those who need to accelerate the development of their IT skills for a rapidly-changing technology landscape. Additional course details: Nexus Humans Cloud Native Operations Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Native Operations Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Application Consultants, Developers, System Administrators, and System Architects Overview Understand the need for an enterprise portalLog on to, navigate, and personalize the portalDescribe the components of SAP Enterprise PortalBuild-up a portal navigation structureAdapt the portal user interface to company specificationsExplain and use the main functions of the SAP Enterprise Portal, Knowledge Management and CollaborationExplain and use the community features of the portal add-ons Forums and WikisExplain and use the SAP Fiori Launchpad on Portal' In this course, students will gain knowledge of the basic fundamentals surrounding the SAP Enterprise Portal. Enterprise Portal Explaining Business Motivations for Portals Describing SAP NetWeaver Explaining the Basics of SAP Enterprise Portal The End User's Perspective Logging On and Navigating in SAP Enterprise Portal Personalizing SAP Enterprise Portal Technical Infrastructure Determining System Requirements Outlining SAP Enterprise Portal's Architecture Portal Platform Content Explaining the Object Model for Portal Content Managing iViews Managing Portal Pages Managing Worksets and Portal Roles Explaining Business Packages Outlining Portal Content Development Tools Translating Portal Content Look and Feel of the Portal Managing Portal Themes Managing Framework Pages Managing Portal Desktops Managing Portal Rules (Rule Collections) Security Aspects Identifying Security Aspects Managing Users and Authentication Options Describing Authorization Concepts Describing Single Sign-On (SSO) Evaluating Network Security Knowledge Management (KM) Outlining Knowledge Management (KM) Describing Content Management (CM) Functions Using Web Page Composer (WPC) Describing Search and Classification (TREX) Enterprise Workspaces Explaining Enterprise Workspaces Managing Personal Workspaces Managing Shared Workspaces Collaboration Outlining Collaboration Functions Using Forums Using Wikis Fiori Launchpad on the Portal Outlining SAP Fiori Launchpad on Portal Additional course details: Nexus Humans SAPEP SAP Enterprise Portal - Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAPEP SAP Enterprise Portal - Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Conflict is a word that conjures up many emotions. It is something that most people would prefer to avoid, if possible. Work can be an emotive place. Positive relationships can make your life at work exciting, motivating and challenging, whilst relationships that do not hold value to you could make your life very difficult and stressful, especially if there is conflict between you and your manager. This course is essential for people who want to understand where conflict can be used to positive effect and how to manage conflict in your working relationships and see it as something positive that can stimulate the environment. Research has shown that relationships at work are an extremely high motivational factor, and for a lot of people it has a higher importance that salary! Therefore, it is essential that we invest in relationships and search out new ways to make them better in order to have a more positive influence on our surroundings. By understanding why other people are in conflict we can manage the conversation a lot better, with outcomes managed more effectively so the 'conflict' will add value to the organisation. This participative event will cover a wide variety of exercises and personal stories, and leave course participants with a clear strategy to identify when they are in conflict with someone and how they will structure their approach to get to a satisfactory outcome. This is a workshop that targets anyone where conflict needs to be managed and cannot seem to resolve it, whether internally or externally. At the end of the day, participants will: Know their key relationships and the strength of those relationships Complete the Strengths Deployment Inventory (SDI) to identify where you deploy your strengths Understand what is important to you and your key stakeholders Know how motivational value systems can influence behaviour Tailor your communication style to match that of your opposite party Know conflict strategies to resolve conflict in others Learn to be more assertive when challenging Achieve key personal, departmental and organisational objectives 1 Where are you now? How effective are your current working relationships? Can I work effectively without the input from others? Who do you need to be a success? 2 The Strengths Deployment Inventory (SDI) Completion of the SDI questionnaire An understanding of the theory A 'trip around the triangle' Predicting relationship interaction Your scores and what they mean in your relationships 3 Conflict theory What is conflict? The 3 flags of conflict What are your conflict triggers? Your conflict scores plotted The conflict sequence 4 Conflict resolution strategies Early warning signs Most productive behaviours Least productive behaviours Preventable / unwarranted conflict Review of the dynamic triangle Review of the day, personal learning and action planning
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
It's a fact of life that costs generally increase and as a result prices must go up too. Implementing an increase without losing customers is challenging. Talking about a price increase with customers never makes for an easy conversation. Your customers will generally decide whether to accept the increase based upon value, as well as the hassle cost of switching and going elsewhere. Even the most experienced salesperson who has implemented price increases before will be fighting back the nerves when faced with the task of 'selling' the increase. In this flexible programme, we will support your internal preparations at whichever stage you and your colleagues are at. From making the decision to increase prices, right through to those on the frontline already dealing with any push-back. This programme will help participants: Understand the business case for increasing prices Take steps to research the market Consider their customers' motivations Use the six principles of influence Identify and adapt for different personality styles Assess their level of trust with customers Build rapport rapidly with their customers and prospects 1 Raising prices - keys to success Understanding the business case Researching the market Assessing the value of your offering 2 Understanding your customer base Assessing your key accounts What is your 'target' customer range? Creating consistency in pricing approach 3 Planning the increase Timing your implementation Communication strategy Elements of a good price increase letter 4 Developing influencing skills The Trust Equation The six principles of influence Discovering your customer's buying decisions 5 Emotional intelligence and price increases The part emotion plays Developing strategies for keeping calm Handling your customer's responses 6 Understanding different customer styles Discover your own style Recognising behaviour traits in others Adapting your approach to their style 7 Preparing for customer contact Preparing for specific customers Anticipating their response Dealing with challenging customers 8 Following through Maintaining a consistent approach Resisting requests for discounts Confirming the increase in writing
This very practical one-day IACCM-approved programme enables participants to manage the process of commercial contracting and contract management effectively and efficiently to ensure value for money, improved service, and appropriate relationships. It covers a wide range of contract types in terms of risk and value. The programme empowers participants with the tools and techniques needed to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the total process of managing contracts Exploit opportunities to extract even more added value Develop appropriate relationships with contractors Understand and use a range of contracting strategies and options Measure and improve contract performance Understand the impact of legislation on contract performance 1 Welcome Introductions Aims and objectives Plan for the day 2 Contract management An overview of the contracting process, mapping the 'territory' 3 Contract managers Skills Knowledge Attributes Responsibilities 4 Critical success factors Defining successful outcomes Effective stakeholder engagement Creating a shared vision of the outcomes 5 Placing contracts How to develop an effective specification and scope of work documents How to develop a robust contracting strategy Appropriate types of contract 6 Customers and stakeholders Customer and stakeholder analysis Managing expectations and the 'shared vision' concept to ensure customer co-operation, satisfaction, and delight 7 Working with suppliers Creating and developing commercial relationships Types of relationship How to manage difficult relationships Contractor motivational issues How to use incentives 8 Negotiation and related skills Introduction to key negotiation skills Persuading and influencing skills to work with stakeholders to improve outcomes for all 9 Dealing with change Claims and variations How to challenge contractor claims and requests for variations by making use of contractual terms Specifications to prevent false claims 10 Performance improvement How to measure and improve contractor performance Developing KPI systems Using contractual terms and conditions and basic legal principles 11 Contract close The importance of effective contract close processes 12 Close Review of key learning points Personal action planning
It is important for Officers to understand the roles and responsibilities, processes and procedures involved when working with Elected Members. They also need to appreciate the significance of Elected Members as the decision-makers in local government. Officers have a responsibility to work and communicate with Elected Members effectively. This very successful course is designed to help Officers with this. Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. To provide managers with the knowledge and understanding they need to have productive working relationships with Elected Members and provide appropriate support. By the end of the course participants will: Understand the roles, responsibilities, processes and procedures in place for working with Elected Members Be able to identify the best way to approach potentially sensitive issues Understand the skills and behaviours required for working effectively with Members Be able to deploy their influencing skills more successfully Review their learning and have an action plan to take back and implement at work Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. 1 Introduction Welcome and introductions Objectives and programme overview 2 Working in a political environment What is political awareness? Contact and experience with Members Importance of the role of Members 3 Why be an Elected Member? Perceptions of what Elected Members are and do Values of Members and their motivations for doing what they do 4 Political decision-making in local government Current challenges and drivers affecting the organisation / the council Roles and responsibilities of Officers and Members Centrality of Members' strategic role 5 (Option) A day in the life of an Elected Member An Elected Member gives a talk about what they do 6 Having a beneficial relationship between Officers and Members 7 Member / Officer communication Discussion of the formal processes, service procedures, etc (whether enshrined in a protocol, Memorandum of Understanding, etc) Response times and requirements Procedures required by Heads of Service [if appropriate] 8 Influencing styles and strategies Different forms of power and how they impact Developing an appropriate 'influencing style' Exploring strategies for improving communication and influencing at work 9 Review and evaluation Review and evaluation of learning Personal action plans