Duration 4 Days 24 CPD hours This course is intended for Application Consultants and Technical Consultants Overview Understand and have a clear overview of SAP MIIUnderstand SAP MII data, service enablement, messaging, visualization, and business logic servicesUse SAP MII tool to integrate various data from different data sources (Synchronous and Asynchronous)Use SAP MII to connect manufacturing shop floor system and SAP ERP system in addition to XML functions and document buildingUse SAP MII new features: Self-Service Composition Environment, Manufacturing Data Objects, Plant Information Catalog, KPI and Alert Frameworks This is a fundamental course students should take in order to gain an understanding of the SAP MII product, which is the foundational product of SAP Connected Manufacturing. Course Outline Introduction to SAP MII SAP MII Administration and linkages to NetWeaver Administration Data Server and Enterprise Configuration Navigation and Home Page Themes Developing with SAP MII Workbench & Self-Service Composition Environment (SSCE) Query & HTML5 Display Templates Time Engine MII HTML5 JavaScript functions MII Reporting and Localization Business Logic Services (Basics) Plant Information Catalog and SAP Plant Connectivity KPI and Manufacturing Data Objects (MDO) Alerting Framework Additional course details: Nexus Humans SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who have experience with IBM Spectrum Protect. Overview After completing this course, you should be able to: Describe a multi-server IBM Spectrum Protect storage environment. Manage storage containers and traditional storage pools. Configure a multi-server environment. Improve data protection and recovery with replication. Enable advanced client functions. Protect and monitor the IBM Spectrum Protect environment. Use scripting to automate daily processing. Optimize the IBM Spectrum Protect server and client. Troubleshoot common problems. Describe the other IBM Spectrum Protect family products. IBM Spectrum Protect, formerly known as IBM Tivoli Storage Manager, is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using objectbased data management, policy-driven retention, and an easy to use interface, the Operations Center.In this advanced-level course, you streamline your daily operations with the latest features, such as using Retention Sets for data retention, and using the Web Client 2.0 to restore data. You use the Operations Center and administrative command line to manage multiple IBM Spectrum Protect servers and nodes. This course also includes scripting, performance tuning, restoring the database and storage, and an overview of integration with IBM Spectrum Protect Plus 10.1.6. The hands-on exercises are performed on two Windows 2016 R2 virtual machines.This course is the second in a two-course series. It is for storage administrators familiar with the daily management of IBM Spectrum Protect, and focuses on the latest features, such as container pool storage. Basic concepts and installation are not covered in this course. TS618G, the first course in the series, IBM Spectrum Protect 8.1.9 Implementation and Administration, covers basic administration and installation. Unit 1 The IBM Spectrum Protect 8.1.11 environment Unit 2 Storage pool management overview Unit 3 Multi- server management Unit 4 Recovery and long-term retention Unit 5 Client functions and management Unit 6 Daily maintenance and monitoring Unit 7 Automation and scripting Unit 8 Tuning the server and client for optimization Unit 9 Troubleshooting and recovery
Duration 2 Days 12 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for vRealize Suite Lifecycle Manager Describe the architecture of vRealize Suite Lifecycle Manager Deploy and configure vRealize Suite Lifecycle Manager Create, manage, and scale vRealize Suite Lifecycle Manager environments Add VMware vRealize Suite products to vRealize Suite Lifecycle Manager Manage vRealize Suite products with vRealize Suite Lifecycle Manager Use vRealize Suite Lifecycle Manager to perform content lifecycle management Troubleshoot day-to-day operations of vRealize Suite Lifecycle Manager This two-day course features hands-on training that focuses on installing, configuring, and managing VMware vRealize© Suite Lifecycle Manager?, which includes products such as VMware vRealize© Operations?, VMware vRealize© Log Insight?, and VMware vRealize© Automation?. This course prepares you to administer a vRealize infrastructure for an organization. Course Introduction Introductions and course logistics Course objectives Introduction to Lifecycle Manager Describe the use cases for Lifecycle Manager List the features of Lifecycle Manager List system requirements for Lifecycle Manager Use vRealize Easy Installer to deploy Lifecycle Manager Verify that a Lifecycle Manager deployment is successful Lifecycle Manager Configuration Create SSL certificates for vRealize Suite product instances Import custom SSL certificates Add Lifecycle Manager infrastructure elements Create a Lifecycle Manager private cloud environment Add vRealize Suite product Installation media Adding vRealize Suite Applications Deploy a new vRealize Suite product Manage a vRealize Suite product using Lifecycle Manager Add an existing vRealize Suite product to an environment Day 2 Operations Perform On-going Management Tasks Monitor environment health Ensure product configuration compliance Scale-out VMware Identity Manager? Replace an existing certificate with a new one Manage SDDC content Perform source control Describe content pipelines Describe check-in and multi check-in feature Use content from Marketplace Lifecycle Manager Migration List the migration options available for Lifecycle Manager Migrate Lifecycle Manager using vRealize Easy Installer Troubleshooting Lifecycle Manager Access log files in Lifecycle Manager Configure the vRealize Log Insight Agent Use tools and log data to troubleshoot common problems
Duration 4 Days 24 CPD hours This course is intended for This in an intermediate level Java development course geared for students experienced with Java 8 or later programming essentials who wish to quickly get up and running with advanced Java skills. This course does not cover Java programming fundamentals. Overview Students will leave this course armed with the required skills to improve their Java applications using sound coding techniques and best practices. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in advanced development skills, coupling the most current, effective techniques with the soundest industry practices. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Develop modular applications in Java Utilize the tooling that is provided in Java 9 to migrate, monitor and optimize applications Use the new JShell tool to quickly test java constructs Understand how the implementation of the String class has been updated to decrease the memory footprint Use the enhancements made to the Concurrency API, working with Completable Future instance of Thread pools Specific Java 9 features that are covered in the course include: The Java Module System (project Jigsaw) JShell Updated try-with-resources Performance enhancements in Java 9 Multi-Release Jar files This fast-track course is designed for experienced developers who have prior working knowledge of basic Java 8 or Java 9 and want to take advantage of the newest features of Java 9 that can help improve performance and functionality of Java 9 applications. You will gain invaluable insight into how to leverage Modules, scale applications into multi-core environments, improve performance, and become a more effective Java 9 developer. Java 9 Updates Review of What is New in Java 9 Milling Project Coin The Java Module system (Jigsaw) Why JigSaw? Introduction to the Module System The Module Descriptor Working with Modules JShell JShell More Java 9 Other New Java 9 Features Performance Optimizations Memory Management (Optional) Multithreading and Concurrency Multithreading Concurrent Java Java 8 Concurrency Updates Reflection and References Introspection and Reflection Reference Objects Effective Java Objects, Declarations, and Initializations Exceptions Writing High-Performance Applications Profiling and Benchmarking Profiling Tools Code Optimization Techniques Code Optimization Myths Design Optimization Techniques
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is people who are moving into a database role, or whose role has expanded to include database technologies. Developers that deliver content from SQL Server databases will also benefit from this material. Overview Describe key database concepts in the context of SQL Server Describe database languages used in SQL Server Describe data modeling techniques Describe normalization and denormalization techniques Describe relationship types and effects in database design Describe the effects of database design on performance Describe commonly used database objects This three-day instructor-led course is aimed at people looking to move into a database professional role or whose job role is expanding to encompass database elements. The course describes fundamental database concepts including database types, database languages, and database designs. This course updates and replaces course 10985C previously published under the same title. 1 - Introduction to databases Introduction to Relational Databases Other Databases and Storage Data Analysis SQL Server Database Languages 2 - Data Modeling Data Modelling Designing a Database Relationship Modeling 3 - Normalization Fundamentals of Normalization Normal Form Denormalization 4 - Relationships Introduction to Relationships Planning Referential Integrity 5 - Performance Indexing Query Performance Concurrency 6 - Database Objects Tables Views Stored Procedures, Triggers and Functions Additional course details: Nexus Humans 55313 Administering Configuration Manager, Part 1: Fundamentals and Asset Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55313 Administering Configuration Manager, Part 1: Fundamentals and Asset Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events Introduction to ISO 22301 and initiation of a BCMS Training course objectives and structure Standards and regulatory frameworks Business continuity management system (BCMS) Fundamental business continuity concepts and principles Initiation of the BCMS implementation Understanding the organization and its context BCMS scope Implementation plan of a BCMS Leadership and commitment Business continuity policy Risks, opportunities, and business continuity objectives Support for the BCMS Business impact analysis Risk assessment Implementation of a BCMS Business continuity strategies and solutions Business continuity plans and procedures Incident response and emergency response Crisis management Exercise programs Monitoring, measurement, analysis, and evaluation Internal audit BCMS monitoring, continual improvement, and preparation for the certification audi Management review Treatment of nonconformities Continual improvement Preparation for the certification audit Closing of the training course
Duration 2 Days 12 CPD hours This course is intended for This course is a must-have for the Business Analyst, Business Systems Analyst, Systems Analyst, and Requirements Engineer. The Business Sponsor and the Project Manager who are actively involved with specifying requirements for their project will also benefit from this workshop. Overview Describe the planning, techniques, and partnerships that are vital to the success of requirements elicitationIdentify and differentiate between the different types of requirements that need to be elicitedDescribe the importance of documenting business objectives and project scope before eliciting requirementsUtilize a context diagram to scope the requirementsUtilize a process, techniques, and templates for stakeholder identification and analysisApply industry best practices to common issues with Stakeholders during requirements elicitationPlan and conduct a good InterviewIntroduce standards in process modelingPlan and develop a prototype to elicit requirements In this interactive 2-day course, you will learn how to enhance and refine your elicitation skills. Working in small groups, you will practice new techniques and discuss strategies that your organization should be using to better define stakeholder needs. Day 1 Unit 1: Course Introduction Unit 2: Fundamentals of Requirements Elicitation Unit 3: Understanding the Project Objectives and Scope Unit 4: Identifying and Analyzing Your Stakeholders Unit 5: Interviewing Techniques Day 2 Unit 6: Facilitation Techniques Unit 7: Process Modeling Unit 8: Prototyping Unit 9: Document Analysis, Interface analysis, and Reverse Engineering Unit 10: Course Summary Additional course details: Nexus Humans BA26 - Requirements Elicitation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA26 - Requirements Elicitation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence