• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

13278 Organ courses delivered Online

BA05 - Process Modeling Using BPMN

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Project Managers, Business Analysts, Business and IT stakeholders working with analysts Overview Provide a solid foundation for applying business process modeling principles and best practices with BPMN Demonstrate how to solve practical business problems using BPMN Business Process Diagrams (BPDs) Students will learn to map business processes easily and efficiently using the industry standard - BPMN which stands for Business Process Modeling Notation from the Object Management Group (OMG). Students will learn the best practices in process mapping using the latest industry standards (BPMN) so that both the business and IT stakeholders will be able to understand the models and map processes consistently through-out their organization. Introduction What is Business Process Modeling? What is Business Process Modeling Notation (BPMN)? Benefits of BPMN An Overview of Governance An overview of governance Key governance questions to ask What happens if you don?t have effective governance? Mapping the Business Problem Define a strategic outcomes map Define a Business model and relevant processes Modeling Simple BPMN Structures When do you use BPMN? What are simple BPMN structures? AS-IS vs. TO-BE modeling Modeling Complex BPMN Structures What are complex BPMN structures When to use complex BPMN structures Analyzing Process Models Identifying poor process models Creating process models that everyone can understand Identify criteria for a well-defined process Process Mapping vs. Process Modeling Determine when to create a process map Determine when to create a process model Asking the four ?Ares? Additional Resources Learning about BPMN 2.0 More useful BPMN links BPMN 2.0 free editors

BA05 - Process Modeling Using BPMN
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security 7.2

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric

FortiGate Security 7.2
Delivered OnlineFlexible Dates
Price on Enquiry

Strategic Negotiation Skills

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals involved in internal and/or external negotiations will benefit from this course. Overview Develop the necessary skills to negotiate like a pro Prepare for a negotiation applying best practices Utilize industry-standard tools and techniques Create your Best Alternative to a Negotiated Agreement (BATNA) Build common ground and consensus in your negotiation strategies Negotiate with experts to develop your skills for success Students will learn the essential strategies and techniques needed to guide negotiations from opening discussions through to a positive result. Students will leave with practical solutions to negotiating effectively. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Negotiation Introduced Identifying Integrative and Distributive Negotiation Types Understanding the Three Phases of Negotiation Strengthening Negotiation Skills 2. Preparing for Your Negotiation Establishing Personal Boundaries Deciding on Your WATNA and BATNA and Negotiating Based on Them Preparing and Sticking to Your Plan Negotiation Strategies 3. Negotiation Process for Success Setting the Time and Place Avoiding Negative Environments Establishing Common Ground and Building Momentum Creating a Negotiation Framework, Agreeing on Issues, and Maintaining a Positive Framework Working through the Five Steps of Negotiation 4. Best Practices Starting Off on the Right Foot What to Share and What to Keep to Yourself Knowing What to Expect Utilizing the Top Ten Negotiation Techniques Managing an Impasse 5. Negotiation Tools & Techniques Reviewing the Three Ways to See Your Options Creating a Mutual Gain Solution Agreeing on Wants - Working with What You Want and What They Want 6. Consensus & Agreement Building Consensus Consolidating and Finalizing an Agreement Controlling Your Emotions and Dealing with Personal Attacks Walking Away When Necessary

Strategic Negotiation Skills
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Dynamics CRM 4.0 User Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for individuals or anyone that plans to implement, use, maintain, or support Microsoft CRM in their organization. Overview After completing this course, students will be able to: Microsoft CRM User Interface and application terminology, Basic and advanced navigation and record maintenance, Microsoft CRM Client for Outlook functionality and synchronization, Planning and budgeting tasks related to marketing campaigns, Create and manage customer lists This three-day instructor-led course provides students with the knowledge and skills to improve their business processes by using the key features of sales management, marketing automation, service management, and service scheduling. This three-day instructor-led course provides students with the knowledge and skills to improve their business processes by using the key features of sales management, marketing automation, service management, and service scheduling. Additional course details: Nexus Humans Microsoft Dynamics CRM 4.0 User Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Dynamics CRM 4.0 User Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Dynamics CRM 4.0 User Training
Delivered OnlineFlexible Dates
Price on Enquiry

SAP01 SAP Overview

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for All persons interested in getting an overview of SAP?s Business Suite solutions. Overview Identify SAP Applications and ComponentsExplain basic functionality of SAP SolutionsAttend more detailed SAP courses and have the required baseline knowledge In this course, students identify SAP applications and components, as well as learn how to explain basic functionality of SAP Solutions. SAP - A Cloud Company Identifying SAP Applications and Components Outline the Functionality of SAP Cloud-Enabling Applications Outlining New SAP Functionality Outline the usage and functionality of SAP HANA Outline the usage and functionality of Cloud for Customer Describe the various aspects of SAP User Experience SAP System Navigation Accessing the SAP System Personalizing the User Interface System-Wide Concepts Identifying SAP Organizational and Master Data Elements Logistics Creating a Purchase Order for Materials Using Supplier Relationship Management (SRM) for Procurement and Sourcing Processes Integrating Ariba Functionality with Procurement in SAP Enterprise Resource Planning (ERP) Creating a Planned Order Processing Production Orders Using Supply Chain Management (SCM) to Manage Supply and Demand Creating Sales Orders Creating a Delivery and Posting a Goods Issue Creating Sales Order Billing Documents Using Customer Relationship Management (CRM) Using Product Lifecycle Management (PLM) Financials Identifying Financial Accounting Processes Using Financial Add-Ons for SAP Business Suite Creating a Journal Entry in the General Ledger Outlining the Outbound Payments Process in Accounts Payable Generating Financial Statements Outlining the Inbound Process in Accounts Receivable Outlining the Business Processes in Fixed Assets Accounting Analyzing Internal Costs in Management Accounting Monitoring Manufacturing Costs Analyzing Profitability Human Capital Management (HCM) Identifying the Components of SAP Enterprise Resource Planning (ERP) HCM Outlining the HR Renewal Functionality Integrating SuccessFactors in the Cloud Analytics and Strategic Planning Executing Analytics and Strategic Planning Reports SAP Services Accessing SAP Services

SAP01 SAP Overview
Delivered OnlineFlexible Dates
Price on Enquiry

SCM500 SAP Processes in Procurement

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Participants learn about the fundamental elements of materials management.Participants understand usage of the procurement processes for stock material, consumable materials, and services, the basic functions from purchasing, inventory management, invoice verification, service entry, and materials planning.Topic-specific exercises in the SAP system give participants the opportunity to gain first-hand practical experience of the above processes. This course will give students the fundamental knowledge and a comprehensive overview of the processes in procurement in SAP. After attending this class, students will understand the major business processes and functions in materials management. Procurement Processes Defining Processes and Organizational Levels in Procurement Maintaining Purchase Orders Posting Goods Receipts Entering Invoices Master Data Maintaining Vendor Master Records Maintaining Material Master Records Using Entry Aids for Master Data Maintenance Performing Mass Maintenance Stock Material Procurement Applying Conditions in Purchasing Handling Requests for Quotations and Quotation Processes Creating Purchase Orders with Reference Maintaining Purchasing Info Records Analyzing Material Valuation Posting Goods Receipts for Purchase Orders Entering Invoices with Reference to Purchase Orders Consumable Material Procurement Purchasing Consumable Materials Creating Purchase Requisitions Creating Purchase Orders with Reference to Purchase Requisitions Entering Valuated and Non-Valuated Goods Receipts Creating Blanket Purchase Orders External Services Procurement Maintaining Master Data for External Services Ordering Services Creating Service Entries and Verifying Invoices Automated Procurement Maintaining Data for Material Requirements Planning (MRP) Maintaining Contracts and Source Lists Performing Procurement Processes Automatically Reporting and Analytics Using Standard Reports Performing Standard Analyses in the Logistics Information System Introduction to the SAP Buyer Role Assessing the Buyer Role Self-Service Procurement Examining the Functions of Self-Service Procurement

SCM500 SAP Processes in Procurement
Delivered OnlineFlexible Dates
Price on Enquiry

JSPX - Junos Service Provider Switching

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG

JSPX - Junos Service Provider Switching
Delivered OnlineFlexible Dates
Price on Enquiry

Design Thinking for Innovative Problem Solving

By Nexus Human

Duration 1.625 Days 9.75 CPD hours This course is intended for This course is designed for any business professional that leads or works on teams that identify and develop business solutions. Overview Upon successful completion of this course, students will understand the fundamentals of design thinking and be able to apply principles, methodologies and frameworks and apply them to projects. In this course, students are introduced to design thinking and its application to developing new products, services and the organization of businesses. Design thinking is a human-centric, interdisciplinary approach towards innovation. Understand Design ThinkingWhat is Process Awareness and why is it Key?How to Develop a Good Problem StatementHow to Discover User Needs How to Build Empathy with the User How to Generate IdeasHow to Select Ideas How to Create a Good PrototypeLearn from Failure Additional course details: Nexus Humans Design Thinking for Innovative Problem Solving training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Design Thinking for Innovative Problem Solving course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Design Thinking for Innovative Problem Solving
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWall Network Security Professional Course - SNSP - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices

SonicWall Network Security Professional Course - SNSP - NA
Delivered OnlineFlexible Dates
Price on Enquiry