• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27949 OV courses delivered Online

GTS200 Configuring SAP Global Trade Services

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Project Team Members Consultants Overview This course will prepare you to: Configure selected application areas of Compliance Management, Customs Management and Risk Management. This course covers selected application areas of Compliance Management, Customs Management and Risk Management. Course Outline Communication between SAP ERP and SAP Global Trade Services Basic mapping settings Definition and activation of legal regulations Configuration of legal control Configuration of customs processing Configuration of preference determination and vendor declaration management Additional course details: Nexus Humans GTS200 Configuring SAP Global Trade Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GTS200 Configuring SAP Global Trade Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GTS200 Configuring SAP Global Trade Services
Delivered OnlineFlexible Dates
Price on Enquiry

SCM200 SAP Business Processes in Planning (SCM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Enterprise Architects, and Solution Architects. Overview The course introduces you to the concepts and procedures of supply chain planning in SAP SCM (APO).It demonstrates how to forecast future sales and the release of the forecast.The course outlines the different possibilities to create feasible plans for cross-location planning and to achieve a finite detailed plan for certain plants. *You determine feasible stock transfers with deployment functionality and confirm sales orders using Global Available- to-Promise. In this course, students will get to know the concepts and processes of supply chain planning in SAP SCM (APO). This foundation knowledge is mandatory in order for students to have the confidence to complete the subsequent configuration courses. Supply Chain Planning Defining Supply Chain Planning Outlining Supply Chain Planning Master Data & Transaction Data Outlining Supply Chain Master Data Outlining Master Data Mapping Integrating Transaction Data in Supply Chain Planning Demand Planning Outlining Demand Planning (DP) Executing Demand Planning Releasing the Demand Plan Cross-Location Planning Outlining Supply Network Planning (SNP) Integrating Supply Network Planning Applying Cross-Location Planning Procedures Production Planning and Detailed Scheduling Outlining Production Planning and Detailed Scheduling (PP/DS) Applying Production Planning and Detailed Scheduling Deployment and Availability Check Planning Deployment Checking the Availability of Customer Demand New User Interfaces for SAP SCM Identifying the Functionality of Developments in SAP SCM

SCM200 SAP Business Processes in Planning (SCM)
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Power Apps: Building Low-Code Business Apps

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for skilled users of Microsoft Windows and Office who do not have prior coding or programming experience and who are interested in creating custom business apps quickly and without writing application code. Overview In this course, you will use Microsoft Power Apps to build and deploy low-code business apps. You will: Determine how Microsoft Power Apps can meet your business needs. Plan and design apps. Build canvas apps. Build model-driven apps. Test and deploy apps. This course introduces building low-code/no-code apps with Microsoft© Power Apps©. Most out-of-the-box solutions do not meet exact business needs or integrate well with existing business apps. Power Apps eases users into app development with templates, automated app-building tools, and a streamlined programming language to enable any business user to create a custom app. Getting Started with Microsoft Power Apps Topic A: Introduction to Microsoft Power Platform Topic B: Introduction to Power Apps Topic C: Select App Types to Address Business Needs Planning and Designing Apps Topic A: Plan Apps Topic B: Design Apps Building Canvas Apps Topic A: Create an App from a Blank Canvas Topic B: Create an App from a Template Building Model-Driven Apps Topic A: Create Model-Driven Apps Topic B: Add Visualizations and Reports Testing and Deploying Apps Topic A: Make Apps Available to Other Users Topic B: Test Apps Topic C: Revise Apps

Microsoft Power Apps: Building Low-Code Business Apps
Delivered OnlineFlexible Dates
Price on Enquiry

Programming for Network Engineers (PRNE)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course Outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary

Programming for Network Engineers (PRNE)
Delivered OnlineFlexible Dates
Price on Enquiry

Mac Integration Basics 10.15

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers

Mac Integration Basics 10.15
Delivered OnlineFlexible Dates
Price on Enquiry

WA190 Administering WebSphere Application Server Liberty Profile V9

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for administrators of IBM WebSphere Application Server Liberty Profile. Overview After completing this course, you should be able to: Describe the WebSphere Liberty Profile architecture Create a Liberty profile server Use the Admin Center to manage Liberty servers Deploy clusters of Liberty servers Use the collective controller Use Jython scripts to administer Liberty servers Configure Dynamic Routing Configure the auto scaling feature and define auto scaling policies Configure SSL communication in Liberty Use the IBM HTTP and web server plug-in with Liberty servers his course teaches you the skills that are needed to manage Liberty servers and collectives.The course is designed for application server administrators. You learn how to use the graphical Admin Center and the command line scripting to manage servers from a collective controller. The course also covers how to deploy a cluster of packaged servers for Liberty runtimes, view the deployment environment, and view basic performance metrics.You learn how to use the Dynamic Routing feature of Liberty to enable routing of HTTP requests to collective members. You also configure the auto-scaling and health management features for Liberty.Finally, you learn how to secure Liberty and enable SSL communication in Liberty. Course introduction Introduction to Liberty administration and runtime architecture Multi-server management Exercise: Managing Liberty collectives with the Admin Center Administration and application deployment with scripting Exercise: WebSphere Liberty administration by using Jython Scripts Dynamic Routing Exercise: Dynamic Routing Auto-scaling in Liberty Exercise: Auto-scaling Securing Liberty Exercise: Using the IBM HTTP Server with SSL to a Liberty server Course summary

WA190 Administering WebSphere Application Server Liberty Profile V9
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)

FortiGate Security
Delivered OnlineFlexible Dates
Price on Enquiry

CyberSAFE: Staying Safe in a Digital World

By Nexus Human

Duration 0.25 Days 1.5 CPD hours This course is intended for This course is intended for individuals who want to learn how to stay safe online. Overview Upon successful completion of this course, students will be able to understand how to avoid social engineering and stay safe online. In this course, students will learn how to use the internet safely, and learn traps to avoid. The need for security Compliance Recognize social engineering and other attacks Secure Devices Passwords Identify viruses and malware Use the Internet safely Browsing the web Email Social media Cloud services Additional course details: Nexus Humans CyberSAFE: Staying Safe in a Digital World training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CyberSAFE: Staying Safe in a Digital World course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CyberSAFE: Staying Safe in a Digital World
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Infrastructure 7.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate devices should attend this course. This course assumes knowledge of basic FortiGate fundamentals. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Understand the fundamentals and benefits of using ZTNA Offer an SSL VPN for secure access to your private network Establish an IPsec VPN tunnel between two FortiGate devices Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Diagnose and correct common problems In this two-day course, you will learn how to use the most common FortiGate networking and infrastructure features. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, redundant infrastructure, virtual domains (VDOMs), zero trust network access (ZTNA), SSL VPN, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Course Outline 1. Routing 2. Virtual Domains 3. Fortinet Single Sign-On 4. ZTNA 5. SSL VPN 6. IPsec VPN 7. High Availability 8. Diagnostics

FortiGate Infrastructure 7.2
Delivered OnlineFlexible Dates
Price on Enquiry