Duration 5 Days 30 CPD hours This course is intended for This course is aimed at consultants, project managers, project team members and key users. In this course, participants learn about the fundamental business processes in sales and distribution. Participants learn how to perform the most important functions in the process chain, from presales to customer payment, in the SAP system. Course Outline Organizational structures in sales and distribution Working with the relevant master data for the processes Overview of the process chain Introduction to the availability check Sales and distribution processing with make-to-order production Complaints processing Introduction to sales and distribution reporting Additional course details: Nexus Humans SCM600 SAP Sales Order Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM600 SAP Sales Order Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for managers, supervisors, team leaders, or anyone who leads meetings as part of their job and wants to learn how to become a more effective meeting facilitator. Overview Build a foundation for a successful meeting. Prepare for a meeting. Set the stage for a meeting. Facilitate a meeting. Facilitate a specialized meeting Effective facilitators know how to take charge of meetings and lead groups toward successfully completing their work objectives. In this course, you will strategically plan meetings and create formal agendas, lead groups to generate new ideas through brainstorming events, and help people work through facilitated difficult sessions. You will also further develop your facilitation skills by leading virtual meetings and even moderating international sessions. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Lesson 1: Building a Foundation for Successful Meetings Topic A: Identify Types of Meetings Topic B: Identify Attributes of Strong Meeting Leaders Lesson 2: Preparing for a Meeting Topic A: Clarify the Purpose of the Meeting Topic B: Identify Participants Topic C: Plan Meeting Logistics Topic D: Create an Agenda Lesson 3: Setting the Stage for a Meeting Topic A: Establish a Meeting Climate Topic B: Resolve Challenging Situations Lesson 4: Facilitating a Meeting Topic A: Lead a Meeting Topic B: Make Sound Decisions Topic C: Publish Meeting Minutes Topic D: Close a Meeting Lesson 5: Facilitating Specialized Meetings Topic A: Manage a Brainstorming Session Topic B: Manage a Virtual Meeting Topic C: Manage an International Meeting
Duration 1.5 Days 9 CPD hours This course is intended for Application developers on the beginner and intermediate level seeking to create and deploy secure Android applications. Overview Understand Android software architecture. Understand Android?s security model. Build Android applications with security best practices in mind. Build more secure and more robust application that appeals to clients. This is a two-day (12 hours) professional course, which thoroughly covers the Android security model and concerns of both the developer and end-user point of view. This course is mapped for AND-802 exam. PermissionsManaging the Policy FileUsers? Data Privacy and ProtectionSecuring Storage Additional course details: Nexus Humans Android Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for administrators of IBM WebSphere Application Server Liberty Profile. Overview After completing this course, you should be able to: Describe the WebSphere Liberty Profile architecture Create a Liberty profile server Use the Admin Center to manage Liberty servers Deploy clusters of Liberty servers Use the collective controller Use Jython scripts to administer Liberty servers Configure Dynamic Routing Configure the auto scaling feature and define auto scaling policies Configure SSL communication in Liberty Use the IBM HTTP and web server plug-in with Liberty servers his course teaches you the skills that are needed to manage Liberty servers and collectives.The course is designed for application server administrators. You learn how to use the graphical Admin Center and the command line scripting to manage servers from a collective controller. The course also covers how to deploy a cluster of packaged servers for Liberty runtimes, view the deployment environment, and view basic performance metrics.You learn how to use the Dynamic Routing feature of Liberty to enable routing of HTTP requests to collective members. You also configure the auto-scaling and health management features for Liberty.Finally, you learn how to secure Liberty and enable SSL communication in Liberty. Course introduction Introduction to Liberty administration and runtime architecture Multi-server management Exercise: Managing Liberty collectives with the Admin Center Administration and application deployment with scripting Exercise: WebSphere Liberty administration by using Jython Scripts Dynamic Routing Exercise: Dynamic Routing Auto-scaling in Liberty Exercise: Auto-scaling Securing Liberty Exercise: Using the IBM HTTP Server with SSL to a Liberty server Course summary
Duration 0.25 Days 1.5 CPD hours This course is intended for This course is intended for individuals who want to learn how to stay safe online. Overview Upon successful completion of this course, students will be able to understand how to avoid social engineering and stay safe online. In this course, students will learn how to use the internet safely, and learn traps to avoid. The need for security Compliance Recognize social engineering and other attacks Secure Devices Passwords Identify viruses and malware Use the Internet safely Browsing the web Email Social media Cloud services Additional course details: Nexus Humans CyberSAFE: Staying Safe in a Digital World training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CyberSAFE: Staying Safe in a Digital World course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)
Duration 2 Days 12 CPD hours This course is intended for Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate devices should attend this course. This course assumes knowledge of basic FortiGate fundamentals. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Understand the fundamentals and benefits of using ZTNA Offer an SSL VPN for secure access to your private network Establish an IPsec VPN tunnel between two FortiGate devices Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Diagnose and correct common problems In this two-day course, you will learn how to use the most common FortiGate networking and infrastructure features. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, redundant infrastructure, virtual domains (VDOMs), zero trust network access (ZTNA), SSL VPN, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Course Outline 1. Routing 2. Virtual Domains 3. Fortinet Single Sign-On 4. ZTNA 5. SSL VPN 6. IPsec VPN 7. High Availability 8. Diagnostics
Duration 5 Days 30 CPD hours This course is intended for This course is designed for EDI End Users, Connect: End Users, Web Developers, as well as System Administrators. Overview After completing this course, students should be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course provides students with a detailed examination of Sterling B2B Integrator, which provides end-to-end enterprise integration server for dynamic real-time and near-real time business collaboration and commerce automation.This course teaches students techniques, tools and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator Exercise. About Sterling B2B Integrator Basic BPML Concepts Exercise. Basic BPML Concepts XPath Basics Exercise. XPath Basics Graphical Process Modeler (GPM) Exercise. Graphical Process Modeler (GPM) Using the GPM Exercise. Using the GPM Troubleshooting a Business Process Exercise. Troubleshooting a Business Process Introduction to Service Management Exercise. Introduction to Service Management Case Study Sterling B2B Integrator Mapping Exercise. Sterling B2B Integrator Mapping Typing Map Exercise. Typing Map Tracking System Health Exercise. Tracking System Health Best Practices Exercise. Best Practices Case Study Course Wrap Up
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, and Business Process Owner/Team Lead/Power Users. Overview Create complex Web Intelligence documents using advanced query and reporting techniques, including:Combined queries and sub-queriesCharacter and date string functionsVariables and calculation contextsLink documents using hyperlinks In this course, students will gain the comprehensive skills and in-depth knowledge needed to apply alternative query and reporting techniques when creating complex Web Intelligence documents. Web Intelligence Core Report Design Reviewing Core Report Design Concepts Comparing the Differences between Java Report Panel (JRP) and WebI Rich Client (WRC) Multiple Data Sources Synchronizing Data from Multiple Data Sources Creating Multiple Queries in a Document Synchronizing Data with Merged Dimensions Interacting with Other Data Providers Advanced Query Techniques Implementing Combined Queries Implementing Subqueries Creating a Query Based on Another Query Changing Data Sources Calculation Contexts Describing Calculation Contexts Redefining Calculation Contexts Implementing Extended Syntax Operators Implementing Extended Syntax Keywords Defining Calculation Context Formulas with Character and Date String Functions Creating Formulas with Character and Date String Functions Implementing the Right() Function Implementing the Replace() Function Implementing the SubStr() Function Implementing the Pos() Function Concatenating Character Strings Implementing Date Functions If Logic Executing If() to Group Data Executing the If() Function to Modify Calculation Behavior Hyperlinks in Web Intelligence Documents Managing Hyperlinks in Web Intelligence Documents Managing Hyperlinks in Web Intelligence Desktop and the Rich Internet Application Panel Managing Hyperlinks in the Web Intelligence Interactive Panel Additional Reporting Techniques Implementing Data Tracking Implementing Additional Report Functions