Duration 2 Days 12 CPD hours Overview Lead the transformation to Business Agility with SAFe Become a Lean-Agile Leader Understand customer needs with Design Thinking Enable Agile Product Delivery Implement Lean Portfolio Management During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework© (SAFe©) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps.Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise. During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework (SAFe) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps. Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise.
Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Describe the Cisco IOS XR 64-Bit software architecture and Linux system fundamentalsDescribe the major differences between classic Cisco IOS XR software and Cisco IOS XR 64-Bit software on the ASR 9000 Series routersMigrate an ASR 9000 Series router from classic IOS XR software to Cisco IOS XR 64-Bit softwarePerform and explain Cisco IOS XR 64-Bit software installationsConfigure and describe Cisco IOS XR 64-Bit software features The Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 course covers the migration from classic 32-bit Cisco IOS© XR software to Cisco IOS XR 64-Bit software on the Cisco© ASR 9000 Series Aggregation Services Routers. This course will also examine the software architecture, boot process, and auto-provisioning of the Cisco IOS XR 64-bit software, as well as showing you how to install Cisco IOS XR and third-party software packages. In addition, it will investigate data models and show you how to implement telemetry, model-driven programmability, and application hosting services. Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 Series IOS XR 64-Bit Software vs. Classic 32-Bit Software Exploring Linux Fundamentals Creating User Profiles Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Examining the Boot Process Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Features Investigating Data Models Implementing Telemetry Exploring Model-Driven Programmability Employing Application Hosting
Duration 4 Days 24 CPD hours This course is intended for Primary audience: IT administrators, architects, and business leaders who already manage Nutanix clusters in the datacenter, but who would like more in-depth knowledge of Nutanix datacenter administration. Anyone seeking preparation for the Nutanix Platform Professional (NPP) Advanced certification (in development).Secondary audience: Managers and technical staff seeking more detailed information before making a purchase decision. Overview Protect intellectual property and company data to guarantee business continuity with a complete, advanced data protection strategy.Practice advanced datacenter management procedures using hands on labs.Get the most out of Nutanix systems by maximizing configuration and operation for peak efficiency.Validate new skills by preparing for and completing the Nutanix Platform Professional Advanced certification. The Nutanix AAPM Advanced Administration & Performance Management course is an advanced level training program for experienced Nutanix data center administrators, technicians, and support personnel.The course features comprehensive coverage of performance management for Nutanix clusters, including options for performance optimization, troubleshooting issues and tuning. Learn through hands-on labs to monitor system performance, advanced networking and storage to help optimize data center administration.Advanced Administration explains in detail how to use the major Acropolis services such as Acropolis Block Services (ABS) and Acropolis File Services (AFS). The course also explains how to define and manage assets and applications using Calm, including how to connect to clouds, automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.Take advantage of Flash mode to improve system performance as well as how to effectively clone and delete VMs, move them between storage containers, and how to manage VMs (tagging, sizing, migration). Performance ManagementManaging Controller VM ServicesAdvanced Virtual Machine AdministrationImplementing Business Continuity/Disaster RecoveryConfiguring Advanced NetworkingCustomizing Security ServicesManaging Acropolis ServicesPrism Central Management
Duration 0.5 Days 3 CPD hours This course is intended for This course is primarily designed for business leaders, consultants, product and project managers, and other decision-makers who are interested in growing the business by leveraging the power of AI. Other individuals who wish to explore basic AI concepts are also candidates for this course. This course is also designed to assist students in preparing for the CertNexus AIBIZ⢠(Exam AIZ-210) credential. Overview In this course, you will identify ways in which AI can bring significant value to the business. You will: Describe AI fundamentals. Identify the functions of AI in business. Implement business requirements for AI. Artificial intelligence (AI) is not just another technology or process for the business to consider?it is a truly disruptive force, one that delivers an entirely new level of results across business sectors. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI. This course is designed to help business professionals conquer and move beyond the basics of AI to apply AI concepts for the benefit of the business. It will give you the essential knowledge of AI you'll need to steer the business forward. Lesson 1: AI Fundamentals Topic A: A Brief History of AI Topic B: AI Concepts Lesson 2: Functions of AI in Business Topic A: Improve User Experiences Topic B: Segment Audiences Topic C: Secure Assets Topic D: Optimize Processes Lesson 3: Implementing Business Requirements for AI Topic A: Identify Design Requirements Topic B: Identify Data Requirements Topic C: Identify Risks in Implementing AI Topic D: Develop an AI Strategy
Duration 2 Days 12 CPD hours This course is intended for This course is aimed at anyone currently working with data who is interested in using data visualisation to more effectively communicate their results. Overview At completion, delegates will understand how data visualisations can be best used to communicate actionable insights from data and be competent with the tools required to do it. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. Course Outline The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to horse breeding. The companies doing this most successfully understand that using sophisticated analytics approaches to unlock insights from data is only half the job. Communicating these insights to all of the different parts of an organisation is just as important as doing the actual analysis. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. To attend this course delegates should be competent in the use of data analysis tools such as reporting tools, spreadsheet software or business intelligence tools. The course will explore the following topics through a series of interactive workshop sessions: Fundamentals of data visualisation Data characteristics & dimensions Mapping visual encodings to data dimensions Colour theory Graphical perception & communication Interaction design Visualisation different characteristics of data: trends, comparisons, correlations, maps, networks, hierarchies, text Designing effective dashboards
Duration 1 Days 6 CPD hours This course is intended for This course is intended for an individual who has experience developing and deploying basic business logic and user interfaces using the programmatic capabilities of the Force.com platform, including practical application of the skills and concepts noted in the exam objectives below. Overview When you complete this course, you will be able to:Describe the structure of the exam and the exam?s objectives.List the most heavily weighted exam objectives.Describe key features of the Force.com programming languages, including: Apex, SOQL, SOSL, and Visualforce.Explain important Force.com concepts, such as the testing framework, governor limits, and the save order of execution.Explain the ALM of a Salesforce development project. By covering the details around the exam objectives, this course will help hone your problem-solving skills and reinforce your knowledge of key topics. A mock exam at the end of the course will help you assess your readiness. Introduction to the Course and the Exam Introduction to AW computing Introduction to the Platform Developer I certification Salesforce FundamentalsLogic & Process Automation (Part 1) Working with Formulas and Rollup Summary Fields Working with Basic Constructs in Apex Working with SOQL Working with SOSL Working with DML Working with Exceptions and Governor Limits Logic & Process Automation (Part 2) Working with Apex classes Working with Apex triggers Describe the save order of execution User Interface Working with Visualforce Pages Working with Visualforce Controllers Working with the Lightning Component Framework Testing Describing the Testing Framework and Requirements Creating Test Data and Tests Executing a Test Testing Considerations Debug & Deployment Tools Debugging Deploying Certification Preparation Resources
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20
Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level network administrators, network support and help desk technicians. Overview Upon successful completion of this course, students will be able to build, connect and manage networks, and IP traffic routing. In this course the student will learn to install, operate, configure and secure basic and enterprise networks. Networking BasicsNetworking ModelsNetwork AddressingPacket DeliveryDevice ManagementNetwork Security BasicsAdvanced Network Security with ACLsSwitchesAdvanced Switching ConceptsRoutersAdvanced Routing ConceptsBasic Network ServicesCisco Device ManagementTroubleshooting and Data CollectionAdvanced Switch RedundancyOSPF ConfigurationEIGRP ConfigurationPPP WANsFrame Relay WANsSecure VPNs and Tunneling Additional course details: Nexus Humans Cisco Networking training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Networking course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. Course Outline Mobile Asset Management and ITAM People & Mobile Assets Bring Your Own Device (BYOD) Tools Repository Management Assessment The 12 KPAs and Mobile Asset Management Program Management & Mobility Policy Management & Mobility Communication & Education Management & Mobility Education & Mobility Acquisition Management & Mobility Asset Identification Management & Mobility Legislation & Compliance Management & Mobility Software & Application Licensing Disposal Management & Mobility Documentation Management & Mobility Financial Management & Mobility Vendor Management & Mobility Data Protection
Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats