Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Program/Project Manager Overview This course will prepare you to: Describe the motivation for SAP S/4HANA Enterprise Management Provide an overview of basic business processes in the main components of Financial Accounting with SAP S/4HANA Students will learn how SAP S/4HANA covers the Financial Accounting related business requirements and how the fundamental business processes and tasks are executed in the system. Overview of SAP S/4HANA Outlining the Motivation for SAP HANA and SAP S/4HANA Providing an Overview of the SAP S/4HANA Products and Adoption Strategies Using the SAP Fiori Front-End Overview of Financial Accounting (FI) in SAP S/4HANA Outlining Financial Accounting (FI) Components in SAP S/4HANA General Ledger (G/L) Accounting Outlining Organizational Elements in Financial Accounting (FI) Maintaining G/L Master Records Posting Transactions in the G/L Accounts Payable Maintaining Vendor Master Records Maintaining Accounts Payable Transactions Managing the Integration between Accounts Payable and Materials Management Performing Accounts Payable Closing Operations Accounts Receivable Maintaining Customer Master Records Managing Accounts Receivable Transactions Managing Customer Correspondence Creating Accounts Receivable Dispute Cases Managing the Integration between Accounts Receivable and Sales Order Management Performing Accounts Receivable Closing Operations Asset Accounting Maintaining Asset Master Records Executing Asset Transactions Executing Asset Accounting Period-End Closing Activities Bank Accounting Maintaining Bank Accounting Master Records Managing Bank Accounting Transactions Closing Operations in General Ledger Accounting Performing General Ledger (G/L) Closing Operations
Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco NCS 2000 Series Dense Wavelength-Division Multiplexing (DWDM) network with Flex Spectrum. The primary audience for this course includes: Designers Systems engineers and implementation staff Network operations center personnel Technical support personnel who are involved with the deployment, operations, and maintenance of the Cisco NCS 2000 Series Channel partners and resellers Overview After taking this course, you should be able to: Describe the hardware and components required and used with the Flex Spectrum feature Design optical networks in the Cisco Transport Planner software Install the hardware, including multishelf nodes Perform node turn-up and create circuits using the Cisco Transport Controller software Configure optical networks with multidegree ROADM multishelf nodes Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features Describe and configure the NCS 2000 400-Gbps Xponder line card Add a node to an existing DWDM ring Describe the NCS 2000 Troubleshooting Guide Use the features and documentation with Transport Controller to perform maintenance, testing, and basic troubleshooting The Cisco NCS2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 course shows you how to plan, configure, and control optical networks using the Cisco© Network Convergence System (NCS) 2000 series Flex Spectrum platform.The course teaches you how to design Flex Spectrum networks with multi-degree Reconfigurable Optical Add-Drop Multiplexer (ROADM) multi-shelf nodes using the Cisco Transport Planner (CTP) software. Course Outline DWDM and Flex Spectrum Foundation NCS 2000 Chassis and Cards Design ROADM Networks with CTP Hardware Installation and Multishelf Node Turn-Up and Circuit Creation Advanced Feature Networks and Circuits Testing, Maintenance, and Basic Troubleshooting Spectrum Switched Optical Network
Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Process Owner/ Team Lead/ Power User Overview This course will prepare you to: configure asset accounting manage asset master data perform day to day asset transactions perform periodic asset transactions manual legacy data transfer for assets This course gives you a thorough overview of Asset Accounting configuration and processes with SAP S/4HANA. Course Outline Chart of Depreciation/Depreciation Areas Asset Classes Asset Master Data Daily Asset Accounting Business Processes Valuation and Depreciation Period and Year-End Closing Processes Investment Support Measures Information System Asset Legacy Data Transfer Additional course details: Nexus Humans S4F17 SAP Asset Accounting in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4F17 SAP Asset Accounting in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real
Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions Architects and Engineers who perform cloud migrations IT Project Managers who are involved in projects related to migrating existing workloads to the AWS Cloud Overview This course is designed to teach you how to: Explain the various cloud migration strategies Assess cloud migration readiness Discover your portfolio and plan for migration Plan and design your application migration strategy Perform and validate application migration to the cloud Optimize your applications and operations after migrating to the cloud Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization. This course is designed for Solutions Architects and Engineers who perform cloud migrations, have an understanding of core AWS services and design patterns covered in Architecting on AWS. This course is also available to IT project managers involved in the planning of those migrations who have completed AWS Technical Essentials Module 1: Migrating to AWS ? Overview Migration process 'Mental Model' Cloud Migration Strategies Comparing Cloud Migration Strategies Cloud Center of Excellence (CoE) Cloud Migration Readiness Assessment AWS Cloud Migration Process Group activity: Creating a high-level migration plan Module 2: Discovery and analysis Migration Process Roadmap AWS Migration Methodology AWS Application Discovery Service Portfolio Analysis Hands-on lab 1: Performing discovery Module 3: Migration planning and design (part I) AWS Migration Hub Pricing and Availability Process Group activity: Creating a detailed migration plan Module 3: Migration planning and design (continued) Application migration ordering Application prioritization criteria Defining success criteria Migration methodology Designing for migration Module 4: Migration, integration, and validation Migration considerations Data migration AWS Snow Services AWS Data Migration Service (DMS) Server migration Demonstration: Server migration service Hands-on lab 2 : Migrating databases to AWS EC2 Hands-on lab 3 : Migrating databases to Amazon Aurora Module 5: Operations and optimization On premises vs. cloud IT operations Optimizing in the AWS Cloud Case study: Optimizing an application
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL professionals, Microsoft Analysis Services cube and report developers, and business intelligence professionals. Overview ?Understand common Analysis Services solutions.?Understand version changes of SSAS from 2008-2014.?Understand Analysis Services installation and architecture.?Understand how to choose the right model.?Understand the Analysis Services tools available.?Understand the multidimensional model.?Utilize data sources and data source views.?Create a cube.?Understand and utilize dimensions.?Understand and utilize attributes.?Understand and utilize relationships.?Understand and utilize hierarchies.?Understand and utilize measures and measure groups.?Understand and utilize calculated members.?Understand and utilize perspectives.?Understand and utilize translations.?Browse perspectives and translations.?Understand and utilize deployment options.?Understand and utilize processing strategies.?Understand and utilize security.?Deploy a multidimensional model.?Understand the tabular model.?Create a tabular project.?Analyze the data using Microsoft Excel.?Create and configure calculated measures and calculated fields.?Backup and Restore. This course is intended for IT professionals who are interested in quickly learning how to utilize an Analysis Services multidimensional or tabular solution. Course Overview Introduction Course Materials Facilities Prerequisites What We'll Be Discussing Lab 1: Course Overview Introduction to Microsoft SQL Server Analysis Services Common Analysis Services Solutions Version Changes of SSAS from 2008-2014 Analysis Services Installation and Architecture: One Product, Two Models Choosing the Right Model Analysis Services Tools Lab 1: Introduction to Microsoft SQL Server Analysis Services The Multidimensional Solution Understanding the Multidimensional Model Utilizing Data Sources and Data Source Views Creating a Cube Lab 1: The Multidimensional Solution Dissecting with Dimensions Developing Dimensions Utilizing Attributes Relating with Relationships Handling Hierarchies Lab 1: Dissecting with Dimensions Managing Measures Measures and Measure Groups Calculated Members Lab 1: Managing Measures Configuring Cube Options Understanding Perspectives Utilizing Translations Browsing Perspectives and Translations Lab 1: Configuring Cube Options Deploying Examining Deployment Options Processing Strategies Exploring Security Lab 1: Deploying The Tabular Solution Understanding the Tabular Model Creating a Tabular Project Deploying Browsing the Model Querying the Solution and Understanding DAX Maintaining and Optimizing Lab 1: The Tabular Solution
Duration 4 Days 24 CPD hours This course is intended for This course is designed for those who have little or no experience with Linux and whoare seeking a fundamental understanding of the SUSE Linux Enterprise 15 operatingsystem. It is also ideal for those who want to begin preparing for the SUSE CertifiedAdministrator in Enterprise Linux 15 certification exam. Overview Attendees will be taught the following concepts and skills that are fundamental inadministering the SLES Operating System:Install SLES 15 and perform basic Linux configurationBecome familiar with the command line interface & commonly usedcommandsConfigure and use Remote AdministrationManage the boot process and understand systemsManage processes and jobsManage users and permissionsManage softwareConfigure basic networkingManage storageMonitor SUSE Linux Enterprise This course is designed for those who are seeking a fundamental understanding of the SUSE Linux Enterprise Server (SLES) operating system.Students will be able to install and configure a SLES 15 server and integrate it into an existing network. They will be able to perform the most important system administration tasks. Overview of SUSE Linux Enterprise Flavors of SUSE Linux SLE Maintenance Model YaST The Linux Filesystem Understand the Filesystem Hierarchy Standard (FHS) Understand the Linux File Types Work with the Command Line Getting Help at the Command Line Understand the Shell Environment The Vim EditorRemote Administration Understand Remote Administration with OpenSSH Understand Remote Administration with VNC System Initialization Understand the Boot Process Understand the GRUB2 Boot Loader Define and Describe systems Process Management Understand Process Administration Understand Background Processes Understand Process Scheduling Understand xinet Identify and Security Understand User Management Understand Filesystem Permissions Understand Privilege Delegation Software Management Understand Compiling Software from Source Understand Management of RPM Packages Understand Software Management with Libzypp Network Management Understand Network Management in SLE Understand Network Management with Wicked Understand firewall Storage Management Understand the Linux I/O Stack Recognize Traditional Linux File Systems Configure Logical Volume Management (LVM) Configure Software RAID Define and Describe BtrFS Understand NFSv4 Administration and Monitoring Understand Time Sync with chrony Configure System Logging Understand Supportconfig Installing SUSE Linux Enterprise Understand the Unified Installer Understand Extensions and Modules Understand AutoYaST