Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS
Duration 2 Days 12 CPD hours Overview #NAME? A course that teaches the core Adobe Captivate skills needed to create eLearning courses. 1 - EXPLORING CAPTIVATE Explore a Finished Captivate Project Zoom and Magnify Navigate a Project Explore and Reset the Workspace Preview the Entire Project 2 - NEW PROJECTS & SOFT SKILLS ELEARNING Create a Blank Project Add Images to Placeholders Import Images Use a Smart Shape as a Button Disable Click Sounds 3 - SCREEN RECORDINGS Rehearse a Script Review Recording Settings Review Recording Modes Record Using Multiple Modes Record a Custom Simulation Record a Demonstration that Pans Manually Record the Screen 4 - VIDEO DEMOS Record a Video Demo Add a Video Zoom Add a Video Pan Smooth a Mouse Path and Show Visual Clicks Split a Video Trim a Video Insert a Video Project into a Standard Project Publish a Video Demo 5 - CAPTIONS, STYLES, TIMING, AND ROUND TRIPPING Insert and Edit Text Captions Edit the Default Caption Style Change a Callout Type Used by a Text Caption Control Slide Timing Control Slide Object Timing Check Spelling Align Slide Objects Export Captions to Word Import Captions from Word into Captivate 6 - POINTERS, PATHS, PATHS, BOXES, AND BUTTONS Control Mouse Effects Edit a Mouse Path Clone an Object Style Insert a Highlight Box Insert an Image Button Control Appear After Timing 7 - IMAGES AND VIDEOS Insert, Resize, and Restore an Image Import Images into the Library Resize, Transform, and Align Images Manage Unused Library Assets Create an Image Slideshow Insert a Video Set Video Properties 8 - AUDIO Work with Rollover Captions Import Audio onto a Slide Object Import Background Audio Add a Slide Note Calibrate a Microphone Record Slide Audio Import Audio onto a Slide Edit an Audio File Insert Silence Convert Text-to-Speech 9 - STATES, ANIMATIONS, AND OBJECT EFFECTS Change State Views for a Button Add an Animation to a slide Insert a Text Animation Apply an Effect to a Slide Object Apply a Free Fall Effect to an Object 10 - SOFTWARE SIMULATIONS Hide the Mouse Replace Phrases Insert a Click Box Insert a Text Entry Box 11 - WORKING WITH POWERPOINT Create a Project from a Presentation Edit the Source Presentation Synchronize with Source Rescale a Project 12 - QUIZZING Edit Quizzing Object Styles Set the Quiz Preferences Question Slides Insert Question Slides Edit a Question Slide Compare Submit All to Submit Buttons Insert a Knowledge Check Review a GIFT File Import a GIFT File into a Project Create Question Pools Move Questions to Pools Insert Random Question Slides 13 - PUBLISHING Apply a Skin Edit, Save, and Delete a Skin Name Slides Check Publish Settings and Add a Loading Screen Publish as SWF and PDF Run the HTML5 Tracker Publish as HTML5
Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Analyst Business Process Owner / Team Lead / Power User Help Desk / COE Support Program / Project Manager Overview This course will prepare you to: Describe the motivation for SAP S/4HANA Enterprise Management Provide an overview of basic business processes in the main components of Financial Accounting with SAP S/4HANA Participants of this course will gain an overview of the Financial Accounting capabilities of SAP S/4HANA. You will learn how SAP S/4HANA covers the Financial Accounting related business requirements and how the fundamental business processes and tasks are executed in the system. General Ledger Accounting, Accounts Payable, Accounts Receivable, Asset Accounting and Bank Accounting and their integration are all discussed in this course. Especially if you are new to Financial Accounting in SAP S/4HANA, this course is the right starting point for you. If you plan to take the academy and certification for Financial Accounting, this course will help you to better understand the certification courses. For the actual certification, it is recommended, but not mandatory. Overview of SAP S/4HANA Providing an Overview of the SAP S/4HANA Using the SAP Fiori Front-En Overview of Financial Accounting (FI) in SAP S/4HANA Outlining Financial Accounting (FI) Components in SAP S/4HANA General Ledger (G/L) Accounting Outlining Organizational Elements in Financial Accounting (FI) Maintaining G/L Master Records Posting Transactions in the G/L Accounts Payable Maintaining Vendor Master Records Maintaining Accounts Payable Transactions Managing the Integration between Accounts Payable and Materials Management Performing Accounts Payable Closing Operations Accounts Receivable Maintaining Customer Master Records Managing Accounts Receivable Transactions Managing Customer Correspondence Creating Accounts Receivable Dispute Cases Managing the Integration between Accounts Receivable and Sales Order Management Performing Accounts Receivable Closing Operations Asset Accounting Maintaining Asset Master Records Executing Asset Transactions Executing Asset Accounting Period-End Closing Activitie Bank Accounting Maintaining Bank Accounting Master Records Managing Bank Accounting Transactions Closing Operations in General Ledger Accounting Performing General Ledger (G/L) Closing Operations Additional course details: Nexus Humans S4F20 SAP Business Processes in Management Accounting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4F20 SAP Business Processes in Management Accounting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Architects and operators who build and manage data analytics pipelines Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a batch data analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service. You will learn how Amazon EMR integrates with open-source projects such as Apache Hive, Hue, and HBase, and with AWS services such as AWS Glue and AWS Lake Formation. The course addresses data collection, ingestion, cataloging, storage, and processing components in the context of Spark and Hadoop. You will learn to use EMR Notebooks to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon EMR. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Introduction to Amazon EMR Using Amazon EMR in analytics solutions Amazon EMR cluster architecture Interactive Demo 1: Launching an Amazon EMR cluster Cost management strategies Module 2: Data Analytics Pipeline Using Amazon EMR: Ingestion and Storage Storage optimization with Amazon EMR Data ingestion techniques Module 3: High-Performance Batch Data Analytics Using Apache Spark on Amazon EMR Apache Spark on Amazon EMR use cases Why Apache Spark on Amazon EMR Spark concepts Interactive Demo 2: Connect to an EMR cluster and perform Scala commands using the Spark shell Transformation, processing, and analytics Using notebooks with Amazon EMR Practice Lab 1: Low-latency data analytics using Apache Spark on Amazon EMR Module 4: Processing and Analyzing Batch Data with Amazon EMR and Apache Hive Using Amazon EMR with Hive to process batch data Transformation, processing, and analytics Practice Lab 2: Batch data processing using Amazon EMR with Hive Introduction to Apache HBase on Amazon EMR Module 5: Serverless Data Processing Serverless data processing, transformation, and analytics Using AWS Glue with Amazon EMR workloads Practice Lab 3: Orchestrate data processing in Spark using AWS Step Functions Module 6: Security and Monitoring of Amazon EMR Clusters Securing EMR clusters Interactive Demo 3: Client-side encryption with EMRFS Monitoring and troubleshooting Amazon EMR clusters Demo: Reviewing Apache Spark cluster history Module 7: Designing Batch Data Analytics Solutions Batch data analytics use cases Activity: Designing a batch data analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures
Duration 1 Days 6 CPD hours This course is intended for This course is for individuals who need to write clearly and concisely in a professional environment. Overview In this course, you will organize and write effective business documents. You will: Identify techniques to write effective business communication. Write electronic communication that is clear, concise, and appropriate in a business context. Apply the writing principles you have studied to specific business situations and learn to address the needs of a particular audience. Use your writing and diplomatic skills to create formal business letters. Use basic persuasive strategies that will allow you to plan and deliver effective proposals. Though businesses increasingly rely on technology, technological skills alone do not guarantee success in the workplace. You must still develop your ideas, express them clearly, and persuade others of their viability. This course offers effective strategies to sharpen your writing skills by structuring your ideas logically, exercising diplomacy in letters and reports, and shaping your arguments.In contemporary business environments, information overload makes it necessary for you to communicate clearly and concisely. Trying to make sense of a disorganized email message can be frustrating given the number of emails you have to answer daily. By analyzing your audience, organizing your writing, and employing effective persuasive techniques, your writing will make an impact. Lesson 1: Writing Effective Business Communication Topic A: Write Strong Sentences Topic B: Organize Your Content Topic C: Analyze Your Audience Lesson 2: Writing Email and Other Electronic Communication Topic A: Write an Email Topic B: Write Instant Messages and Text Messages Lesson 3: Writing Common Business Documents Topic A: Write an Internal Announcement Topic B: Write a Routine Request Topic C: Write a Response to Routine Requests Topic D: Write a Complaint Topic E: Write a Positive Response to Customer Complaints Topic F: Write Bad-News Messages Lesson 4: Writing a Business Letter Topic A: Write a Business Letter Topic B: Write a Thank-You Letter Lesson 5: Writing Business Proposals Topic A: Persuade Your Audience Topic B: Write an Executive Summary Topic C: Use Visuals Additional course details: Nexus Humans Effective Business Writing (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Business Writing (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for wireless engineers who work in the following roles: Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview After taking this course, you should be able to: Describe and implement a Cisco-recommended structured design methodology Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs) Describe and implement Cisco enhanced wireless features Describe and implement the wireless design process Describe and implement specific vertical designs Describe and implement site survey processes Describe and implement network validation processes The Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.1 course gives you the knowledge you need to design Cisco© wireless networks. The course covers design specifics from scenario design concepts through the installation phase and into post-deployment validation.This course, including the self-paced material, helps prepare you to take the exam, Designing Cisco Enterprise Wireless Networks (300-425 ENWLSD), which leads to to the new CCNP© Enterprise and Cisco Certified Specialist ? Enterprise Wireless Design certifications. Describing and Implementing a Structured Wireless Design Methodology Importance of Planning Wireless Design with a Structured Methodology Cisco Structured Design Model Cisco Design Guides and Cisco Validated Designs for Wireless Networks Role of the Project Manager When Designing Wireless Networks Describing and Implementing Industry Protocols and Standards Wireless Standards Bodies Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard and Amendments Wi-Fi Alliance (WFA) Certifications Relevant Internet Engineering Task Force (IETF) Wireless RFCs Practice Activity Describing and Implementing Cisco Enhanced Wireless Features Hardware and Software Choices for a Wireless Network Design Cisco Infrastructure Settings for Wireless Network Design Cisco Enhanced Wireless Features Examining Cisco Mobility and Roaming Mobility and Intercontroller Mobility in a Wireless Network Optimize Client Roaming in a Wireless Network Cisco Workgroup Bridge (WGB) and WGB Roaming in a Wireless Network Describing and Implementing the Wireless Design Process Overview of Wireless Design Process Meet with the Customer to Discuss the Wireless Network Design Customer Information Gathering for a Wireless Network Design Design the Wireless Network Deployment of the Wireless Network Validation and Final Adjustments of the Wireless Network Wireless Network Design Project Documents and Deliverables Describing and Implementing Specific Vertical Designs Designs for Wireless Applications Wireless Network Design Within the Campus Extend Wireless Networks to the Branch Sites Examining Special Considerations in Advanced Wireless Designs High-Density Designs in Wireless Networks Introducing Location and Cisco Connected Mobile Experiences (CMX) Concepts Design for Location FastLocate and HyperLocation Bridges and Mesh in a Wireless Network Design Redundancy and High Availability in a Wireless Network Describing and Implementing the Site Survey Processes Site Survey Types Special Arrangements Needed for Site Surveys Safety Aspects to be Considered During Site Surveys Site Survey Tools in Cisco Prime Infrastructure Third-Party Site Survey Software and Hardware Tools Describing and Implementing Wireless Network Validation Processes Post-installation Wireless Network Validation Making Post-installation Changes to a Wireless Network Wireless Network Handoff to the Customer Installation Report
Duration 3 Days 18 CPD hours This course is intended for Individuals involved in IT development, IT operations or IT service management; Those whose role is touched by DevOps and continuous delivery, such as the following IT roles: DevOps engineers, Product owners Integration specialists, Operations managers, Incident & change managers, System administrators, Network administrators, Business managers, Automation architects, Enterprise architects, Testers Overview Know the emergence of DevOps Know the core concepts and principles of DevOps Know what DevOps means for you as professional and for your organization Know the essence of a DevOps culture Understand the key elements of a DevOps culture Know the important aspects when creating a DevOps culture Know the Operational models of DevOps Understand the need for autonomous teams Understand the impact of DevOps on Architecture with respect to deployment Understand governance within DevOps teams Understand Agile, Scrum and Kanban and how these practices relate to one another Understand how ITSM processes relate to practices in a DevOps culture Understand how lean is used to optimise processes Know how to provide a Value Stream Map for a given process Understand the way to harvest new and innovative ideas Know the impact of automation on Software Delivery processes Understand the benefits and core principles of Continuous Delivery Describe the key cloud principles for DevOps organisations Know the relevance of monitoring and logging DevOps This course is designed to provide the core education necessary to build your DevOps vocabulary and to understand its principles and practices. With the help of key DevOps concepts and terminology, real-life case studies, examples and interactive group discussions and extensive exercises in each module you will acquire a fundamental understanding of DevOps. Introduction Let?s Get to Know Each Other Overview Course Objectives Mapping of the Competence Model with the Course Modules Course Agenda Type of Activities Exam Course Book Technical Glossary Group Activity Module Summary DevOps Introduction Module Objectives Module Topics Emergence of DevOps Core Concepts of DevOps DevOps Agile Skills Association (DASA) Module Summary Module End Questions Culture Module Objectives Module Topics Essence of a DevOps Culture Key Elements of DevOps Implementation of a DevOps Culture Module Summary Module End Questions Organization Module Objectives Module Topics Organizational Model Autonomous Teams Architecting for DevOps Governance Module Summary Module End Questions Processes Module Objectives Module Topics Process Basics DevOps in Relation to ITSM Agile and Scrum 12 Principles of the Agile Manifesto Optimizing Processes Using Lean Business Value Optimization and Business Analysis Using Story Mapping Module Summary Module End Questions Automation Module Objectives 6A Automation Concepts Automation for Delivery of Software Continuous Delivery Core Concepts Continuous Delivery Automation Concepts Continuous Delivery Automation Focus Topics 6B Data Center Automation Emergence of Cloud Technology and Principles Cloud Services Concepts in a DevOps Organization Automated Provisioning Concepts Platform Product Characteristics and Application Maturity Module Summary Module End Questions Measure and Improvement Module Objectives Module Topics Importance of Measurement Choosing the Right Metrics Monitoring and Logging Module Summary Module End Questions
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Database architects Database administrators Database developers Data analysts and scientists Overview This course is designed to teach you how to: Discuss the core concepts of data warehousing, and the intersection between data warehousing and big data solutions Launch an Amazon Redshift cluster and use the components, features, and functionality to implement a data warehouse in the cloud Use other AWS data and analytic services, such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3, to contribute to the data warehousing solution Architect the data warehouse Identify performance issues, optimize queries, and tune the database for better performance Use Amazon Redshift Spectrum to analyze data directly from an Amazon S3 bucket Use Amazon QuickSight to perform data analysis and visualization tasks against the data warehouse Data Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS. This course demonstrates how to collect, store, and prepare data for the data warehouse by using other AWS services such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3. Additionally, this course demonstrates how to use Amazon QuickSight to perform analysis on your data Module 1: Introduction to Data Warehousing Relational databases Data warehousing concepts The intersection of data warehousing and big data Overview of data management in AWS Hands-on lab 1: Introduction to Amazon Redshift Module 2: Introduction to Amazon Redshift Conceptual overview Real-world use cases Hands-on lab 2: Launching an Amazon Redshift cluster Module 3: Launching clusters Building the cluster Connecting to the cluster Controlling access Database security Load data Hands-on lab 3: Optimizing database schemas Module 4: Designing the database schema Schemas and data types Columnar compression Data distribution styles Data sorting methods Module 5: Identifying data sources Data sources overview Amazon S3 Amazon DynamoDB Amazon EMR Amazon Kinesis Data Firehose AWS Lambda Database Loader for Amazon Redshift Hands-on lab 4: Loading real-time data into an Amazon Redshift database Module 6: Loading data Preparing Data Loading data using COPY Data Warehousing on AWS AWS Classroom Training Concurrent write operations Troubleshooting load issues Hands-on lab 5: Loading data with the COPY command Module 7: Writing queries and tuning for performance Amazon Redshift SQL User-Defined Functions (UDFs) Factors that affect query performance The EXPLAIN command and query plans Workload Management (WLM) Hands-on lab 6: Configuring workload management Module 8: Amazon Redshift Spectrum Amazon Redshift Spectrum Configuring data for Amazon Redshift Spectrum Amazon Redshift Spectrum Queries Hands-on lab 7: Using Amazon Redshift Spectrum Module 9: Maintaining clusters Audit logging Performance monitoring Events and notifications Lab 8: Auditing and monitoring clusters Resizing clusters Backing up and restoring clusters Resource tagging and limits and constraints Hands-on lab 9: Backing up, restoring and resizing clusters Module 10: Analyzing and visualizing data Power of visualizations Building dashboards Amazon QuickSight editions and feature
Duration 3 Days 18 CPD hours This course is intended for Students receive comprehensive Microsoft Dynamics exam preparation, becoming familiarized with the Dynamics CRM customization and configuration tools. Aspirants also learn to leverage the platform tools to create custom objects, automate tasks, modify user interface, and perform other such customizations. Overview Configure the Dynamics CRM settingsConfigure different entities and fieldsImplement entity relationships, custom actions, workflows, and dialogsIdentify scenarios for utilizing multiple forms, and design considerations for chartsSet default share views and public views, and configure and manage dashboardsIdentify role-based business processesIdentify and manage business requirements and teams This course explains everything you need to know about customizing and configuring the Dynamics CRM 365 system in accordance with a company?s specific requirements. Introduction to Customization and Configuring Dynamics CRM Talent and Course Introduction Module Overview CRM Overview What is Dynamics Customization and Configuration? CRM Architecture Customization Methodology Module review Obtaining a Dynamics CRM Trial TEST YOUR KNOWLEDGE MODULE 1' Manage Microsoft Dynamics CRM Online Subscriptions Module Overview Configuring CRM Overview of CRM Security User Administration Mailboxes Teams CRM Security Model Module Overview Purpose of the CCRM Security Model Privileges Access Levels Security Roles Hierarchy Security Hierarchy Types Module review Introduction to Solutions Module Overview Solutions Overview Solution Detail Creating and Working with Solutions Working with Solution Assets Exporting Solutions Importing Solutions Module review Entity and Field Customization Module Overview Types Entities Entity Ownership Entity Properties System vs Custom Entities Custom Entities and Security Roles Overview of Fields Field Properties Module review Additional Field Customization Module Overview Creating Fields to Meet Client Needs Calculated Fields Rollup Fields CRM Option Sets Alternate Keys Field Level Security State and Status Reason Transitions Module Review Configure mobile devices Module Overview Types of Relationships How and where they are created Many to Many Relationships Hierarchical Data Entity Mapping Connection and Connection Roles Module Review Customizing Forms Module Overview Form types Qualities of a good form Building a Form Specialized Form Components Access Teams and Sub Grids Working with Navigation Additional Form Types Multiple Forms Form customizations and Mobile Clients Module Review Business Rules Module Overview Business Rules Business Rule Scope Trigger Rules Condition and Actions Else Conditions and Actions Occur When Conditions Are True Module review Views and Visualizations Module Overview Using Views View Customization System View Types Quick Find Customization Charts Customizing Dashboard Themes Module Review Introduction to Processes Module Overview Processes and Automation Workflow Basics Module review Business Process Flows What are CRM Business Process Flows Enabling Business Process Flows Steps Stages and Categories Conditional Branching Module Review Bringing it all Together Module Overview Review of Customization Topics Covered Senario Packaging in a Solution Module review
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.