• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

33036 PLA courses

FortiManager

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for anyone who is responsible for day-to-day management of many FortiGate devices via the FortiManager platform. Overview Describe capabilities of FortiManager Add FortiGate devices to Device Manager and import their running configuration Use provisioning templates and scripts for device-level changes across many devices Identify the synchronization states Manage the revision history of managed devices Offer a local FortiGuard Distribution Server to your Fortinet devices Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Explain high availability, backup, and recovery options for FortiManager Compare methods for centrally managing IPsec VPNs Explain the restricted ''admin'' profile and API high-level usage Use workspaces and workflow mode Identify steps to replace a managed FortiGate device Manage FortiGate devices' firmware centrally In this 2-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. Example use cases include large enterprise and carrier networks. Course Outline Module1 - Introduction and Initial Configuration Module2 - Administration and Management Module3 - Device Registration Module4 - Device Level Configuration and Installation Module5 - Policy and Objects Module6 - Manager Panes Module7 - Diagnostics and Troubleshooting Module8 - Advanced Configuration Additional course details: Nexus Humans FortiManager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the FortiManager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FortiManager
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to HTML5. CSS3 and JavaScript (TT4003)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level course, designed for web developers that need to upgrade core skills leveraging modern scripting and web development languages and standards. This course provides an excellent foundation for continued learning to gain in-demand skills in in-demand skills and technologies such as Angular, React, NodeJS, JQuery and more. This course can also be tuned for non-developers. Please inquire for details. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment guided by our expert team, attendees will explore: HTML5: How to effectively meet requirements using the full range of HTML5 semantic and structural elements To work with technologies such as web storage, application caching, and cross-domain messaging to improve performance and the user experience CSS: What features CSS3 supports and how they can be effectively used with HTML5 and other technologies To adapt to varying degrees of browser support for HTML5 and CSS3 JavaScript: What JavaScript is, how it relates to other programming languages, and how to script your web pages with it To traverse and manipulate the DOM and handle events in ways that work in all browsers To work with closures and prototypes and other exotic features of JavaScript Debugging What is needed to effectively debug these web technologies How to use both browser-based and proxy-based debuggers and tools Introduction to HTML5, CSS3 & JavaScript is geared for developers who need to understand the latest web technologies and responsive design practices central to targeting the entire spectrum of user platforms and browsers. This jumpstart style course provides a balanced mixture of theory and practical labs designed to take students through HTML5, CSS3 and JavaScript. Students who attend this course will leave this course armed with the new skills to begin to design, implement, and deploy robust, flexible, and safe web applications HTML Refresher HTML Review Introduction to HTML5 Introduction to CSS CSS Basics CSS3 Overview CSS3 Advanced Selectors CSS3 Visual Effects Introduction to JavaScript JavaScript Basics Debugging Tools JavaScript Functions JavaScript Arrays, Math and Date JavaScript Event Handling and the DOM Object-Oriented JavaScript

Introduction to HTML5. CSS3 and JavaScript (TT4003)
Delivered OnlineFlexible Dates
Price on Enquiry

BOAN10 SAP BusinessObjects Analysis for Microsoft Office

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is primarily for Application Consultants, Business Analysts, Business Process Owners/Team Leaders/Power Users, and Developer Consultants. Overview At course completion students will know- The basic functions and navigation options of BusinessObjects Analysis for Microsoft Office- The special functions and layout design options of BusinessObjects Analysis for Microsoft Office In this course, students learn the basic functions and navigation options of the Analysis edition for Microsoft Office. Students will also learn the special functions and layout design options of Analysis. Components and Data Sources for Analysis Using Analysis Components and Data Sources Customization for Workbook Data Analysis Using the Basic Components of Analysis Sorting and Filtering Workbook Members Filtering Selected Workbook Members by Measure for Enhanced Analysis Using Hierarchies for Data Analysis in Workbooks Using Inserted Components to Add Workbook Functionality Configuring Filter Components Using Formulas to Enhance the Workbook Layout Defining Conditional Formatting Options for Workbooks Using a Prompting Dialog in Workbook Queries Extending Workbook Display Options with Functions and Microsoft Excel VBA Using Styles to Customize Workbook Appearance Setting Preferences to Control Workbook Behavior Publishing Analysis Documents to the BI Platform Server Presentation of Workbook Analysis Data Presenting Analysis Data for Business Users Additional course details: Nexus Humans BOAN10 SAP BusinessObjects Analysis for Microsoft Office training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOAN10 SAP BusinessObjects Analysis for Microsoft Office course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BOAN10 SAP BusinessObjects Analysis for Microsoft Office
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0
Delivered OnlineFlexible Dates
Price on Enquiry

WM302 IBM MQ V8 System Administration for z/OS

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This intermediate course is designed for technical support personnel who implement, operate, and perform day-to-day administration of IBM MQ V8 on z/OS. Overview Describe message-oriented middleware and the capabilities it must provideIdentify the key components of IBM MQ for z/OSSummarize the responsibilities of the IBM MQ administratorConfigure IBM MQ IBM V8 for z/OSEnable IBM MQ for z/OS eight-byte RBA and buffers above 2 GBDemonstrate how to create and change queues and place and retrieve messages from a queueDefine and demonstrate how to set up and work with distributed queuingDifferentiate between an IBM MQ queue manager and an IBM MQ clientDescribe and demonstrate how to set up an IBM MQ clusterContrast point-to-point and publish/subscribe messaging stylesDescribe shared queues and queue sharing groupsSummarize IBM MQ for z/OS recovery and restart activitiesDemonstrate how to use IBM MQ events for monitoringSummarize performance considerationsDescribe security considerations for IBM MQ for z/OSDescribe and implement connection authentication and channel authorizationIdentify correct problem determination techniques for IBM MQ for z/OSSummarize basic use and configuration of IBM MQ Managed File TransferDescribe IBM MQ support for CICS and IMS interfaces This course provides the skills that are necessary to configure and manage an IBM MQ V8 queue manager on z/OS. Through lectures and hands-on lab exercises, students learn how to install, customize, operate, and administer IBM MQ V8. Course Outline Course introduction IBM MQ review IBM MQ architecture, installation, and configuration Exercise: Configuring an IBM MQ for z/OS queue manager IBM MQ for z/OS administrative interface options Exercise: Working with queues Distributed queuing Exercise: Working with channels IBM MQ clients Exercise: Working with IBM MQ clients IBM MQ cluster basics Exercise: Working with IBM MQ clusters Publish/subscribe basics Exercise: Publish/subscribe basics Queue sharing groups Using IBM MQ events and the dead-letter queue utility Exercise: Working with IBM MQ events Security considerations Exercise: Security Problem determination IBM MQ Managed File Transfer Exercise: IBM MQ Managed File Transfer configuration for z/OS IBM MQ for z/OS backup, recovery, and related file tasks Exercise: Working with file handling utilities Support for CICS, IMS, and HTTP applications Course summary

WM302 IBM MQ V8 System Administration for z/OS
Delivered OnlineFlexible Dates
Price on Enquiry

SCRUM Foundation (SP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles T‚cnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabr‚ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Qu‚ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el ‚xito Construir una base s¢lida Impulsar el cambio

SCRUM Foundation (SP)
Delivered OnlineFlexible Dates
Price on Enquiry

Network and Security Manager Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network and Security Manager Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Explain WAE basics, the purpose of WAE, and its capabilities Understand the Cisco WAE solution implementation Describe the network module configuration process Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis Describe Cisco WAE Design traffic engineering and QoS modeling Explain how to use API with WAE Design and WAE Server Describe the function, components, and processes of Cisco WAE Live The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco© WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.Additionally, you?ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions. Course Outline WAE Solution and Architecture Overview Implementing a Cisco WAE Solution Network Model Configuration WAE Design Fundamentals Cisco WAE Design Traffic Engineering and Optimization Introducing Cisco WAE API Cisco WAE Live Deployment Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE)
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISSA Certified Information Systems Security Auditor Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSA Certified Information Systems Security Auditor Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry