• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1218 Power courses in Cardiff delivered Live Online

GRC300 SAP Access Control Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GRC300 SAP Access Control Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco ASR 9000 Aggregation Services Router Series Essentials (ASR9KE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment. The primary audience for this course includes: System engineers Technical support personnel Channel partners, resellers Overview After taking this course, you should be able to: List and describe the major features and benefits of a Cisco ASR 9000 Series router List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system Understand data flow through the Cisco ASR 9000 Series router Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes, and software maintenance updates Enable multicast routing on a Cisco ASR 9900 Series router Configure Layer 3 VPN services Configure Ethernet link bundles Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN) Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN Configure EoMPLS with pseudowire backup Configure local Ethernet LAN(E-LAN) L2VPN Describe Virtual Private LAN Service (VPLS) L2VPN Describe VPLS with Border Gateway Protocol (BGP) autodiscovery Configure service-based Connectivity Fault Management (CFM) Configure Layer 2 multicast features Describe basic QoS implementation Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series The Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 course introduces you to the features and functions of the Cisco© Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS© XR 64-Bit software packages. Cisco ASR 9000 Series Hardware Examining the Cisco ASR 9000 Series Chassis Examining the Cisco ASR 9000 Series Architecture Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture Examining the Cisco ASR 9000 Series Line Card Examining the Cisco ASR 9000 Power Subsystems Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit Exploring Linux Fundamentals Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Configuration Basics Configuring Cisco IOS XR 64-Bit Basic Operations Cisco IOS XR 64-Bit Initial Configuration Reviewing the Configuration Cisco IOS XR 64-Bit Software Routing Protocols Exploring Intermediate System to Intermediate System (IS-IS) Exploring OSPF Exploring BGP Exploring Routing Protocol for LLN Multicast Routing Exploring Multicast Routing Exploring Protocol Independent Multicast (PIM) Cisco Multiprotocol Label Switching Examining the MPLS Forwarding Infrastructure Implementing the MPLS Label Distribution Protocol (LDP) Cisco IOS XR 64-Bit Segment Routing Segment Routing Concepts Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview Prefix and Adjacency Segment IDs (SIDs) SR IS-IS Multi-Level and OSPF Multi-Area IS-IS SR Configuration and Verification OSPF SR Configuration and Verification Layer 3 VPNs Examining L3VPNs Exploring L3VPN Control and Data Flow Configuring L3VPNs Verifying the L3VPN Operation Cisco ASR 9000 Layer 2 Architecture Examining Carrier Ethernet and Flexible Ethernet Edge Comparing Layer 2 and Layer 3 VPNs Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs) Layers 2 and 3 Coexistence and VLAN Tag Manipulation Exploring the Layer 2 Network Infrastructure Point-to-Point Layer 2 Services Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy Point-to-Point AC-Pseudowire (PW) Cross-Connect Examining Pseudowire Redundancy and Resiliency Layer 2 Multicast Examining the Cisco ASR 9000 Series Multicast Implementing Multicast Quality of Service QoS Basics and the Modular QoS CLI (MQC) Mode Layer 2 QoS Example

Cisco ASR 9000 Aggregation Services Router Series Essentials (ASR9KE)
Delivered OnlineFlexible Dates
Price on Enquiry

AutoCAD and Photoshop Training Course 1-2-1

By Real Animation Works

Autocad face to face training customised and bespoke.

AutoCAD and Photoshop Training Course 1-2-1
Delivered in London or OnlineFlexible Dates
£390

Business Transformation with Google Cloud

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Transformation with Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

InDesign Basic to Essential Training Course

By Real Animation Works

Vectorworks Evening Course face to face One to one

InDesign Basic to Essential Training Course
Delivered in London or OnlineFlexible Dates
£400

3ds max and V-Ray course one to one

By Real Animation Works

3ds max professional one to one training

3ds max and V-Ray course one to one
Delivered in London or OnlineFlexible Dates
£400

Introduction to Writing SQL Queries (TTSQL003)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory- level course appropriate for those who are developing applications using relational databases, or who are using SQL to extract and analyze data from databases and need to use the full power of SQL queries. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner, attendees will learn to: Maximize the potential of SQL to build powerful, complex and robust SQL queries Query multiple tables with inner joins, outer joins and self joins Construct recursive common table expressions Summarize data using aggregation and grouping Execute analytic functions to calculate ranks Build simple and correlated subqueries Thoroughly test SQL queries to avoid common errors Select the most efficient solution to complex SQL problems A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. SQL is the cornerstone of all relational database operations. In this hands-on course, you learn to exploit the full potential of the SELECT statement to write robust queries using the best query method for your application, test your queries, and avoid common errors and pitfalls. It also teaches alternative solutions to given problems, enabling you to choose the most efficient solution in each situation. Introduction: Quick Tools Review Introduction to SQL and its development environments Using SQL*PLUS Using SQL Developer Using the SQL SELECT Statement Capabilities of the SELECT statement Arithmetic expressions and NULL values in the SELECT statement Column aliases Use of concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword Use of the DESCRIBE command Restricting and Sorting Data Limiting the Rows Rules of precedence for operators in an expression Substitution Variables Using the DEFINE and VERIFY command Single-Row Functions Describe the differences between single row and multiple row functions Manipulate strings with character function in the SELECT and WHERE clauses Manipulate numbers with the ROUND, TRUNC and MOD functions Perform arithmetic with date data Manipulate dates with the date functions Conversion Functions and Expressions Describe implicit and explicit data type conversion Use the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions Nest multiple functions Apply the NVL, NULLIF, and COALESCE functions to data Decode/Case Statements Using the Group Functions and Aggregated Data Group Functions Creating Groups of Data Having Clause Cube/Rollup Clause SQL Joins and Join Types Introduction to JOINS Types of Joins Natural join Self-join Non equijoins OUTER join Using Subqueries Introduction to Subqueries Single Row Subqueries Multiple Row Subqueries Using the SET Operators Set Operators UNION and UNION ALL operator INTERSECT operator MINUS operator Matching the SELECT statements Using Data Manipulation Language (DML) statements Data Manipulation Language Database Transactions Insert Update Delete Merge Using Data Definition Language (DDL) Data Definition Language Create Alter Drop Data Dictionary Views Introduction to Data Dictionary Describe the Data Dictionary Structure Using the Data Dictionary views Querying the Data Dictionary Views Dynamic Performance Views Creating Sequences, Synonyms, Indexes Creating sequences Creating synonyms Creating indexes Index Types Creating Views Creating Views Altering Views Replacing Views Managing Schema Objects Managing constraints Creating and using temporary tables Creating and using external tables Retrieving Data Using Subqueries Retrieving Data by Using a Subquery as Source Working with Multiple-Column subqueries Correlated Subqueries Non-Correlated Subqueries Using Subqueries to Manipulate Data Using the Check Option Subqueries in Updates and Deletes In-line Views Data Control Language (DCL) System privileges Creating a role Object privileges Revoking object privileges Manipulating Data Overview of the Explicit Default Feature Using multitable INSERTs Using the MERGE statement Tracking Changes in Data

Introduction to Writing SQL Queries (TTSQL003)
Delivered OnlineFlexible Dates
Price on Enquiry

Consultative selling (In-House)

By The In House Training Company

'Selling' doesn't work. You've got to help customers buy. And that means engaging with the customer in a positive way, showing that you understand their requirement and giving them confidence that your product or service is the best possible way of meeting that requirement. This may sound painless but there's more to it than meets the eye and it's all too easy to get it wrong. You need to follow a process. This programme will help participants: Understand 'how buyers buy' and align their selling activities accordingly Recognise the difference between 'latent pain' and 'active vision' opportunities Conduct effective pre-call planning and research Stimulate interest and establish credibility with your prospects Get prospects to share / admit high priority pain Engage in consultative dialogue that promotes the differentiating strengths of your offerings Gain access to 'power' people within an opportunity Effectively qualify and disqualify opportunities based on objective decision criteria Better control and manage sell cycles Improve their chances of winning competitive opportunities Shorten sales cycles and avoid 'no decision' Negotiate the steps leading to a successful sale 1 An introduction to selling Understanding the key points that encourage a customer to purchase from us The difference between consultative selling and a transactional sale Understanding the roles that trust and empathy play in a sale Understanding how tricks and manipulation can sink a sale Vital pre-meeting research that must take place before a conversation Understanding how the customer sees us and why positioning is important 2 Structuring the sales conversation process Defining a set process for structuring a sales call with a chance to demonstrate understanding How the first minute of a conversation can destroy a sale Understanding BPO objectives for a sale How a step-by-step sales conversation process helps win more sales Understanding the mis-match between the customers buying process How our sales processes can lead to mistakes 3 How and why people buy An insight into the emotional factors behind how people arrive at purchasing decisions Using research from neuroscience that shows how sales people can really make mistakes Understanding how people make decisions about larger purchases Understanding the stakeholders in companies and their buying motives How to analyse the stakeholders and determine a win-plan 4 Understanding the funnel Studying the sales and buying process to understand the ratios of sales to prospects and better forecasting Understanding the role of forecasting in sales analysis Why many forecasts are nearly always wrong Understanding the stages of a sales process How 'verifiable outcomes' can really change forecasting 5 Questioning techniques Understanding the different questioning techniques and when they should be used Using the 'knowledge tree' as a framework for questioning Understanding the use of real empathy to help customers uncover their needs How effective research can really empower your questions How to ask 'high gain' questions How to ask difficult questions without feeling intrusive 6 Features and benefits How to practically apply them in a sales scenario How to align the benefits to customers' business goals Really understanding the difference and how to demonstrate true economic benefits to a customer How to discover business goals, and align value propositions to these How to craft an effective value proposition for a customer Using the SAR storytelling method to really engage customers to align their thinking patterns Using the latest neuroscience research that explains what customers are really thinking 7 Overcoming objections How 'confirmation bias' can hinder any sales conversation How the CLARA method of responding to customer concerns can dramatically improve the chances of customers responding to us in a positive way Practising the method to become comfortable and congruent with it 8 Closing the sale A deep dive into what closing is How different sales have different closes How too many closing methods can destroy a sale How to lead up to a close with a logical sequence of questions Using the ACSAT trust method of closing A clear methodology with a chance to practise the skills in a fun way

Consultative selling (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Creating effective specifications (In-House)

By The In House Training Company

High quality specifications are of paramount importance in achieving the right technical performance and value for money. This long-established training programme has been developed to help those involved in producing specifications to create high quality documents in an organised and effective way. It provides a sound foundation for those new to the topic whilst at the same time offering new insights to those with more experience. The programme emphasises the need for a clear definition of requirements combined with the ability to communicate those requirements effectively to third parties. A structured method of preparing specifications is provided, and a range of practical techniques is presented, to enable participants to put the principles into practice. The commercial and contractual role of specifications is also addressed. The objectives of the workshop are to: Provide a clear understanding of the role and purpose of specifications Present a framework for organising and producing specifications Define the key steps involved in creating effective specifications Demonstrate methods for assisting in defining requirements Provide tools and techniques for scoping and structuring specifications Show the role of specifications in managing variations and changes to scope Present methods to assist the writing and editing of specifications Review how specifications should be issued and controlled DAY ONE 1 Introduction Review of course objectives Review of participants' needs and objectives 2 Creating effective specifications The role of specifications in communicating requirements The costs, benefits and qualities of effective specifications Understanding the differences between verbal and written communication The five key steps of 'POWER' writing: prepare-organise-write-edit-release Exercise: qualities of an effective specification 3 Step 1: Preparing to write - defining readership and purpose; the specification and the contract Designing the specifications required; applying BS 7373 Defining the purpose, readership and title of each document Effective procedures for writing, issuing and controlling specifications The roles and responsibilities of the key players Understanding contracts; the contractual role of the specification Integrating and balancing the technical and commercial requirements Writing specifications to achieve the appropriate contract risk strategy Deciding how to specify: when to use functional and technical specifications The role of specifications in managing variations and changes to scope 4 Case study 1 Teams review a typical project scenario and identify the implications for the specification Feedback and discussion 5 Step 2: Organising the specification content Defining the need and establishing user requirements Deciding what issues the specification should cover Scoping techniques: scope maps, check lists, structured brainstorming Clarifying priorities: separating needs and desires Dealing with requirements that are difficult to quantify Useful techniques: cost benefit analysis, QFD, Pareto analysis 6 Case study 2 Teams apply the scoping techniques to develop the outline contents for a specification Feedback and discussion DAY TWO 7 Step 2: Organising the specification content (cont) Deciding what goes where; typical contents and layout for a specification The three main segments: introductory, key and supporting Creating and using model forms: the sections and sub-sections Detailed contents of each sub-section Tools and techniques for outlining and structuring specifications 8 Case study 3 Teams develop the detailed specification contents using a model form Feedback and discussion 9 Step 3: Writing the specification The challenges of written communication Identifying and understanding the readers needs Choosing and using the right words; dealing with jargon Problem words; will, shall, must, etc; building a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity Being concise and ensuring clarity Choosing and using graphics to best effect Exercises and examples 10 Step 4: Editing the specification Why editing is difficult; how to develop a personal editing strategy Key areas to review: structure, content, accuracy, clarity, style and grammar Editing tools and techniques 11 Step 5: Releasing and controlling the specification Key requirements for document issue and control Final formatting and publication issues; document approval Requirements management: managing revisions and changes 12 Course review and action planning What actions should be implemented to improve specifications? Conclusion

Creating effective specifications (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Autodesk 3ds Max Training One-to-One, Online or Face-to-Face Options

By Real Animation Works

Customized and Bespoke 3ds Max Training: Face-to-Face and Online Options

Autodesk 3ds Max Training One-to-One, Online or Face-to-Face Options
Delivered in London or OnlineFlexible Dates
£380