• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6972 Power courses delivered Online

Introduction to Windows 10 and Microsoft Office

By Nexus Human

Duration 0.625 Days 3.75 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge of Windows 10 and Microsoft Office. Course Outline Introduction to the Windows 10 Desktop Managing Files and Folders in Windows 10 Word 2016 Ribbon and Navigation Excel 2016 Ribbon and Navigation PowerPoint 2016 Ribbon and Navigation Outlook 2016 Email/Calendar/Contacts Basics (lecture/demo only)

Introduction to Windows 10 and Microsoft Office
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Diagnostics and Troubleshooting

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.

Symantec ProxySG 6.6 Diagnostics and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. This class is powered by Cloud Harmonics. Course Outline Module 1 - Solution Overview Module 2 - Branch Design Module 3 - Routing Module 4 - Policy Module #1 - Application Path and QoS Policy Module 5 - Policy Module #2 - NAT, ZBFW and Security Module 6 - Event Policy Management Services Module 7 - DNS and DHCP Services Module 8 - Operations and Troubleshooting Module 9 - CloudBlades Module 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation Module 11 - DevOps Module 12 - Next Steps

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)
Delivered OnlineFlexible Dates
Price on Enquiry

C)PEH - Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks

C)PEH - Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco SDA Fundamentals v1.0 (SDAFND)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Field engineers Network engineers Network administrators System engineers Overview After taking this course, you should be able to: Describe Cisco SD-Access architecture and its components Explain Cisco DNA Center deployment models, scaling, and high availability Identify Cisco SD-Access fabric protocols and node roles Understand the Cisco SD-Access Wireless deployment models Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP Deploy simple Cisco SD-Access fabric networks Monitor health and performance of the network with Cisco DNA Center Assurance Interact with the Cisco DNA Center Platform Intent APIs The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco© Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks.You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFNDwill introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks. Course Outline Introducing Cisco SD-Access Introducing Cisco DNA Center Exploring Cisco SD-Access Solution Components Exploring Cisco SD-Access Wireless Architecture Automating Network Changes with Cisco DNA Center Deploying Fabric Networks with Cisco DNA Center Exploring Cisco DNA Center Assurance Exploring Cisco DNA Center Programmability

Cisco Understanding Cisco SDA Fundamentals v1.0 (SDAFND)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Analytics with Python

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Before taking this course delegates should already be familiar with basic analytics techniques, comfortable with basic data manipulation tools such as spreadsheets and databases and already familiar with at least one programming language Overview This course teaches delegates who are already familiar with analytics techniques and at least one programming language how to effectively use the programming language for three tasks: data manipulation and preparation, statistical analysis and advanced analytics (including predictive modelling and segmentation). Mastery of these techniques will allow delegates to immediately add value in their work place by extracting valuable insight from company data to allow better, data-driven decisions. Outcomes: After completing the course, delegates will be capable of writing production-ready R code to perform advanced analytics tasks enabling their organisations make better, data-driven decisions. Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. These programming languages are some of the most powerful and flexible tools in the data analytics toolkit. Topic 1 Intro to our chosen language Topic 2 Basic programming conventions Topic 3 Data structures Topic 4 Accessing data Topic 5 Descriptive statistics Topic 6 Data visualisation Topic 7 Statistical analysis Topic 8 Advanced data manipulation Topic 9 Advanced analytics ? predictive modelling Topic 10 Advanced analytics ? segmentation

Advanced Analytics with Python
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Operating Cisco IP Fabric for Media Solution v2.0 (IPFMSN)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for broadcast engineers. It might also be of interest to technical solution architects, network engineers, and network administrators. Overview After taking this course, you should be able to: Describe the overall solution and how it works, and identify all components of the solution and their functions Understand initial sizing and capacity Understand the basic requirements for IPFM Understand how Non-Blocking Multicast (NBM) and multicast function in the IPFM Understand and verify Precision Time Protocol (PTP) clocking Describe the DCNM Media Controller Demonstrate the DCNM Media Controller configuration and verification Explain how to deploy an IPFM solution in a high-availability manner Use the DCNM Media Controller to monitor fabric and to troubleshoot basic connectivity and performance issues Understand the approach and basic steps involved in responding to alarms and other notifications The Operating Cisco IP Fabric for Media Solution(IPFMSN) v2.0 course introduces you to the Cisco© IP Fabric for Media (IPFM) solution. The course is designed for broadcast engineers who will use IP technologies to replace Serial Digital Interface (SDI)-based deployments. You will learn about Cisco IPFM deployment, operation, and troubleshooting.The course also covers the Data Center Network Manager (DCNM) Media Controller, a core component of the Cisco IPFM solution. Through lab exercises that focus on building IP fabric as a baseline for a complete IPFM solution, you will learn how to deploy and troubleshoot the DCNM Media Controller to control flows through the fabric. Course Outline Introducing Cisco IP Fabric for Media Media over IP Standardization Designing Cisco IPFM Solution Building Cisco IP Fabric for Media Exploring Non-Blocking Multicast in Cisco IPFM Describing Cisco DCNM Introducing Cisco DCNM PowerOn Auto Provisioning (POAP) Process Implementing Cisco DCNM Flow and Host Policies Precision Time Protocol Cisco IPFM Operations, Administration, and Management Cisco IPFM High Availability Monitoring and Troubleshooting Cisco IPFM Operation

Cisco Operating Cisco IP Fabric for Media Solution v2.0 (IPFMSN)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

HA301 SAP HANA 2.0 SPS04 Advanced Modeling

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Business application consultant Data Consultant / Manager Database Administrator Application developer BI specialist Overview This course will prepare you to: Understand and put into practice the main advanced modeling capabilities of SAP HANA 2.0 SPS04 in the areas of text search and analysis, graph modeling, spatial analysis and predictive modeling. Promote these advanced modeling capabilities to extend the core SAP HANA Modeling features. Broaden your experience with the modern SAP HANA tooling in XS Advanced (SAP Web IDE for SAP HANA) This course provides advanced knowledge and practical experience on several topics that are included in, or connected to, the scope of the modeler role. Its purpose is to take a step further, beyond the core modeling knowledge from HA300, and to demonstrate how applications powered by SAP HANA can benefit from innovations such as Spatial Data Storage and Processing, Text Search and Analysis, Predictive Analysis and Graph Modeling.The course is supported by many demos and exercise, which demonstrate the advanced modeling capabilities in several scenarios. For example, working with classical schemas or HDI containers in XS Advanced, using the SQL console, developing graphical models. Some of the proposed case studies blend together several modeling capabilities, such as text with spatial, or text with graph.An introduction to SAP HANA Series Data is also provided. Introduction to Advanced ModelingSAP HANA Predictive Analysis Library (PAL) Describing SAP HANA PAL Using PAL in Flowgraphs Calling PAL Functions in Calculation Views Calling PAL Procedures in SQL Scripts Exploring the PAL Library SAP HANA Spatial Introducing SAP HANA Spatial Working with Spatial Data Types Importing and Exporting Spatial Data Accessing and Manipulating Spatial Data Using Spatial Clustering SAP HANA Graph Defining SAP HANA Graph Workspace Describing the Different Graph Algorithms Using the Graph Node in Calculation Views Using GraphScript Procedures SAP HANA Text Understanding Full Text Search Understanding Text Analysis Understanding Text Mining SAP HANA Series Data Getting Started with SAP HANA Series Data

HA301 SAP HANA 2.0 SPS04 Advanced Modeling
Delivered OnlineFlexible Dates
Price on Enquiry