Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Data Consultants/Managers, and Solution Architects. Overview Students will set up and deliver their own master data from SAP ERP to SAP SCM (APO), and make any necessary master data enhancements to ensure proper planning results in APO.Students will complete the modeling of their supply chain by creating APO master data that is necessary to activate a fully functional Supply Chain in APO. In this course, students learn how to set up and configure the standard interface between the SAP ERP system and SAP SCM with focus on SAP APO. Integration for Supply Chain Modeling Integrating SAP ERP and SAP SCM Configuring an Integration Model Using Monitoring and Error-Processing Tools Setting Up Incremental Data Transfers for Master Data Changes Organizing Integration Models Performing Routine Operations with Background Processing Supply Chain Locations Managing Locations Integrating Plant Data Integrating MRP Areas Managing Transportation Zones Integrating Customers as Locations Integrating Vendors as Locations Integrating Factory Calendars and Time Streams Supply Chain Products Integrating Products Maintaining Product Data External Procurements Relationships Integrating Purchasing Information Records Integrating Scheduling Agreements Network Modeling Creating Means of Transportation Creating Transportation Lanes Supply Chain Resources Integrating Production Resources Creating Supply Chain Management (SCM)-Specific Resources Integrating Capacity Variants Integrating Setup Groups and Matrices Manufacturing Process Modeling Preparing Integration of Master Data Mapping Bill of Materials (BOM) Fields Mapping the Routings Fields Integrating Production Master Data Transferring a Master Recipe to a Production Process Model (PPM) Transferring Characteristics and Classes Quota Arrangement Creating Quota Arrangements Supply Chain Modeling Creating an SAP liveCache Model Creating a Version in SAP SCM Using the Supply Chain Engineer (SCE) Transactional Data Integration Integrating Transactional Data Supply Chain Subcontracting Preparing Master Data for Subcontracting
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 2 Days 12 CPD hours This course is intended for Built for those supporting a Citrix Virtual Apps and Desktops solution in a help desk or service desk capacity. An ideal candidate for this course interacts with end users to troubleshoot and resolve issues. Overview How to support end-users connecting to Citrix Virtual Apps and Desktops through Citrix Workspace App. How to use Citrix Director to gather information and interact with user sessions. A methodology to approach user related issues to minimize time to resolution. An understanding of the Citrix Virtual Apps and Desktops solution and the role of the components Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team. Gain foundational knowledge about the Citrix Virtual Apps and Desktops technology and an understanding of how components interact. You will learn about each component focusing on common user related issues that may arise, and how to apply a methodical approach to solve them using real world scenarios. By the end of the course, you will be able to solve or escalate end-user issues appropriately Fundamental Architecture for the Help Desk Role Citrix Site Infrastructure and Deployment Models The Help Desk Role in the Fundamental Architecture Problem Resolution Methodology Citrix Director and its role in Help Desk Support Citrix Director Role and Purpose Access to Director for Help Desk Administrators Common Director Monitoring Tasks Common Help Desk AdministratorTroubleshooting Tasks Providing and Troubleshooting End User Access End User Access Overview Components between end users and published resources on VDAs User Experience Support End User Access Citrix Workspace App Workspace App Types Deploying Citrix Workspace app Pass though Authentication Supporting Citrix Workspace App User Sessions FlexCast Architecture User Sessions App and Desktop Launch Process User Profiles HDX Technologies Printing Introduction to Printing Printing Components Overview Supporting Printing
Duration 5 Days 30 CPD hours This course is intended for This course is intended for both novice and experienced programmers. Some experience in C++, C# or Java is helpful. Overview After completing this course, you will be able to: Write and test JavaScript code in modern browsers. Understand and work with the browser's Document Object Model (DOM). Work DOM objects and write code to respond to events. Add jQuery to their projects and use jQuery to manipulate the DOM and to make Ajax calls. Understand Ajax and Web Services, including HTTP Verbs and asynchronous Ajax calls. Work with XML and JSON data formats. Understand and use RESTful Web Services including ODATA queries. Work with Anonymous Functions, Self-Invoking Functions and Closures. Understand the role of the Window and Navigator objects. Describe and understand variables, 'variable hoisting', and JavaScript objects. This course is an in depth hands-on study of JavaScript. The course includes detailed hands-on labs and Q&A labs. The labs include multiple projects that update an existing web site. This course is similar to the retired Course 20480: Programming in HTML5 with JavaScript and CSS3. Module 1: Basic Scripting JavaScript Basics JavaScript or ECMAScript? Which Version of JavaScript am I Using? Shims, Shivs, and Polyfills Writing and Testing JavaScript Editors and the F12 Tools Key Parts of a Script Module 2: The Document Object Model The DOM Accessing Objects from the DOM Responding to Events Adding Elements to the DOM Module 3: Introduction to jQuery jQuery Downloading the jQuery Library jQuery Versions Linking to the Library Selecting Elements using jQuery Working with the Data Returned by jQuery Setting CSS Properties Running a Function Against the jQuery Return Set Module 4: Ajax and Web Services Web Services HTTP Verbs Data Formats ? XML and JSON Ajax RESTful Web Services OData OData Queries OData Updates Module 5: Diving in Deeper Is JavaScript Compiled? Data Types and Objects Extending Data Types Variables, Scopes and Hoisting Functions The ?this? Keyword Errors Recursion
Duration 3 Days 18 CPD hours This course is intended for This course is intended for application administrators, developers, IT leaders, and application architects. Overview As a result of attending this course, students should be able to configure, secure, and manage a Red Hat JBoss AMQ 7.0 broker to create and integrate message-driven applications. Red Hat© AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer the message broker, Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. This course is based on Red Hat JBoss AMQ 7.0. Red Hat JBoss AMQ, part of the Red Hat application integration suite, provides application administrators, software architects, and developers the ability to integrate disparate applications in a decoupled manner using enterprise messaging paradigms. Providing a highly performant and robust message broker, router, and client libraries for numerous languages, Red Hat JBoss AMQ is the solution for asynchronous and synchronous messaging. Red Hat AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. Course introduction Introduce and review the course. Install the broker Install JBoss AMQ, create a broker instance, and verify connectivity to the instance. Configuration Configure message addresses and queues. Secure access to the broker Configure authentication, authorization, and encryption on the broker. Configure broker persistence Configure zero, file-based, and database-backed persistence. Manage broker resource consumption Configure the broker to limit memory and other resource consumption. Implement broker clustering, high availability, and failover Create a scalable and highly available cluster of brokers. Monitor and manage the broker Monitor and manage broker resources using logging and the web console. Route messages to brokers Install JBoss AMQ interconnect and configure routes to brokers. Comprehensive review of Red Hat AMQ administration Configure Red Hat JBoss AMQ brokers and verify proper operation.
Duration 5 Days 30 CPD hours This course is intended for Database Administrators Data Warehouse Administrator Support Engineer Technical Consultant Technical Administrator Overview Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure. Describe the Oracle Database architecture components related to backup and recovery operations. Plan effective backup and recovery procedures. Configure the database for recoverability. Use Recovery Manager (RMAN) to create backups and perform recovery operations. Use the Data Recovery Advisor to diagnose and repair failures. Use Oracle Flashback Technologies to recover from human error. Perform an encrypted database backup and restore. Perform tablespace point-in-time recovery. Describe additional high availability features such as Oracle Data Guard. This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll develop appropriate strategies for backup, restore and recovery procedures from provided scenarios. This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll develop appropriate strategies for backup, restore and recovery procedures from provided scenarios. Additional course details: Nexus Humans Oracle Database 12c - Backup and Recovery Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c - Backup and Recovery Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This class is intended for the following: Individuals preparing for the Associate Cloud Engineer examination. Recommended experience: 6 months+ hands-on experience with GCP This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos, and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan. This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge, but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan.
Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 1 Days 6 CPD hours This course is intended for his course is designed to provide a preview of Red Hat Enterprise Linux 8 to experienced IT professionals, including: Linux system administrators, DevOps engineers, and Cloud administrators. Overview In this course, you will use the Microsoft 365 productivity apps to work collaboratively with others. You will: Identify the Microsoft 365 apps. Create a team and conduct online meetings with Microsoft Teams. Create a plan and manage team activities with Planner. Use Forms to create a form and collect responses. Post, organize, and view videos in Stream. Use Sway to create digital stories and content. Automate your workflow by connecting apps with Power Automate. This course builds on your foundational knowledge of the Microsoft© 365 core apps and takes a deeper look at some of the productivity apps beyond Microsoft Word, Excel©, and PowerPoint©. Knowing that productivity often begins with assembling the right people, this course starts with the Teams© app that is used to collaborate on shared files and conduct online meetings. The connection between Planner and Teams is established to keep the group's work on schedule. The Forms app is introduced as a tool for collecting information that can be used to help determine your next course of action. The apps designed to handle media assets are introduced: Stream to manage video resources and Sway© to create digital stories. Finally, the power of automating your work processes is introduced in Power Automate, with students using the built-in templates as a starting point. For those interested in the Power BI© and Power Apps© features, a brief overview of these apps is included in an appendix. Overview of the Office 365 Apps Navigate in Office 365 Identify How the Office 365 Apps Work Together Collaborating with Microsoft Teams Navigate the Teams Interface Create a Team Meet in Microsoft Teams Managing Activities with Planner Navigate the Planner Interface Create a Plan Gathering Information with Forms Create a Form Share Forms and Collect Responses Managing Video Resources with Stream Navigate the Stream Interface Post and Organize Videos in Stream Using Sway to Create Digital Stories Navigate the Sway Interface Create a Sway Automating Your Work with Flow Navigate the Flow Interface Create and Share a Flow