Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. Course Outlines DEFINING CISCO IOT IOT NETWORKING AND OTHER DEVICES EXAMINING IOT PROTOCOLS EXAMINING IOT STANDARDS RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS USING PROGRAMMABILITY WITH CISCO IOT DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR DEFINING CISCO SECURITY APPLICATIONS Lab outline Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API Additional course details: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Java programmers and have worked with databases and with object-oriented programming techniques, who are now ready to create more complex and advanced programs using Java SE 7. Overview Upon successful completion of this course, students will be able to: - create and manage custom classes. - control program flow by writing code to respond to specific criteria. - implement object-oriented programming techniques to create reusable and reliable programs. - work with Java utility class libraries. - use the capabilities of the Java I/O package to read and write data to external files or media. - use collection APIs in Java to manage data. - use generics to enforce compile-time type checking. - use multi-threaded programs to help handle multiple tasks concurrently. - manage Java applications for memory efficiency and create distributable versions of a Java application. Students will work with advanced features of Java. Working with Classes Create Classes Create Variables Write an Expression Work with Arrays Work with Static Class Members Define Methods Use Enumerated Data Types Controlling Program Flow Work with Conditional Statements Work with Looping Statements Handle Exceptions Handle Chained Exceptions Write and Enable Assertions Implementing Object-Oriented Programming Concepts Extend a Class Overload and Override Methods Work with Interfaces Create Inner Classes Examine Object-Oriented Design Concepts Working with Java Utility Class Libraries Work with Strings Format and Parse Strings Work with Dates, Numbers, and Currencies Using the Java I/O Package Work with the File Class Work with Byte Streams Work with Character Streams Read Files Write to a File Manipulate I/O Objects Using Collections Work with the Collection Interface Work with the Set Collection Work with List Collections Work with Queues Work with the Map Collection Work with Collection Utilities Working with Generics Declare Generics Implement Generics Using Multi-Threaded Programs Create a Multi-Threaded Program Synchronize Threads Managing Java Applications Implement Garbage Collection Deploy a Java Application Additional course details: Nexus Humans Java Programming (Java SE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Programming (Java SE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Data Science for Marketing Analytics is designed for developers and marketing analysts looking to use new, more sophisticated tools in their marketing analytics efforts. It'll help if you have prior experience of coding in Python and knowledge of high school level mathematics. Some experience with databases, Excel, statistics, or Tableau is useful but not necessary. Overview By the end of this course, you will be able to build your own marketing reporting and interactive dashboard solutions. The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you'll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.As you make your way through the course, you'll explore ways to evaluate and select the best segmentation approach, and go on to create a linear regression model on customer value data to predict lifetime value. In the concluding sections, you'll gain an understanding of regression techniques and tools for evaluating regression models, and explore ways to predict customer choice using classification algorithms. Finally, you'll apply these techniques to create a churn model for modeling customer product choices. Data Preparation and Cleaning Data Models and Structured Data pandas Data Manipulation Data Exploration and Visualization Identifying the Right Attributes Generating Targeted Insights Visualizing Data Unsupervised Learning: Customer Segmentation Customer Segmentation Methods Similarity and Data Standardization k-means Clustering Choosing the Best Segmentation Approach Choosing the Number of Clusters Different Methods of Clustering Evaluating Clustering Predicting Customer Revenue Using Linear Regression Understanding Regression Feature Engineering for Regression Performing and Interpreting Linear Regression Other Regression Techniques and Tools for Evaluation Evaluating the Accuracy of a Regression Model Using Regularization for Feature Selection Tree-Based Regression Models Supervised Learning: Predicting Customer Churn Classification Problems Understanding Logistic Regression Creating a Data Science Pipeline Fine-Tuning Classification Algorithms Support Vector Machine Decision Trees Random Forest Preprocessing Data for Machine Learning Models Model Evaluation Performance Metrics Modeling Customer Choice Understanding Multiclass Classification Class Imbalanced Data Additional course details: Nexus Humans Data Science for Marketing Analytics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data Science for Marketing Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developed for IT Professionals interested in learning how to manage Citrix Endpoint Management on-premises or cloud environments using leading practices. Potential students include Administrators and Implementers. Overview How to manage a Citrix Endpoint Management implementation in a On-premises or cloud environment How to perform common enterprise mobility management tasks and mobile application managementUnderstand the device enrollment processHow to perform monitoring, troubleshooting, and reporting on a Citrix Endpoint Management Enterprise solution Students will explore how to manage Citrix Endpoint Management in this course. Venture into the cloud as students learn to manage devices, apps, and users. Students will learn how the architecture, management, and communication flow function with Citrix Endpoint Management Service and how they can fit their organization?s needs. Students will learn how to administer their Citrix Endpoint Management environment and how to support your end users, as well as working with applications and securing a variety of endpoints. Introduction to Citrix Endpoint Management Citrix Endpoint Management Features Citrix Cloud and Citrix Endpoint Management Citrix Endpoint Management User Experience and Security Citrix Endpoint Management Entitlements Citrix Endpoint Management Architecture Citrix Endpoint Management Prerequisites Citrix Endpoint Management Server Citrix Endpoint Management and Microsoft Intune Apple APNs and Google Firebase Cloud Messaging MDX Architecture and Features Cloud Components Cloud Component Overview Onboarding and Access Cloud Connector and Cloud Resource Locations Cloud Migration Cloud Updates and Features Common Device Management Tasks Administrative Console Overview Delivery Groups Device Policies Device Enrollment Enrollment Methods iOS Device Enrollment Android Device Enrollment Windows 10 Enrollment Other Devices Managing Device Security Security Policies Automated Actions Android for Work ActiveSync Filtering Shared Devices Working with Apps Application Integration Citrix Endpoint Management Productivity Apps Application Security with MDX 3rd Part Applications Integrating Citrix Content Collaboration Citrix Content Collaboration Overview Integrating Citrix Endpoint Management with Content Collaboration Content Collaboration Workflows Maintaining and Troubleshooting Maintaining Citrix Endpoint Management Maintaining Certificates Troubleshooting Citrix Gateway (formerly NetScaler Gateway) Troubleshooting Tools for Citrix Productivity Apps Firewall Issues Monitoring and Reporting Monitoring and Reporting of Devices Monitoring and Reporting of Citrix Content Collaboration Additional course details: Nexus Humans CEM-205 Manage Citrix Endpoint Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CEM-205 Manage Citrix Endpoint Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolution designers Overview After taking this course, you should be able to:Describe the Cisco IOS XR software architecture, high availability components, and scalability featuresPerform basic configurations on a Cisco IOS XR routerDescribe Cisco IOS XR software operationsDescribe the configuration file systemPerform Cisco IOS XR software installationsConfigure AAA servicesConfigure NTPConfigure Simple Network Management Protocol (SNMP), telemetry, and loggingConfigure routing protocolsMonitor processesUse error messages and core dumps he Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco© Internetwork Operating System (Cisco IOS©) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Cisco IOS XR Software Overview Platform Overview Cisco IOS XR Architecture Cisco IOS XR High Availability Cisco IOS XR Software Configuration Basics Cisco IOS XR Configuration Operations Cisco IOS XR Initial Configuration Reviewing the Configuration Cisco IOS XR Software Operations Examining Configuration Operations Examining Configuration Rollback and Recovery Configuration File System Overview Examining the Binary Configuration Examining the Commit Database Examining the ASCII Configuration Examining the Nonvolatile Generation (NVgen) Files Verifying Cisco Fabric Services (CFS) Integrity Cisco IOS XR Software Installation Software Package Basics Installing Software Packages AAA Security AAA Fundamentals Task-Based Security Configuring a User Security Policy Authentication with Remote Servers Configuring Router to AAA Server Communication Configuring Authentication Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization Configuring Accounting AAA Troubleshooting Network Time Synchronization Network Time Protocol SNMP, Telemetry, and Logging Examining SNMP Examining Telemetry Examining Logging Basic Routing Configuration Configuring Intermediate System to Intermediate System (IS-IS) Configuring Open Shortest Path First (OSPF) Configuring Border Gateway Protocol (BGP) Configuring Routing Protocol for LLN (RPL) Policy Packet Filtering Access Control Lists Unicast Reverse Path Forwarding Management Plane Protection Monitoring Process Examining Processes and Threads Process Crashes Commands for Debugging Processes Restartability of Processes Process Monitoring Identifying Memory Problems Memory Depletion Core Dumps Core Dump Fundamentals Using Core Dump Information Additional course details: Nexus Humans Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview Learn how to initiate a root cause analysis and gather data for investigating process and non-process incidentsDemonstrate how to collect data through interviews and analysisApply powerful techniques to identify and know the difference between symptoms and root causesLearn to know when to use the appropriate technique in root cause identification Learn how to avoid future incidents by developing appropriate recommendations to address causal factors and root causes Develop a process to identify systemic problem areas In this course, participants will learn to apply several practical, systematic methods for analyzing incidents and problems to uncover root causes. Understanding of these techniques will be reinforced by classroom exercises. Introduction & Objectives What is a 'Problem?' Why Problems Persist What is A Root Cause? Why Root Causes are important How to Organize for an RCA RCA Roles and Responsibilities Assemble your RCA Team Modes of Communication How to Resolve Conflict Case Study Exercise Select the Problem to Analyze Define the selection criteria Plan and estimate tasks for the team Finalize the plan and gain agreement among your stakeholders Case Study Exercise Define the Problem What to look for - Problem-as-Given (PAG) vs. Problem-as-Understood (PAU) Developing your problem statement Refining the problem specification Case Study Exercise Identify the Source of the Problem Discuss when to use the appropriate analysis technique to determine the problem source Process Diagram Forms & Checklists Statistical Sampling Fishbone Diagram Surveys Charts - Line, Scatter, Bar, & Pie Case Study Exercise Solution Options Analysis & Selecting the 'Best Fit' How to approach different solution options Brainstorming Weighted Evaluation Selecting the appropriate option Hold an Retrospective on your approach Planning the proposal Case Study Exercise Putting RCA into Practice Create a Root Cause Analysis program within your organization How to develop appropriate recommendations to address root causes at various levels to avoid future incidents Additional course details: Nexus Humans BA10 - Understanding Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA10 - Understanding Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Teach participants the basic functions of inventory management and physical inventory, and how to create different goods movements in the SAP system.Familiarize participants with the special functions of inventory management and physical inventory, and the Customizing settings relevant to inventory management and physical inventory. This course will give students an overview and in depth knowledge of the inventory management process in SAP. After attending this class, students will understand the major business processes, functions & configuration in inventory management. Introduction to Inventory Management Defining Inventory Management and Physical Inventory Moving Goods with the MIGO Transaction Goods Receipts (GRs) Posting a GR Without Reference Posting a GR with Reference Posting a GR with Automatic Generation of a PO Posting Cancellations, Return Deliveries, and Returns Applying Order Price Unit in Inventory Management Applying Tolerances and the Delivery Completed Indicator Adding Date Checks to GRs for a PO Stock Transfers and Transfer Postings Performing Transfer Postings Performing Stock Transfers Between Storage Locations Performing Stock Transfers Between Plants Reservations Creating Manual Reservations Evaluating Reservations Checking Availability and Missing Parts Goods Issues (GIs) Posting Unplanned GIs Posting a GI with Reference Configuring Stock Determination Allowing Negative Stock Special Forms of Procurement and Special Stocks Performing the Process of Subcontracting Performing Vendor Consignment Operating Pipeline Processes Posting Goods Movements for Special Stocks Special Features of Material Valuation Posting Goods Movements for Material Types UNBW and NLAG Configuring Split Valuation Physical Inventory Conducting Physical Inventory Analyzing the Determination of Book Inventory Simplifying Physical Inventory Applying Cycle Counting Applying Inventory Sampling Analyses Applying Stock Lists and Document Lists Applying Periodic Processing Customizing Implementing Settings for Documents Setting Up Movement Types Applying Other Customizing Settings Logistics Execution Managing Logistics Execution Processes Posting a GR Against a PO Posting a GI for a Sales Order Additional course details: Nexus Humans SCM510 SAP Inventory Management and Physical Inventory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM510 SAP Inventory Management and Physical Inventory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Participants are any IT specialist eager to become an industry recognized expert on Veeam software solutions:System Engineer / Administrator Backup / Virtualization Administrators Pre-Sales / Post-Sales / Solution Architects / Consultants Overview This certification is an excellent investment for an IT professional looking to increase productivity, reduce operating costs, increase potential for personal career advancement and gain recognition from the employer and customers. By completing the Veeam Certified Engineer (VMCE) course you should be able to:Get more functionality out of Veeam solutionsIdentify and resolve issues more efficientlyGain a distinction from your peers The Veeam Certified Engineer (VMCE) course is a 3 day technical deep-dive focused on teaching consultants and engineers to architect, implement, optimize and troubleshoot the Veeam software solution. Introduction Introduction Overview of Veeam products Hypervisor Support Veeam Backup & Replication key features Veeam One key features Veeam Management Pack vCloud Director Support Key concepts Backup Methods Scheduling Changed Block Tracking (CBT) Compression and Deduplication Retention Policy Veeam ONE features and functionality Auto Discovery of Backup and Virtual Infrastructure Business Categorization Pre-Defined Alerting Unattended monitoring Reporting and dashboards Agentless data gathering Hyper-V specific features Veeam One Deployment Veeam One assessment Tool Deployment Solution Architecture Deployment Scenarios Prerequisites Upgrading Veeam Backup & Replication Initial Configuration Adding Servers Adding a VMware Backup Proxy Adding a Hyper-V Offhost Backup Proxy Adding Backup Repositories Performing Configuration Backup and Restore Getting to Know User Interface Performing Backup Creating Backup Jobs Creating VM Copy Jobs Instant VM Recovery Replication (Replication Job, Failover, Failback) Insight into Replication Insight into Failover Insight into Failback SureBackup, SureReplica SureBackup Recovery Verification SureReplica Restore your VMs and Objects Data Recovery Restoring Microsoft Exchange and SharePoint objects Working with Veeam Backup & Replication Utilities 3-2-1 rule (Backup to tape, WAN, Backup Copy) Wan Accelerator Offsite Backup Copy Job Delegate file and VM restores with Veeam Backup Enterprise Manager Veeam Backup Enterprise Manager RESTful API HP StoreVirtual VSA Product Editions Product Editions Comparison Full and Free Troubleshooting How to review and analyze the issue Search for additional information Veeam Support Additional course details: Nexus Humans Veeam Certified Engineer (VMCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Certified Engineer (VMCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.