Duration 4 Days 24 CPD hours This course is intended for A Dynamics 365 Business Central core Functional Consultant is responsible for implementing core application setup processes for small and medium businesses. Overview Understand use cases for Business Central modules Set up Business Central Configure Financials Configure Sales and Purchasing Configure Operations Understand Integrationa nd Automation scenarios Built and optimized for small and medium businesses, Dynamics 365 Business Central is an application for companies that have outgrown their entry-level business applications. Growing businesses often outgrow their basic accounting software or legacy enterprise resource planning (ERP) systems that are unable to handle increased inventory and transactions, lack integration with other line-of-business systems, and have reporting limitations. Businesses are also challenged with the logistics of providing services that have more scalability, increased mobility, and availability in the cloud. With Business Central, you can manage your financials, automate and secure your supply chain, sell smarter, improve customer service and project performance, and optimize your operations. Introduction to Business Central Modules Introduction to Business Central Technology overview Navigate the user interface Master data for the Sales and Purchase process Application Setup Create and configure a new company Migrate data to Business Central Manage Security Set up core app functionality Set up dimensions Configure Financials Set up Finance Management Set up the Chart of Accounts Set up posting groups General Journals Set up Cash Management Set up Accounts Payables Set up Accounts Receivables Configure Sales and Purchasing Set up Inventory Configure prices and discounts Operations Purchase items Sell items Process financial transactions Inventory costing Integration and Automation Set up and use approvals with workflows Connect Power Apps Connect Power Automate Connect Power BI
Duration 2 Days 12 CPD hours This course is intended for This in an Introductory and beyond level course is geared for experienced Java developers seeking to be proficient in Apache Kafka. Attendees should be experienced developers who are comfortable with Java, and have reasonable experience working with databases. Overview Working in a hands-on learning environment, students will explore Overview of Streaming technologies Kafka concepts and architecture Programming using Kafka API Kafka Streams Monitoring Kafka Tuning / Troubleshooting Kafka Apache Kafka is a real-time data pipeline processor. It high-scalability, fault tolerance, execution speed, and fluid integrations are some of the key hallmarks that make it an integral part of many Enterprise Data architectures. In this lab intensive two day course, students will learn how to use Kafka to build streaming solutions. Introduction to Streaming Systems Fast data Streaming architecture Lambda architecture Message queues Streaming processors Introduction to Kafka Architecture Comparing Kafka with other queue systems (JMS / MQ) Kaka concepts : Messages, Topics, Partitions, Brokers, Producers, commit logs Kafka & Zookeeper Producing messages Consuming messages (Consumers, Consumer Groups) Message retention Scaling Kafka Programming With Kafka Configuration parameters Producer API (Sending messages to Kafka) Consumer API (consuming messages from Kafka) Commits , Offsets, Seeking Schema with Avro Kafka Streams Streams overview and architecture Streams use cases and comparison with other platforms Learning Kafka Streaming concepts (KStream, KTable, KStore) KStreaming operations (transformations, filters, joins, aggregations) Administering Kafka Hardware / Software requirements Deploying Kafka Configuration of brokers / topics / partitions / producers / consumers Security: How secure Kafka cluster, and secure client communications (SASL, Kerberos) Monitoring : monitoring tools Capacity Planning : estimating usage and demand Trouble shooting : failure scenarios and recovery Monitoring and Instrumenting Kafka Monitoring Kafka Instrumenting with Metrics library Instrument Kafka applications and monitor their performance
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview Participants learn how production orders are used, and which main system setting must be made for production order execution. In this course, students learn how production orders are used and which main system setting must be made for production order execution. Introduction to Production Orders Outlining SAP Supply Chain Management Outlining Production Orders Applying Production Orders in Supply Chain Management Order Processing and Order Structure Processing Production Orders Analyzing the Production Order Structure Order Creation Creating Production Orders Without Master Data Creating Production Orders Based on Planned Orders Creating Production Orders Without Planned Orders Defining Order Types Creating Production Orders with Master Data Scheduling Production Orders Costing of Production Orders Order Release Checking Material Availability Checking Capacity Availability Checking Production Resource/Tool Availability Planning Capacities Releasing Production Orders Order Documents Setting Up Order Print Control Printing Production Orders Material Staging Staging Material Withdrawing Material Confirmations Setting Parameters for Confirmations Executing Confirmations Good Receipt Preparing Goods Receipts Posting Goods Receipts Order Settlement, Archiving, & Deletion Settling Production Orders Archiving and Deleting Production Orders Information Systems and Automation Applying Information Systems Automating Production Orders and Mass Processing Applying Collective Orders Applying Trigger Points Extended Functionality and Enhancements Applying Order Split Applying Shift Reports and Shift Notes Applying Work-in-Process (WIP) Batches Applying SAP Execution Steps (XSteps) for Routings and Production Orders Outlining the Production Planning-Plant Data Collection (PP-PDC) Interface Outlining SAP Manufacturing Integration and Intelligence (SAP MII) in Shop Floor Control Applying Handling Units in Production
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as: Consulting Systems Engineer Deployment Engineer Network Administrator Network Manager Network Engineer Site Reliability Engineer Systems Engineer Technical Solutions Architect Wireless Design Engineer Wireless Engineer Overview After completing the course, you should be able to: Plan new Cisco Meraki architectures and expand existing deployments Design the network for scalable management and high availability Describe how to automate and scale Meraki deployments with dashboard tools Use dynamic routing protocols to expand networks and improve WAN performance Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them Secure, expand, and shape the network Implement switched network concepts and practices, and configure guests networks Implement wireless configurations concepts and practices Describe endpoint management concepts and practices using Cisco Meraki Systems Manager Describe physical security concepts and practices Gain network insight by monitoring applications Describe how to prepare monitoring, logging, and alerting services Set up reporting and auditing capabilities in the Cisco Meraki dashboard Monitor and troubleshoot issues using Cisco Meraki tools The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 elevates your knowledge of Cisco© Meraki? technology suite. In this advanced technical training course, you?ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification. Course Outline Planning new Cisco Meraki architectures and expanding existing deployments Designing for scalable management and high availability Automating and scaling Meraki deployments Designing routing and practices on the Meraki platform Describing Quality of Service (QoS) and traffic shaping design Building VPN and WAN topologies Securing, expanding, and shaping the network Describing network concepts and practices Implementing wireless configuration practices and concepts Describing Endpoint management concepts and practices Describing physical security concepts and practices Gaining network insight through monitoring applications Preparing monitoring, logging, and alerting services Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools Additional course details: Nexus Humans Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network Designers Network Administrators Network Engineers Systems Engineers Data Center Engineers Consulting Systems Engineers Technical Solutions Architects Cisco Integrators/Partners Field Engineers Server Administrators Network Managers Storage Administrators Cisco Integrators and Partners Overview After completing the course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features The Implementing Cisco Application Centric Infrastructure (DCACI) v1.2 course shows you how to deploy and manage the Cisco© Nexus© 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI©) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and the fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course earns you 40 Continuing Education (CE) credits towards recertification.This course helps prepare you for the following exam:300-620 Implementing Cisco Application Centric Infrastructure (DCACI) Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration Knob Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Explaining Cisco ACI Management Out-of-Band Management In-Band Management
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 2 Days 12 CPD hours This course is intended for New Account Executives Overview Ramp-up on Systems, CRM, LMS and Sales Model Training New Hire Training New Hire Training
Unveil Africa’s political future: Dive into colonial legacies, state-building challenges, democratization efforts, the African Union’s influence, and emerging great power rivalries. Discover sharp, insightful takes on contemporary African politics.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP Process Integration Architecture Describing SAP Process Integration Architecture Explaining the Functionality and Utilization of SAP Process Integration The System Landscape Directory (SLD) Maintaining Products and Software Components in the System Landscape Directory (SLD) Implementing Technical Systems in the System Landscape Directory Maintaining Business Systems for Use in the Integration Directory Interface Objects in the Enterprise Service Repository (ESR) Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository (ESR) Maintaining Interface Objects Defining Message Processing Types and Quality of Services Object Mapping in the Enterprise Service Repository (ESR) Creating Message Mapping Objects Mapping Between Service Interfaces Analyzing Asynchronous Integration Scenarios Configuration of Integration Directory Communication Objects Using Configuration Views Creating Communication Channels in the Integration Directory (ID) Configuration of Integration Directory Objects for ABAP Processing Analyzing Objects Used in the Configuration of Integration Engine (IE) Communication Analyzing Routing Objects Used in Integration Engine (IE) Communication Analyzing Multiple Receiver Objects Used in Integration Engine (IE) Communication Configuration of Integration Directory Objects for Java Processing Maintaining Objects for Advanced Adapter Engine (AAE)-Only Processing Maintaining Objects for Advanced Adapter Engine Extended (AEX) Message Processing Creating and Deploying Integration Flows to the Advanced Adapter Engine Extended (AEX) Operations of SAP Process Integration Using the Runtime Workbench Using the Process Integration Monitoring (PIMon) Home Using the SAP NetWeaver Administrator Connectivity Options for SAP Process Integration Analyzing Connectivity Options between Back-End Systems with SAP Process Integration HTTP Connectivity Options Configuring the Simple Object Access Protocol (SOAP) Adapter Using Proxy Technology Checking the HTTP ABAP Adapter Using the HTTP_AAE (Java) Adapter File Adapter Configuration Configuring the Receiver File Adapter Configuring a Sender File Adapter Intermediate Document (IDoc) Connectivity Options Using the Intermediate Document (IDoc) Adapter with the Receiver Intermediate Document Adapter for the ABAP Stack Using the Sender Intermediate Document (IDoc) Adapter Using the Intermediate Document (IDoc) Adapter in the Advanced Adapter Engine (AAE) Configuring a Complete Intermediate Document (IDoc) Scenario Configuration of SAP Business Application Programming Interfaces (BAPIs) Connectivity Configuring the Receiver Remote Function Call (RFC) Adapter Configuring the Sender Remote Function Call (RFC) Scenario Enterprise Services and B2B Connectivity Analyzing Enterprise Services Configuring Business-to-Business (B2B) Connectivity Cross-Component Business Process Management (ccBPM) Integration Processes Analyzing the Runtime of the Cross-Component Business Process Management (ccBPM) Identifying the Steps to Create and Use an Integration Process Additional course details: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Own Your Success is delighted to bring you the 'Bitesize Masterclass' with Sophie Chapman. Not everyone has the flexibility to step away from the office for in-person events or dedicate extended periods from their packed schedules for full or half-day sessions. So we've put together our 'Bitesize Masterclasses' to help assistants develop and learn from professionals such as Sophie - shorter sessions, same big impact! Bitesize Masterclass with Sophie Chapman Sophie Chapman EA to Steven Bartlett Although Sophie initially aspired to be a talent agent, she swiftly realised that her career passions lay within the administrative/operational aspects of working life. Following her graduation in Entertainment Management from LIPA in 2008, she gained extensive work experience across renowned entities such as Sony BMG and Sky One, operating within the spheres of TV, music, radio, and the events industry. Her pivotal entry into a PA role came while supporting musician Eliza Doolittle. After five years, Sophie opted to move home to Liverpool and accept a contract supporting Sir Dave Brailsford of Team Sky. Once complete, Sophie received an offer for a position based in the US with an A-list musician. However, her journey led her to discover her "forever role", providing support to Steven Bartlett. Steven, the Founder and former Group CEO of Social Chain, is a multifaceted individual—a published author, podcaster, entrepreneur, and presently, the youngest-ever Dragon on BBC's Dragon's Den. Sophie has been instrumental as Steven's Executive Assistant, operating on a global scale, in both private and corporate realms for six years. Kate Wood Masterclass Facilitator Kate will aid the facilitation of this Bitesize Masterclass, ensuring that crucial topics are covered while prioritising an environment where every participant feels acknowledged, valued, and heard throughout the session. Kate is a business owner, qualified coach, consultant, facilitator, trainer, podcaster and public speaker with a background in learning & development, employee engagement strategy, continuous improvement, communications and marketing. After 25 years working across the board in blue-chip, non-profit and civil service organisations she now provides support to businesses looking to evolve and become great places for people to work in and with. Having worked with a wide variety of clients from school-age students to senior executives, she has been designing and running workshops, seminars and classes in person or via web events since she left long commutes and corporate roles behind in 2014 when she created her first two businesses. Her passion is improving working relationships between roles and functions and supporting people to discover their best selves at work. She does this in the automotive industry, financial services, medical teams, charities, global media, retail, education systems and the arts. When she’s not working, she and her classic car Monty Morgan can be found zipping around the English countryside. Session topics: How to establish your self-leadership position in your EA capacity Transition from a PA to EA Career development Boundary setting and wellbeing Q&A with the audience - Open-Book Q&A What is a Bitesize Masterclass? Short burst session. Keynote speakers discuss key themes/topics they are passionate about. Q&A with the audience attendees - ask the questions you don't usually get to ask! Run time of 90 minutes (max 2 hours) - we block out two hours in case we overspill on questions. 😊 Virtually delivered - attend from anywhere that's convenient for you! Packed with content, tips and tricks and from industry professionals who can share their experiences with you. Who will attend? PA's EA's Administrative roles --------------------------- At Own Your Success, we strongly believe in fostering an inclusive environment where diversity is celebrated and discrimination of any form is unwelcome. We welcome attendees from all backgrounds, regardless of race, ethnicity, gender identity, sexual orientation, religion, age, ability, or any other characteristic. Discrimination has no place in our workshops, and we are committed to creating a respectful and supportive space for all participants to learn and grow together. ---------------------------