• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25630 TEC courses delivered Online

Oracle WebLogic Server 12c - Administration I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technical Administrator Java EE Developer System Administrator Overview Configure WebLogic Server's authentication provider Deploy applications to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Install WebLogic Server 12c This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server. This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server.

Oracle WebLogic Server 12c - Administration I
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Software - Check Point Certified Security Admin R80.20 (CCSA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog

Check Point Software - Check Point Certified Security Admin R80.20 (CCSA)
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)
Delivered OnlineFlexible Dates
Price on Enquiry

S4H400 SAP S/4HANA Embedded Analytics - Overview

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Applications consultants, business analysts, business process owners, developer consultants, help desk consultants, project managers, and technology consultants. Overview This course will prepare you to: Give an overview of the S/4HANA embedded analytics architecture Explain the analytical offerings per user type Give an Introduction to SAP Best Practices for Analytics with SAP S/4HANA Explain the integration scenarios with SAP Business Warehouse In this course, students will gain an overview of the S/4HANA embedded analytics real-time operational reporting, its offerings per user type for the S/4HANA 610 and its integration with SAP Business Warehouse. Module 1 S/4HANA and S/4HANA embedded analytics introduction Module 2 S/4HANA embedded analytics architecture overview Module 3 Analytical Consumption Module 4 SAP Best Practices for Analytics with SAP S/4HANA Module 5 SAP Business Warehouse Integration Scenarios

S4H400 SAP S/4HANA Embedded Analytics - Overview
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c - ASM Administration Ed 1

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for AdministratorDatabase Administrators Overview Describe the components of ASMExplain and apply Automatic Storage Management (ASM) initialization parametersManage ASM instances and associated processesMonitor ASM using the V$ASM dynamic performance viewsUnderstand Flex ASM architecture and componentsUnderstand ASM Deployment AlternativesInstall and configure Flex ASMManage Flex ASMEmploy ASM space management techniquesCreate and delete Automatic Storage Management (ASM) disk groupsSet the attributes of an existing ASM disk groupPerform ongoing maintenance tasks on ASM disk groupsExplain key performance and scalability considerations for ASM disk groupsDescribe the Automatic Storage Management (ASM) architectureUse different client tools to access ASM filesDescribe the format of a fully qualified ASM file name This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications. This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications.

Oracle Database 12c - ASM Administration Ed 1
Delivered OnlineFlexible Dates
Price on Enquiry

HA240 SAP Authorization, Security, and Scenarios

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators, developers, developer consultants, system administrators, and technology consultants. Overview This training course will focus on the authorization, security, and integrated scenario. In this course, students will focus on the authorization, security, and integrated scenarios for SAP HANA. Module 1 Creation of authorizations and authorization roles Module 2 User management Module 3 Access control for HANA native models Module 4 Authorization trace Module 5 Auditing Module 6 Authentication and single sign-on options Module 7 Encryption options Module 8 Security considerations for Multitenant Database Containers Module 9 SAP GRC Integration for Governance Risk and Compliance Module 10 HANA use case scenarios and security requirements Module 11 SAP Netweaver Identity Management integration Module 12 Reusing of BW authorizations for SAP HANA applications Module 13 HANA Cloud Platform (HCP) security Module 14 HANA Enterprise Cloud security

HA240 SAP Authorization, Security, and Scenarios
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Well-Architected Best Practices

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Technical professionals involved in architecting, building, and operating AWS solutions. Overview In this course, you will learn to: Identify the Well-Architected Framework features, design principles, design pillars, and common uses Apply the design principles, key services, and best practices for each pillar of the WellArchitected Framework Use the Well-Architected Tool to conduct Well-Architected Reviews The Well-Architected Framework enables you to make informed decisions about your customers architectures in a cloud-native way and understand the impact of design decisions that are made. By using the Well-Architected Framework, you will understand the risks in your architecture and ways to mitigate them.This course is designed to provide a deep dive into the AWS Well-Architected Framework and its 5 pillars.This course also covers the Well-Architected Review process, and using the AWS Well-Architected Tool to complete reviews. Module 1: Well-Architected Introduction History of Well-Architected Goals of Well-Architected What is the AWS Well-Architected Framework? The AWS Well-Architected Tool Module 2: Design Principles Operational Excellence

AWS Well-Architected Best Practices
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Wireless Foundations v1.0 (WLFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network engineer Systems engineer Wireless engineer Technical solutions architect Network administrator Wireless design engineer Network manager Overview After taking this course, you should be able to: Describe and implement foundational wireless theory Describe and implement basic wireless security and client access Describe and implement a Cisco wireless network architecture Configure Cisco centralized wireless networks Describe and implement WLAN maintenance and troubleshooting Thisÿcourse gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco WLAN network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. Course Outline DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS THEORY DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS MATH AND ANTENNAS DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS OPERATION DESCRIBING AND IMPLEMENTING BASIC WIRELESS SECURITY DESCRIBING AND IMPLEMENTING 802.1X AND EAP IMPLEMENTING WIRELESS GUEST ACCESS AND CONFIGURING WIRELESS SECURITY DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK ARCHITECTURE DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK WIRED SUPPORT CONFIGURING CISCO CENTRALIZED WIRELESS NETWORKS DESCRIBING AND IMPLEMENTING WLAN MAINTENANCE AND TROUBLESHOOTING

Cisco Understanding Cisco Wireless Foundations v1.0 (WLFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Diagnostics and Troubleshooting

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.

Symantec ProxySG 6.6 Diagnostics and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

CCSP Certification Prep Course

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance

CCSP Certification Prep Course
Delivered OnlineFlexible Dates
Price on Enquiry