• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27790 TEC courses

EXIN Cloud Computing Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Diese Zertifizierung richtet sich an Experten aus Geschäftsbetrieben aller Branchen, die mit der Cloud-Technologie arbeiten oder an dieser Technologie und ihrem Nutzen für Unternehmen interessiert sind: Alle Mitarbeiter von internen oder externen Service Providern, Ihre Kunden Manager, Auditoren Overview Die Zertifizierung EXIN Cloud Computing Foundation validiert das Wissen von Kandidaten in folgenden Bereichen: Cloud - Prinzipien Implementierung von Management des Cloud Computing Nutzung von Cloud Computing Sicherheit, Identität und Privatsphäre im Cloud Computing Bewertung des Cloud Computing Unter Cloud Computing versteht man die Implementierung und Nutzung der Cloud - Technologie um IT - Services bereitzustellen, die an einem andren Standort gehostet werden. Cloud-Prinzipien Das Cloud - Konzept Entwicklung des Cloud Computing Cloud - Architektur Vorteile und Beschr„nkungen des Cloud Computing Implementierung und Management des Cloud Computing Aufbau lokaler Cloud - Umgebungen Management - Prinzipien fr Cloud - Services Nutzung von Cloud Computing Zugriff auf die Cloud Untersttzung von Business - Prozessen durch Cloud Computing Cloud - Nutzung durch Service Provider Sicherheit, Identit„t und Privatsph„re im Cloud Computing Sicherheit im Cloud Computing Identit„ts- und Privatsph„renmanagement Bewertung des Cloud Computing Business Cas fr das Cloud Computing Bewertung von Cloud - Implementierungen

EXIN Cloud Computing Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)
Delivered OnlineFlexible Dates
Price on Enquiry

AN15 IBM Power Systems for AIX III - Advanced Administration and Problem Determination

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an advanced course for AIX system administrators, and system support individuals with at least six months of experience in AIX. Overview Perform system problem determination and reporting procedures including analyzing error logs, creating dumps of the system, and providing needed data to the AIX Support personnel Examine and manipulate Object Data Manager databases Identify and resolve conflicts between the Logical Volume Manager (LVM) disk structures and the Object Data Manager (ODM) Complete a very basic configuration of Network Installation Manager to provide network boot support for either system installation or booting to maintenance mode Identify various types of boot and disk failures and perform the matching recovery procedures Implement advanced methods such as alternate disk install, multibos, and JFS2 snapshots to use a smaller maintenance window In this course, learn advanced AIX system administrator skills focusing on availability and problem determination and learn detailed knowledge of the ODM database where AIX maintains configuration information. Day 1 Advanced AIX administration overview The Object Data Manager Error monitoring Day 2 Network Installation Manager basics System initialization: Accessing a boot image Day 3 System initialization: rc.boot and inittab LVM metadata and related problems Disk management procedures Day 4 Disk management procedures (continued) Install and cloning techniques Advanced backup techniques Day 5 Advanced backup techniques (continued) Diagnostics The AIX system dump facility

AN15 IBM Power Systems for AIX III - Advanced Administration and Problem Determination
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Analytics with Python

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Before taking this course delegates should already be familiar with basic analytics techniques, comfortable with basic data manipulation tools such as spreadsheets and databases and already familiar with at least one programming language Overview This course teaches delegates who are already familiar with analytics techniques and at least one programming language how to effectively use the programming language for three tasks: data manipulation and preparation, statistical analysis and advanced analytics (including predictive modelling and segmentation). Mastery of these techniques will allow delegates to immediately add value in their work place by extracting valuable insight from company data to allow better, data-driven decisions. Outcomes: After completing the course, delegates will be capable of writing production-ready R code to perform advanced analytics tasks enabling their organisations make better, data-driven decisions. Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. These programming languages are some of the most powerful and flexible tools in the data analytics toolkit. Topic 1 Intro to our chosen language Topic 2 Basic programming conventions Topic 3 Data structures Topic 4 Accessing data Topic 5 Descriptive statistics Topic 6 Data visualisation Topic 7 Statistical analysis Topic 8 Advanced data manipulation Topic 9 Advanced analytics ? predictive modelling Topic 10 Advanced analytics ? segmentation

Advanced Analytics with Python
Delivered OnlineFlexible Dates
Price on Enquiry

CCCS Check Point Certified Cloud Specialist-Administrator

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.

CCCS Check Point Certified Cloud Specialist-Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

SM100 SAP Solution Manager Configuration for Operations

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators, system architects, and technology consultants In this course, students learn how to manage the SAP Solutions Manager Configuration suite and discover how it can be integrated into their day-to-day operations. Course Outline SAP Solution Manager Overview: available Scenarios, Enhancements, Work Center Technical Overview: Installation, Architecture, Sizing SAP Solution Manager Configuration: SOLMAN_SETUP, SMSY, LMDB, Landscape Verification (LV), System Landscape Directory (SLD), Solution Manager Diagnostics Managing Authorizations in SAP Solution Manager Maintenance Optimizer, Maintenance Certificates, System Recommendations, Issue and Task Management Early Watch Alert Reporting: ABAP & Java, EarlyWatch Alert for Solutions Managing Solutions: Work Mode Management and additional administrative Tasks Monitoring and Alerting Infrastructure (MAI), Solution Monitoring and System Monitoring Service Level Reporting, Technical Reporting, Management Reporting SAP Mobile Apps for SAP Solution Manager Job Management: Job Request Management, Job Documentation, Job Monitoring, Job Scheduling Management Health Checks and more Additional course details: Nexus Humans SM100 SAP Solution Manager Configuration for Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM100 SAP Solution Manager Configuration for Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SM100 SAP Solution Manager Configuration for Operations
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

ACT200 SAP Agile Project Delivery

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Application Consultants and Program Managers Overview Participants learn about the SAP Activate methodology in agile implementation techniques in SAP projects.The course enables participants to apply the Agile techniques in their projects through project use cases and simulations.This class is highly interactiveThis course complements agile courses from other providers, like Certified Scrum Master and/or PMI-ACP training. In this course, students will gain knowledge on how to use techniques in SAP projects. The Basics Agile and SCRUM 101 Introduction to SAP Activate Agile Project Fit Starting Agile Roles and Responsibilities Agile Project Organisation Prepare Agile Project Backlog Explore Phase Overview Create Product Backlog Definition of Done Iterative Build Release Planning Sprint Cycle Testing and Deploy Summary of Key Points Summary and key points Appendices Agile Manifesto Agile Use Cases Agile Fit Questions Agile Lean Design Templates Agile and SAP Solution Manager Additional course details: Nexus Humans ACT200 SAP Agile Project Delivery training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ACT200 SAP Agile Project Delivery course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ACT200 SAP Agile Project Delivery
Delivered OnlineFlexible Dates
Price on Enquiry