Duration 5 Days 30 CPD hours This course is intended for Project team members & consultants Overview Set up organizational structures in Warehouse ManagementConfigure control of pick, putaway, and stock transfer activities at master data and Customizing levelIntegrate Warehouse Management into other logistics applications in SAP ERP In this course, students will set up organizational structures in the Warehouse Management System and configure control of pick, put-away, and stock transfer activities at the master data and customizing level. Course Outline Organizational units and master data in Warehouse Management Configuration of the interface between Inventory Management and Warehouse Management Batch management and quality management in the warehouse Delivery processes using Warehouse Management Staging components for production from the warehouse Configuring the warehouse activity monitor as a control instrument Inventory at storage bin level Case study: setting up a new warehouse Additional course details: Nexus Humans SCM630 SAP Warehouse Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM630 SAP Warehouse Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies
Duration 3 Days 18 CPD hours This course is intended for Application consultants Overview In this course, participants use and customize functions in delivery processing. In this course, students learn the customizing settings of delivery documents and the set-up of corresponding functions. Idea and Function of the Delivery Document Explaining the Concept and Structure of the Delivery Document Basic Organizational Units for the Delivery Process Maintaining the Organizational Units for Delivery Processes Controlling Deliveries Controlling Delivery Documents The Goods Issue Process Based on the Delivery Adjusting Automatic Determination of Relevant Fields for Outbound Delivery Creation Adjusting Delivery and Transportation Scheduling Processing Outbound Deliveries Using the Outbound Delivery Monitor Processes and Functions based on the Delivery Picking Outbound Deliveries Packing Materials Handling Goods Issues Using Special Functions in Deliveries Further Application Areas of the Delivery Document Transferring Stock Between Plants Performing Goods Receipts Using Deliveries Specified Delivery Scenario Setting Up a Specified Delivery Scenario
Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Manage and configure the Carbon Black App Control sever based on organizational requirements. Implement rules to support business processes and automatic approvals. Identify scenarios and use cases for Custom rules and Event rules. Describe common troubleshooting scenarios for the Carbon Black App Control server. Describe common troubleshooting scenarios for the Carbon Black App Control Windows agent. This course teaches you how to configure and scope the rules within VMware Carbon Black© App ControlTM product to maintain the system according to your organization?s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Custom Rules Basics Execute / Write action rules Precedence Paths tom Rules Best Practices Rule Triad Rule multiplication Rule Types Custom rule type overview Optimizing Custom Rules Evaluating events Event Rules Creating and editing Testing before implementing Creating and editing Testing before implementing Server versus agent issues Server Capabilities Tools, logs, common issues, scenarios Agent Capabilities Tools, logs, common issues, scenarios
Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. Course Outline Mobile Asset Management and ITAM People & Mobile Assets Bring Your Own Device (BYOD) Tools Repository Management Assessment The 12 KPAs and Mobile Asset Management Program Management & Mobility Policy Management & Mobility Communication & Education Management & Mobility Education & Mobility Acquisition Management & Mobility Asset Identification Management & Mobility Legislation & Compliance Management & Mobility Software & Application Licensing Disposal Management & Mobility Documentation Management & Mobility Financial Management & Mobility Vendor Management & Mobility Data Protection
Duration 1 Days 6 CPD hours This course is intended for In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Overview Upon successful completion of this course, students will take ownership of their time management in order to achieve their goals and lead a more productive life. In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Setting SMART Goals The Three P's The SMART Way Prioritizing Your Goals Evaluating and Adapting The Power of Routines What is a Routine? Personal Routines Professional Routines Six Easy Ways to Simplify Your Life Scheduling Yourself The Simple Secret of Successful Time Management Developing a Tracking System Scheduling Appointments Scheduling Tasks Keeping Yourself on Top of Tasks The One-Minute Rule The Five-Minute Rule What To Do When You Feel Like You're Sinking Tackling New Tasks and Projects Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! Using Project Management Techniques The Triple Constraint Creating the Schedule Using a RACI Chart Creating a Workspace Setting Up the Physical Layout Ergonomics 101 Using Your Computer Efficiently Organizing Files and Folders Organizing Paper Files Organizing Electronic Files Scheduling Archive and Clean-Up Managing E-Mail Using E-mail Time Wisely Taking Action! Making the Most of Your E-mail Program Taking Time Back from Handheld Devices Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Owners/Team Leads/Power Users, Industry Specialists, and Program/Project Managers. Overview Explain Maintenance and Repair business processesExecute maintenance tasksDefine relevant organizational elements used in Plant Maintenance In this course, students learn how to describe the maintenance and repair business processes within SAP ERP. This foundation knowledge is mandatory in order for students to have the confidence to complete the subsequent configuration courses. Plant Maintenance Organization Outlining EAM Processes and SAP Solution Portfolio Outlining the SAP User Interfaces and Roles Executing Maintenance Tasks with NetWeaver Business Client (NWBC) Checking Organizational Levels in Plant Maintenance Technical Objects Checking Functional Locations Managing Equipment Checking Linear Asset Management (LAM) Assigning Bills of Material (BOMs) to Technical Objects Breakdown Maintenance Planning Breakdown Maintenance Processing a Breakdown Maintenance Order Corrective Maintenance Outlining Corrective Maintenance Processing External Services Creating Notifications of Maintenance Requirements Creating Maintenance Orders Planning of Maintenance Orders Planning of Maintenance Orders for Operation Account Assignment (OAA) Selecting Maintenance Orders Planning for Maintenance Orders Scheduling Maintenance Executing Maintenance Tasks with SAP GUI Completing Notifications and Orders Confirm and Technically Complete an Order Creating a Shift Report Refurbishment of Spare Parts Checking Prerequisites in Materials Management (MM) Refurbishing Spare Parts Internally Refurbishing Spare Parts Externally Preventive Maintenance Outlining Preventive Maintenance Checking the Maintenance Task List Creating Maintenance Plans Scheduling Maintenance Plans Project-Oriented Maintenance Outlining Project-Oriented Maintenance Supplementary Processes for SAP Enterprise Asset Management Outlining Mobile Applications for SAP Enterprise Asset Management (SAP EAM) Using Visual Enterprise Documents Describing Basic Maintenance Processing Outlining Pool Asset Management (PAM) Outlining SAP Work Clearance Management (WCM) Applying Worker Safety Report and Analysis of Information for SAP Enterprise Asset Management (EAM) Analyzing Maintenance History with the Logistic Information System (LIS) Evaluating Plant Maintenance with SAP Business Warehouse (SAP BW) Outlining Rapid Deployment Solution EAM Analytics SAP Enterprise Asset Management Customizing Implementation Outlining SAP Enterprise Asset Management Customizing Implementation
Duration 1 Days 6 CPD hours This course is intended for It is essential information for beginning IT Asset Managers and other IT professionals involved in asset management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview During this course, students learn best practices in Software Asset Management Reducing Risk Increasing Accountability Uncovering Savings Gaining Control of the IT Environment The IAITAM Certified Software Asset Manager (CSAM) Course is a foundational education program that ensures students are able to manage software assets. Students also learn about the ever-changing variables throughout our industry. From software piracy and compliance issues to legislation and organizational challenges, it is necessary to evaluate both the internal and external influences that bring about change in how organizations manage their IT assets. A successful Software Asset Manager must look at the overall goals of the organization and determine where Software Asset Management will be a strategic influence in achieving those goals. This course also includes the exam for CSAM certification. Course Outline The Scope of Software Strategic License Management Software Harvesting License Documentation The Right to Audit Proactive vs. Reactive SAM Developing Goals Savings Opportunities ITAM Compliance Audit Letter Examples of License Data Documentation Compliance Enforcement Understanding the EULA Due Diligence for Compliance The Art of Negotiation Ts & Cs Advice ITAM Automation Selecting a Discovery Tool ITAM Repository Hardware & Organizational Impacts Additional course details: Nexus Humans Certified Software Asset Manager (CSAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Software Asset Manager (CSAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.