• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Cisco Digital Learning Security

By Nexus Human

Duration 69 Days 414 CPD hours Cisco Learning Library: Security offers a subscription to all Cisco online cybersecurity and cyber operations training, including extensive sk This comprehensive technical training library offers full-length, interactive certification courses, product and technology training with labs, and thousands of reference materials. Security Library Certification Courses CCNP Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 CCIE Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing an Integrated Threat Defense Solution (SECUR201) v1.0 Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 Introducing Cisco Cloud Consumer Security (SECICC) v1.0 Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 Configuring Cisco ISE Essentials for SD-Access (ISESDA) v1.0 Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC)

Cisco Digital Learning Security
Delivered OnlineFlexible Dates
Price on Enquiry

MB-260T00: Microsoft Customer Data Platform Specialty

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Candidates should be familiar with Dynamics 365 Customer Insights and have firsthand experience with one or more additional Dynamics 365 apps, Power Query, Microsoft Dataverse, Common Data Model, and Microsoft Power Platform. They should also have working knowledge of practices related to privacy, compliance, consent, security, responsible AI, and data retention policy. Overview After completing this course, you will be able to: Clean, transform, and ingest data into Dynamics 365 Customer Insights Create a unified customer profile Work with Dynamics 365 Audience insights Enrich data and predictions Set up and manage external connections Administer and monitor Customer Insights Customer Data Platform specialists implement solutions that provide insight into customer profiles and that track engagement activities to help improve customer experiences and increase customer retention. In this course, students will learn about the Dynamics 365 Customer Insights solution, including how to unify customer data with prebuilt connectors, predict customer intent with rich segmentation, and maintain control of customer data. This specialty course starts with creating a unified profile and then working with customer data. Module 1: Get started with Dynamics 365 Customer Insights Introduction to the customer data platform Administer Dynamics 365 Customer Insights Explore user permissions in Dynamics 365 Customer Insights Module 2: Ingest data into Dynamics 365 Customer Insights Import and transform data Connect to data sources Work with data Module 3: Create a unified customer profile in Dynamics 365 Customer Insights Map data Match data Merge data Find customers Module 4: Work with Dynamics 365 Customer Insights Explore Audience insights Define relationships and activities Work with measures Work with segments Module 5: Enrich data and predictions with Audience insights Enrich data Use predictions Use machine learning models Module 6: Manage external connections with Customer Data Platform Export Customer Insights data Use Customer Insights with Microsoft Power Platform Display Customer Insights data in Dynamics 365 apps More ways to extend Customer Insights

MB-260T00: Microsoft Customer Data Platform Specialty
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 27001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course

ISO 27001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 14001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Managers or consultants involved in Environmental Management, Expert advisors seeking to master the implementation of an Environmental Management System, Individuals responsible for maintaining conformance with EMS requirements , EMS team members Overview Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an EMS Learn how to interpret the ISO 14001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an EMS Acquire the expertise to advise an organization in implementing Environmental Management System best practices ISO 14001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Environmental Management System (EMS) based on ISO 14001. During this training course, you will also gain a thorough understanding of the best practices of Environmental Management Systems, consequently reducing an organization?s negative environmental impacts and improving its overall performance and efficiency Introduction to ISO 14001 and initiation of an EMS Course objective and structure Standard and regulatory framework Environmental Management System (EMS) Fundamental principles of environmental management Initiating the EMS implementation Understanding the organization and clarifying the environmental objectives Analysis of the existing management system Plan the implementation of the EMS Leadership and approval of the EMS project EMS scope Policies for environmental management Risk assessment Definition of the organizational structure of environmental management Implementation of an EMS Definition of the document management process Design of controls and drafting of specific policies & procedures Communication plan Training and awareness plan Implementation of controls Incident Management Operations Management EMS monitoring, measurement, continuous improvement and preparation for certification audit Monitoring, measurement, analysis and evaluation Internal audit Management review Treatment of problems and non-conformities Continual improvement Preparing for the certification audit Competence and evaluation of implementers Closing the training

ISO 14001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Customers and systems operators that want to learn fundamental AOS concepts and navigate Prism on AHV. Junior IT administrators and business leaders who manage Nutanix clusters in the datacenter and want a formal, hands-on, detailed introduction to Nutanix datacenter administration. The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix?s Hybrid Cloud solution.Begin by exploring the history of this technology space, including different types of clouds, and how on-prem and public infrastructures came together to create hybrid operating models. Then, delve deeper into essential Nutanix products ? AOS, AHV, and Prism ? while discussing how these products were designed to solve business challenges.And conclude by discussing certain fundamental aspects involved in operating the Nutanix Hybrid Cloud, such as cluster updates, managing virtual machines, reporting and performance metrics, and more Module 1: Introduction Describe course terminology, such as three-tier architecture, hyperconverged architecture, and public, private, and hybrid clouds. Module 2: Understanding AOS Concepts Describe self-healing architecture Describe replication factor Describe Nutanix multicloud solutions Module 3: Understanding Cluster Management Concepts Explain Prism Element features and benefits Explain Prism Central features and benefits Manage the Image Repository Upgrade the hypervisor and AOS on a cluster Describe Life Cycle Manager. Module 4: Understanding Storage Concepts Define a storage pool and storage container Identify components of AOS Distributed Storage Identify space-saving technologies Module 5: Managing VMs Create and manage virtual machines (VMs) Add a VM to a category Describe Acropolis Dynamic Scheduler (ADS) Describe data locality Module 6: Monitoring VMs and Cluster Health Use metrics to identify performance issues Measure VM performance using Nutanix tools: Health dashboard, Analysis dashboard, Alerts dashboard Use the Support Portal and Insights Module 7:Understanding Data Protection Concepts Describe how to enable data protection on a VM Define a retention policy Define Nutanix Mine Identify the different types of replication targets

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Modelling Business Processes

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Modelling Business Processes (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Modelling Business Processes principles and techniques. Key areas are: The role of business process modelling Modelling core business processes at an organizational level Modelling business processes at the process level Documenting and analyzing tasks The use of gap analysis in improving business processes The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered. The course provides in-depth knowledge and practice in Modelling Business Processes Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Process Modelling Exam Details Business Analysis Certification Scheme The Context for Business Process Modelling Purpose and benefits of business process modelling Three levels of business process hierarchy (Organization, process and task level) Process view versus the functional view of an organization Assessing the impact of a new process design (POPIT model) Implementation of a business change (Pilot, phased, direct changeover, parallel running) The Organizational Context for Business Processes Construction of an organizational level model of a business process External and internal elements of an organizational model Supporting the value proposition Modelling the Business Processes Construction of a business process model Standard notation Process, task and step OPOPOT External, internal and time-based events Internal performance measures and customer expectations of performance Documenting Tasks A task description UML activity diagram notation and structured english Improving Business Processes task automation, removal of gaps and disconnects, process reengineering business rules and assumptions Unsatisfactory performance Combinations of conditions Gap analysis

Business Analysis - Modelling Business Processes
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Tester Foundation Level (CTFL)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Anyone who wants to qualify as a professional tester. The certification also offers good qualifications for builders, designers, programmers and project managers Overview This three-day training provides a general introduction to information systems testing. The objective of the training is to prepare the students for the ISTQB Foundation exam. Some important topics that will certainly be discussed here are the importance of testing, testing in relation to system development and the fundamentals of a structured testing process. The different phases in a test project are explained, after which some test techniques (both black box and white box) are also discussed. This foundation training therefore contains the basis in testing for both test managers and testers. In addition to theory, the training also includes a number of mock exams, so that the topics covered are placed even better in the exam context. Course Outline test principles life cycle testing static techniques test specification techniques blackbox techniques whitebox techniques and experienced based techniques Additional course details: Nexus Humans Certified Tester Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Tester Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Tester Foundation Level (CTFL)
Delivered OnlineFlexible Dates
Price on Enquiry

55244 JavaScript for Developers

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for both novice and experienced programmers. Some experience in C++, C# or Java is helpful. Overview After completing this course, you will be able to: Write and test JavaScript code in modern browsers. Understand and work with the browser's Document Object Model (DOM). Work DOM objects and write code to respond to events. Add jQuery to their projects and use jQuery to manipulate the DOM and to make Ajax calls. Understand Ajax and Web Services, including HTTP Verbs and asynchronous Ajax calls. Work with XML and JSON data formats. Understand and use RESTful Web Services including ODATA queries. Work with Anonymous Functions, Self-Invoking Functions and Closures. Understand the role of the Window and Navigator objects. Describe and understand variables, 'variable hoisting', and JavaScript objects. This course is an in depth hands-on study of JavaScript. The course includes detailed hands-on labs and Q&A labs. The labs include multiple projects that update an existing web site. This course is similar to the retired Course 20480: Programming in HTML5 with JavaScript and CSS3. Module 1: Basic Scripting JavaScript Basics JavaScript or ECMAScript? Which Version of JavaScript am I Using? Shims, Shivs, and Polyfills Writing and Testing JavaScript Editors and the F12 Tools Key Parts of a Script Module 2: The Document Object Model The DOM Accessing Objects from the DOM Responding to Events Adding Elements to the DOM Module 3: Introduction to jQuery jQuery Downloading the jQuery Library jQuery Versions Linking to the Library Selecting Elements using jQuery Working with the Data Returned by jQuery Setting CSS Properties Running a Function Against the jQuery Return Set Module 4: Ajax and Web Services Web Services HTTP Verbs Data Formats ? XML and JSON Ajax RESTful Web Services OData OData Queries OData Updates Module 5: Diving in Deeper Is JavaScript Compiled? Data Types and Objects Extending Data Types Variables, Scopes and Hoisting Functions The ?this? Keyword Errors Recursion

55244 JavaScript for Developers
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Databases | Database Security (TT8700)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real

Securing Databases | Database Security (TT8700)
Delivered OnlineFlexible Dates
Price on Enquiry

S4H01 SAP Business Suite to SAP S/4HANA Delta

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for SAP professionals Overview Explain the motivation and need for a next generation business suite and how SAP S/4HANA enables a digital organizationDescribe the SAP S/4HANA business and technical architectureGain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoptionExplain how SAP S/4HANA supports the business users with a new user experience (e.g.: SAP Fiori UX)Describe key business processes of SAP S/4HANA Enterprise ManagementExplain SAP S/4HANA embedded analytics capabilitiesGain basic knowledge about SAP S/4HANA LoB solutions and add-on supportDescribe integration scenarios between SAP S/4HANA and SAP Cloud solutions In this course, students learn a broad range of topics including the motivation behind the development of SAP S/4HANA. Course Outline Introduction to SAP S/4HANA SAP S/4HANA user experience SAP HANA powers SAP S/4HANA SAP Activate for SAP S/4HANA SAP S/4HANA Enterprise Management, LoB solutions and add-ons SAP S/4HANA embedded analytics Integration between SAP S/4HANA Core and SAP Cloud solutions Additional course details: Nexus Humans S4H01 SAP Business Suite to SAP S/4HANA Delta training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H01 SAP Business Suite to SAP S/4HANA Delta course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4H01 SAP Business Suite to SAP S/4HANA Delta
Delivered OnlineFlexible Dates
Price on Enquiry