Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Developers, Developer Consultants, Help Desk/COE Support, and Program/Project Managers. Overview Understand the concepts of object-oriented programmingDevelop business applications with ABAP Objects In this course, students will gain an understanding of the concepts of object-oriented programming and develop business applications with ABAP Objects. Introduction to Object-Oriented Programming Explaining the Object-Oriented Programming Model Analyzing and Designing with Unified Modeling Language (UML) Fundamental Object-Oriented Syntax Creating Local Classes Creating Objects Accessing Methods and Attributes Implementing Constructors in Local Classes Implementing Class Constructors in Local Classes Inheritance and Casting Implementing Inheritance Implementing Upcasts Using Inheritance Implementing Polymorphism Using Inheritance Implementing Downcasts Using Inheritance Interfaces and Casting Defining and Implementing Local Interfaces Implementing Polymorphism Using Interfaces Integrating Class Models Using Interfaces Object-Oriented Events Implementing Events in Local Classes Implementing Events in Local Interfaces Object-Oriented Repository Objects Creating Global Classes Defining and Implementing Global Interfaces Implementing Inheritance in Global Classes ABAP Object-Oriented Examples Using the ABAP List Viewer (ALV) Describing Business Add-Ins (BAdIs) Global Classes in ABAP Development Tools Developing Eclipse-Based ABAP Programs Class-Based Exceptions Explaining Class-Based Exceptions Defining and Raising Exceptions Implementing Advanced Exception Handling Techniques Unit Testing Unit Testing with ABAP Unit Object-Oriented Design Patterns Implementing Advanced Object-Oriented Techniques Implementing the Singleton Pattern Implementing Factory Classes Using Friendship Implementing Persistent Objects Runtime Type Services Using Runtime Type Identification (RTTI) Creation of a Comprehensive Object-Oriented Application Developing a Comprehensive Object-Oriented Application Additional course details: Nexus Humans BC401 SAP ABAP Objects training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BC401 SAP ABAP Objects course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Application developers, Cloud Solutions Architects, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview At the end of the course, students will be able to: Understand container basics. Containerize an existing application. Understand Kubernetes concepts and principles. Deploy applications to Kubernetes using the CLI. Set up a continuous delivery pipeline using Jenkins Learn to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those workloads to handle increased traffic. Students will also learn how to continuously deploy new code in a Kubernetes cluster to provide application updates. Introduction to Containers and Docker Acquaint yourself with containers, Docker, and the Google Container Registry. Create a container. Package a container using Docker. Store a container image in Google Container Registry. Launch a Docker container. Kubernetes Basics Deploy an application with microservices in a Kubernetes cluster. Provision a complete Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl. Break an application into microservices using Kubernetes? Deployments and Services. Deploying to Kubernetes Create and manage Kubernetes deployments. Create a Kubernetes deployment. Trigger, pause, resume, and rollback updates. Understand and build canary deployments. Continuous Deployment with Jenkins Build a continuous delivery pipeline. Provision Jenkins in your Kubernetes cluster. Create a Jenkins pipeline. Implement a canary deployment using Jenkins. Additional course details: Nexus Humans Getting Started with Google Kubernetes Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with Google Kubernetes Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for: Line of Business (LoB) owners, IT leaders, and executives Overview In this course, you will learn to: Explain the role of information technology (IT) in an organization for business transformation Explain the customer value proposition for using the cloud across industries Define key characteristics of cloud computing Explain the cloud business model Identify key security practices of cloud computing Frame the cloud business value using the Cloud Value Framework In this course, you will learn the fundamental concepts of cloud computing and how a cloud strategy can help companies meet business objectives. It explores the advantages and possibilities of cloud computing. It also introduces addresses concepts such as security and compliance to help facilitate better discussions with line of business (LOB) professionals, information technology (IT) LoB, IT leaders, and executives. Module 1: Course Introduction Course Introduction Module 2: Information Technology for Business Transformation Role of IT in an organization for business transformation Brief history of IT Legacy approach to IT What drives customers to move from traditional infrastructure to the cloud Module 3: Cloud Computing Define cloud computing Key characteristics of cloud technology The cloud business model Key security practices within the cloud Module 4: Business Value of the Cloud The customer value proposition Identify who is using cloud computing Industry trends Customer examples Module 5: The Cloud Value Framework Introduction to the Cloud Value Framework Cost Savings Staff Productivity Operational Resilience Business Agility Module 6: Business Value Activity Business Value Activity Additional course details: Nexus Humans AWS Cloud Essentials for Business Leaders training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Cloud Essentials for Business Leaders course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, and Solution Architects. Overview Gain a detailed knowledge of using the functions and customizing settings in sales. This course is ideal for students requiring detailed knowledge about customizing of sales processes and basic functions. Introduction to the Sales and Distribution Process Processing Sales Documents Enterprise Structures in Sales and Distribution Setting Up Enterprise Structures Sales Order Processing Identifying Sources of Document Data Using Additional Functions During Sales Order Processing Sales Document Customizing Controlling Sales Processes Defining Sales Document Types Applying Item Categories Interpreting the Item Category Determination Using Bills of Material in Sales Documents Applying Schedule Line Categories Interpreting the Schedule Line Category Determination Data Flow Interpreting the Document Flow of Sales Processes Setting Up the Copying Control Special Business Processes Executing Special Business Processes Incomplete Documents Handling Incomplete Documents Setting Up an Incompletion Procedure Business Partners Using Partner Functions in Sales and Distribution Processes Setting Up Partner Determination Procedures Outline Agreements Using Different Types of Outline Agreements Interpreting the Set-Up of Value Contracts Setting Up Specific Contract Data Material Determination Setting Up Material Determination Material Listing and Exclusion Setting Up Master Data for Material Listing / Exclusion Free Goods Setting Up the Determination of Free Goods Sales Scenarios Setting Up a Cash Sales Scenario Controlling the Usage of Bills of Material in a Sales Order Setting Up a Material Determination Scenario Additional course details: Nexus Humans SCM605 SAP Sales Processing in SAP ERP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM605 SAP Sales Processing in SAP ERP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices. Overview Understand the functionalities and capabilities of Citrix ADC How to obtain, install, and manage Citrix ADC licenses Comprehend basic ADC network architecture Understand how SSL is used to secure Citrix ADC Optimize the ADC system for traffic handling and management Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching. Module 1: Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Module 2: Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists Module 3: ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX Module 4: High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Module 5: Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting Module 6: SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Module 7: Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Module 8: Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Module 9: Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings AppExpert Additional Features Module 10: Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Module 11: Content Switching Content Switching Overview Content Switching Configuration Module 12: Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Module 13: Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB
Duration 3 Days 18 CPD hours This course is intended for This is an intermediate course for architects, system integrators, security administrators, network administrators, software engineers, technical support individuals, and IBM Business Partners who implement LPARs on IBM Power Systems. Overview Describe important concepts associated with managing POWER7 processor-based systems, such as Logical partitioning (LPAR), dynamic partitioning, virtual devices, virtual processors, virtual consoles, virtual Local Area Network (VLAN), and shared processors Describe the features of the PowerVM Editions. Use the System Planning Tool to plan an LPAR configuration Describe the functions of the HMC Configure and manage the HMC, including users and permissions, software, startup and shutdown, remote access features, network configuration, security features, HMC backup and restore options, and the HMC reload procedure Describe the rules associated with allocating resources, including dedicated processors, processing units for Micro-Partitions, memory, physical I/O for AIX and Linux partitions Configure and manage LPARs using the HMC Graphical User Interface (GUI) and HMC commands Interpret physical and AIX location codes and relate to the key hardware components Power on and power off the POWER7 system Use the HMC to back up and restore partition data In this course, students will learn the skills needed to become an effective administrator on IBM's POWER7-based systems that support Logical Partitioning (LPAR). Day 1 Introduction to partitioning Hardware system overview Hardware Management Console Day 2 Hardware Management Console (cont.) System Planning Tool HMC and managed system maintenance System power management Planning and configuring logical partitions Day 3 Planning and configuring logical partitions (cont.) Partition operations Dynamic resource allocation Exercise 9 Additional course details: Nexus Humans AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for students wishing to gain intermediate-level skills or individuals whose job responsibilities include constructing relational databases and developing tables, queries, forms, and reports in Microsoft Access for Office 365. Overview In this course, you will optimize an Access database. You will: Provide input validation features to promote the entry of quality data into a database. Organize a database for efficiency and performance, and to maintain data integrity. Improve the usability of Access tables. Create advanced queries to join and summarize data. Use advanced formatting and controls to improve form presentation. Use advanced formatting and calculated fields to improve reports. In this course, you will expand your knowledge of relational database design; promote quality input from users; improve database efficiency and promote data integrity; and implement advanced features in tables, queries, forms, and reports. Extending your knowledge of Access will result in a robust, functional database for your users.This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Access Expert (Office 365 and Office 2019): Exam MO-500 certification. Improving Table Usability Topic A: Create Lookups Within a Table Topic B: Work with Subdatasheets Creating Advanced Queries Topic A: Create Query Joins Topic B: Create Subqueries Topic C: Summarize Data Improving Form Presentation Topic A: Apply Conditional Formatting Topic B: Create Tab Pages with Subforms and Other Controls Creating Advanced Reports Topic A: Apply Advanced Formatting to a Report Topic B: Add a Calculated Field to a Report Topic C: Control Pagination and Print Quality Topic D: Add a Chart to a Report Importing and Exporting Table Data Topic A: Import and Link Data Topic B: Export Data Topic C: Create a Mail Merge Using Queries to Manage Data Topic A: Create Action Queries Topic B: Create Unmatched and Duplicate Queries Creating Complex Reports and Forms Topic A: Create Subreports Topic B: Create a Navigation Form Topic C: Show Details in Subforms and Popup Forms Creating Access Macros Topic A: Create a Standalone Macro to Automate Repetitive Tasks Topic B: Create a Macro to Program a User Interface Component Topic C: Filter Records by Using a Condition Topic D: Create a Data Macro Using VBA to Extend Database Capabilities Topic A: Introduction to VBA Topic B: Using VBA with Form Controls Managing a Database Topic A: Back Up a Database Topic B: Manage Performance Issues Topic C: Document a Database Distributing and Securing a Database Topic A: Split a Database for Multiple-User Access Topic B: Implement Security Topic C: Convert an Access Database to an ACCDE File Topic D: Package a Database with a Digital Signature
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming
Duration 2 Days 12 CPD hours This course is intended for If you are a data analyst, data scientist, or a business analyst who wants to get started with using Python and machine learning techniques to analyze data and predict outcomes, this book is for you. Basic knowledge of computer programming and data analytics is a must. Familiarity with mathematical concepts such as algebra and basic statistics will be useful. Overview By the end of this course, you will have the skills you need to confidently use various machine learning algorithms to perform detailed data analysis and extract meaningful insights from data. This course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You?ll discover how to tune the algorithms to provide the best predictions on new and unseen data. As you delve into later sections, you?ll be able to understand the working and output of these algorithms and gain insight into not only the predictive capabilities of the models but also their reasons for making these predictions. Data Exploration and Cleaning Python and the Anaconda Package Management System Different Types of Data Science Problems Loading the Case Study Data with Jupyter and pandas Data Quality Assurance and Exploration Exploring the Financial History Features in the Dataset Activity 1: Exploring Remaining Financial Features in the Dataset Introduction to Scikit-Learn and Model Evaluation Introduction Model Performance Metrics for Binary Classification Activity 2: Performing Logistic Regression with a New Feature and Creating a Precision-Recall Curve Details of Logistic Regression and Feature Exploration Introduction Examining the Relationships between Features and the Response Univariate Feature Selection: What It Does and Doesn't Do Building Cloud-Native Applications Activity 3: Fitting a Logistic Regression Model and Directly Using the Coefficients The Bias-Variance Trade-off Introduction Estimating the Coefficients and Intercepts of Logistic Regression Cross Validation: Choosing the Regularization Parameter and Other Hyperparameters Activity 4: Cross-Validation and Feature Engineering with the Case Study Data Decision Trees and Random Forests Introduction Decision trees Random Forests: Ensembles of Decision Trees Activity 5: Cross-Validation Grid Search with Random Forest Imputation of Missing Data, Financial Analysis, and Delivery to Client Introduction Review of Modeling Results Dealing with Missing Data: Imputation Strategies Activity 6: Deriving Financial Insights Final Thoughts on Delivering the Predictive Model to the Client