• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

20323 Courses

R Programming for Data Science (v1.0)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for students who want to learn the R programming language, particularly students who want to leverage R for data analysis and data science tasks in their organization. The course is also designed for students with an interest in applying statistics to real-world problems. A typical student in this course should have several years of experience with computing technology, along with a proficiency in at least one other programming language. Overview In this course, you will use R to perform common data science tasks.You will: Set up an R development environment and execute simple code. Perform operations on atomic data types in R, including characters, numbers, and logicals. Perform operations on data structures in R, including vectors, lists, and data frames. Write conditional statements and loops. Structure code for reuse with functions and packages. Manage data by loading and saving datasets, manipulating data frames, and more. Analyze data through exploratory analysis, statistical analysis, and more. Create and format data visualizations using base R and ggplot2. Create simple statistical models from data. In our data-driven world, organizations need the right tools to extract valuable insights from that data. The R programming language is one of the tools at the forefront of data science. Its robust set of packages and statistical functions makes it a powerful choice for analyzing data, manipulating data, performing statistical tests on data, and creating predictive models from data. Likewise, R is notable for its strong data visualization tools, enabling you to create high-quality graphs and plots that are incredibly customizable. This course will teach you the fundamentals of programming in R to get you started. It will also teach you how to use R to perform common data science tasks and achieve data-driven results for the business. Lesson 1: Setting Up R and Executing Simple Code Topic A: Set Up the R Development Environment Topic B: Write R Statements Lesson 2: Processing Atomic Data Types Topic A: Process Characters Topic B: Process Numbers Topic C: Process Logicals Lesson 3: Processing Data Structures Topic A: Process Vectors Topic B: Process Factors Topic C: Process Data Frames Topic D: Subset Data Structures Lesson 4: Writing Conditional Statements and Loops Topic A: Write Conditional Statements Topic B: Write Loops Lesson 5: Structuring Code for Reuse Topic A: Define and Call Functions Topic B: Apply Loop Functions Topic C: Manage R Packages Lesson 6: Managing Data in R Topic A: Load Data Topic B: Save Data Topic C: Manipulate Data Frames Using Base R Topic D: Manipulate Data Frames Using dplyr Topic E: Handle Dates and Times Lesson 7: Analyzing Data in R Topic A: Examine Data Topic B: Explore the Underlying Distribution of Data Topic C: Identify Missing Values Lesson 8: Visualizing Data in R Topic A: Plot Data Using Base R Functions Topic B: Plot Data Using ggplot2 Topic C: Format Plots in ggplot2 Topic D: Create Combination Plots Lesson 9: Modeling Data in R Topic A: Create Statistical Models in R Topic B: Create Machine Learning Models in R

R Programming for Data Science (v1.0)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-314 Citrix App Layering and WEM Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment or Citrix Cloud looking to expand their Citrix Virtual Apps and Desktops skills to an advanced level. Potential students include administrators or engineers responsible for the Citrix Apps and Desktop 7 Site. Overview After completing this course you should be able to: Configure Workspace Environment Management to improve the end user environment and virtual resource consumption Implement App Layering skills, for example how to create and administer OS, platform, application, elastic and user layers Migrate to Workspace Environment Management Students will learn to build and combine App Layers to optimize management of your app and desktop images and to implement Workspace Environment Management to improve log-on times, centralize user settings management, and optimize the performance of machines. Students will leave this course with a good understanding of how to manage more complex solutions and features in their Citrix Virtual Apps and Desktop 7 site. Introduction to App Layering App Layering Introduction Architecture and How it Works The OS Layer Creating an OS Layer The Platform Layer Creating a Platform Layer The App Layers Creating App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Environment Management Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Security Features Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations Additional course details: Nexus Humans CWS-314 Citrix App Layering and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-314 Citrix App Layering and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-314 Citrix App Layering and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers System Administrators Architects Channel Partners Data Analysts Overview Upon completing this course, you will be able to meet these overall objectives: Describe how harnessing the power of your machine data enables you to make decisions based on facts, bot intuition or best guesses. Reduce the time you spend investigating incidents by up to 90%. Find and fix problems faster by learning new technical skills for real world scenarios. Get started with Splunk Enterprise, from installation and data onboarding to running search queries to creating simple reports and dashboards. Accelerate time to value with turnkey Splunk integrations for dozens of Cisco products and platforms. Ensure faster, more predictable Splunk deployments with a proven Cisco Validated Design and the latest Cisco UCS server. This course will cover how Splunk software scales to collect and index hundreds of terabytes of data per day, across multi-geography, multi-datacenter and cloud based infrastructures. Using Cisco?s Unified Computing System (UCS) Integrated Infrastructure for Big Data offers linear scalability along with operational simplification for single-rack and multiple-rack deployments. Cisco Integrated Infrastructure for Big Data and Splunk What is Cisco CPA? Architecture benefits for Splunk Components of IIBD and relationship to Splunk Architecture Cisco UCS Integrated Infrastructure for Big Data with Splunk Enterprise Splunk- Big Data Analytics NFS Configurations for the Splunk Frozen Data Storage NFS Client Configurations on the Indexers Splunk- Start Searching Chargeback Reporting Building custom reports using the report builder Application Containers Understanding Application Containers Understanding Advanced Tasks Task Library & Inputs CLI & SSH Task Understanding Compound Tasks Custom Tasks Open Automation Troubleshooting UCS Director Restart Module Loading Report Errors Feature Loading Report Registration REST API- Automation UCS Director Developer Tools Accessing REST using a REST client Accessing REST using the REST API browser Open Automation SDK Overview Open Automation vs. Custom Tasks Use Cases UCS Director PowerShell API Cisco UCS Director PowerShell Console Installing & Configuring Working with Cmdlets Cloupia Script Structure Inputs & Outputs Design Examples Additional course details: Nexus Humans Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK)
Delivered OnlineFlexible Dates
Price on Enquiry

Java Programming (Java SE 7)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Java programmers and have worked with databases and with object-oriented programming techniques, who are now ready to create more complex and advanced programs using Java SE 7. Overview Upon successful completion of this course, students will be able to: - create and manage custom classes. - control program flow by writing code to respond to specific criteria. - implement object-oriented programming techniques to create reusable and reliable programs. - work with Java utility class libraries. - use the capabilities of the Java I/O package to read and write data to external files or media. - use collection APIs in Java to manage data. - use generics to enforce compile-time type checking. - use multi-threaded programs to help handle multiple tasks concurrently. - manage Java applications for memory efficiency and create distributable versions of a Java application. Students will work with advanced features of Java. Working with Classes Create Classes Create Variables Write an Expression Work with Arrays Work with Static Class Members Define Methods Use Enumerated Data Types Controlling Program Flow Work with Conditional Statements Work with Looping Statements Handle Exceptions Handle Chained Exceptions Write and Enable Assertions Implementing Object-Oriented Programming Concepts Extend a Class Overload and Override Methods Work with Interfaces Create Inner Classes Examine Object-Oriented Design Concepts Working with Java Utility Class Libraries Work with Strings Format and Parse Strings Work with Dates, Numbers, and Currencies Using the Java I/O Package Work with the File Class Work with Byte Streams Work with Character Streams Read Files Write to a File Manipulate I/O Objects Using Collections Work with the Collection Interface Work with the Set Collection Work with List Collections Work with Queues Work with the Map Collection Work with Collection Utilities Working with Generics Declare Generics Implement Generics Using Multi-Threaded Programs Create a Multi-Threaded Program Synchronize Threads Managing Java Applications Implement Garbage Collection Deploy a Java Application Additional course details: Nexus Humans Java Programming (Java SE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Programming (Java SE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Java Programming (Java SE 7)
Delivered OnlineFlexible Dates
Price on Enquiry

JL2V - Junos Layer 2 VPNs

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Course Level : Junos Layer 2 VPNs (JL2V) is an advanced-level course. Overview Define the term virtual private network. Describe the business drivers for MPLS VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs. Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN. Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN. Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning. Monitor and troubleshoot a BGP Layer 2 VPN. Explain the BGP Layer 2 VPN scaling mechanisms and route reflection. Describe the Junos OS BGP Layer 2 VPN CoS support. Describe the flow of control and data traffic for an LDP Layer 2 circuit. Configure an LDP Layer 2 circuit. Monitor and troubleshoot an LDP Layer 2 circuit. Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs. Configure a FEC 129 BGP autodiscovery Layer 2 VPN. Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs. Describe the difference between Layer 2 MPLS VPNs and VPLS. Explain the purpose of the PE device, the CE device, and the P device. Explain the provisioning of CE and PE routers. Describe the signaling process of VPLS. Describe the learning and forwarding process of VPLS. Describe the potential loops in a VPLS environment. Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS. Troubleshoot VPLS. Describe the purpose and features of Ethernet VPN. Configure Ethernet VPN. Monitor and troubleshoot Ethernet VPN. Describe the Junos OS support for hierarchical VPN models. Describe the Junos OS support for Carrier-of-Carriers VPN Option C. Configure the interprovider VPN Option C. Describe the Junos OS support for multisegment pseudowire for FEC 129. Describe and configure circuit cross-connect (CCC). This two-day course is designed to provide students with MPLS-based Layer 2 virtual private network (VPN) knowledge and configuration examples. Course IntroductionMPLS VPNs MPLS VPNs Provider-Provisioned VPNs BGP Layer 2 VPNs Overview of Layer 2 Provider-Provisioned VPNs BGP Layer 2 VPN Operational Model: Control Plane BGP Layer 2 VPN Operational Model: Data Plane Preliminary BGP Layer 2 VPN Configuration BGP Layer 2 Configuration Monitoring and Troubleshooting BGP Layer 2 VPNs Lab: BGP Layer 2 VPNs Layer 2 VPN Scaling and CoS Review of VPN Scaling Mechanisms Layer 2 VPNs and CoS LDP Layer 2 Circuits LDP Layer 2 Circuit Operation LDP Layer 2 Circuit Configuration LDP Layer 2 Circuit Monitoring and Troubleshooting FEC 129 BGP Autodiscovery Layer 2 Circuit Operation FEC 129 BGP Autodiscovery Layer 2 Circuit Configuration FEC 129 BGP Autodiscovery Monitoring and Troubleshooting Virtual Private LAN Services Layer 2 MPLS VPNs Versus VPLS BGP VPLS Control Plane BGP VPLS Data Plane Learning and Forwarding Process Loops VPLS Configuration VPLS Configuration VPLS Troubleshooting Ethernet VPN (EVPN) EVPN Overview EVPN Control Plane EVPN Operation EVPN Configuration EVPN Troubleshooting

JL2V - Junos Layer 2 VPNs
Delivered OnlineFlexible Dates
Price on Enquiry

Understand and Drive Your Salesforce Implementation ( BSX101 )

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for individuals who are (or will soon be) supporting a Salesforce implementation in a decision-making capacity. This includes, but is not limited to, business analysts, IT managers, project managers, executive leaders, and executive sponsors. This class is not recommended for individuals tasked with solution-building. Overview When you complete this course, you will be able to: Identify key stakeholders needed for a successful Salesforce implementation. Describe the Salesforce data model as it relates to Customer 360, Salesforce Clouds, and the Salesforce Platform. Communicate the appropriate security measures needed to control org and data access. Discuss which standard or custom objects and applications should be implemented based on specific requirements and use cases. Effectively strategize how to migrate data into your Salesforce org while maintaining high data quality. Understand Salesforce automation tools and how they solve for various business challenges. Analyze Salesforce data with Reports and Dashboards. Navigate the key phases and milestones of a Salesforce implementation. Explore Salesforce features and functionality and gain the knowledge to make Salesforce implementation decisions with confidence. In this 3-day, heavily discussion-based class, learn about standard and custom objects and applications, data management, data visualization, flow automation tools, security mechanisms, and more. Successfully navigate the key phases and milestones of a Salesforce implementation, effectively communicate business needs, and provide directives to team members tasked with solution-building to deliver a robust Salesforce solution that achieves business goals. Salesforce Data Model Discover the Customer 360 Platform Examine Salesforce Clouds Navigate the Salesforce Platform Review the Salesforce Platform Data Model Understand Data Visualization Security & Access Create Users Access the Org Control Data Objects & Applications Review Standard Objects Understand Custom Objects Explore Standard Applications Discover Custom Applications Salesforce Customizations Work with Fields Design Page Layouts Understand Record Types Review Dynamic Capabilities Successful Data Management Determine Data Strategy Create Data Ensure Data Quality Process Automation Streamline Business Processes Using Automation Tools Learn Purpose-Driven Automation Automate With Flow Data Analysis Using Reports & Dashboards Organize Reports and Dashboards Build Reports Create Dashboards Create an Analytics Strategy Adoption & Continued Improvement Adopt Your Implementation Evaluate Continued Improvements Additional course details: Nexus Humans Understand and Drive Your Salesforce Implementation ( BSX101 ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Understand and Drive Your Salesforce Implementation ( BSX101 ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Understand and Drive Your Salesforce Implementation ( BSX101 )
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced AWS Well-Architected Best Practices

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Learners who will find this course applicable to their work include: Solutions architects Cloud practitioners Data engineers Data scientists Developers Overview In this course, you will explore: Workload definition and key concepts The AWS Well-Architected Framework Review phases, process, best practices, and antipatterns High and medium risks Prioritizing improvements to the AWS Well-Architected workflow Locating and using the AWS Well-Architected Framework white paper, labs, prebuilt solutions in the AWS solutions library, AWS Well-Architected independent software vendors (ISVs), and AWS Well-Architected Partner Program (WAPP) This interactive course provides a deep dive into Amazon Web Services (AWS) best practices to help you perform effective and efficient AWS Well-Architected Framework Reviews. The course covers the phases of a review, including how to prepare, run, and get guidance after a review has been performed. Attendees should have familiarity with the AWS concepts, terminology, services, and tools that are covered in the intermediate, 200-levelAWS Well-Architected Best Practices.This course provides an AWS Well-Architected Framework Review simulation and instructor-led group exercises and discussions regarding prioritizing and solutioning risks. The content focuses on teaching learners how to prepare proposals on high and medium risk issues using the AWS Well-Architected Tool. Module 1: AWS Well-Architected Framework Reviews Workload definition Key concepts of a workload AWS Well-Architected Review phases AWS Well-Architected Review approach, lessons learned, and use case AWS Well-Architected Review best practices AWS Well-Architected Review anti-patterns Module 2: Customer Scenario Group Sessions Demonstration of a Review question and answer example Operational excellence Group role-play exercise Two questions in this pillar Security Group role-play exercise Three questions in this pillar Reliability Group role-play exercise Three questions in this pillar Performance efficiency Group role-play exercise Three questions in this pillar Cost optimization Group role-play exercise Three questions in this pillar Module 3: Risk Solutions and Priorities AWS Well-Architected workflow Defining and solutioning high risk issues (HRIs) and medium risk issues (MRIs) Identifying significant risks and solutioning group discussion for: Operational excellence Security Reliability Performance efficiency Cost optimization Prioritizing improvements Module 4: Resources Resource pages AWS Well-Architected ISVs Module 5: Course Summary Objective recap Debrief What?s next? Additional course details: Nexus Humans Advanced AWS Well-Architected Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced AWS Well-Architected Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced AWS Well-Architected Best Practices
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Media Essentials for IT Business Decision Makers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for Business Leaders, including managers/supervisors in the following roles: Developer Architect Video Operator Overview In this course, you will learn to: Articulate the essential terms and concepts fundamental to video compression and distribution Describe the four fundamental stages of video streaming workflows: ingest, process, store and deliver Explain the importance of security in the AWS Cloud and how it is applied in video streaming workflows Analyze video streaming workflow diagrams using AWS services, based on simple to complex use cases Describe some of the key variables that influence workflow decisions Recognize how other AWS services for compliance, storage, and compute, interact with AWS Media Services in video streaming workflows and the functions they perform Describe strategies to test or prototype workflows to mitigate risk and cost impacts and optimize video streaming workflows Use the AWS Management Console to build and run simple video streaming workflows for live and video-on-demand content Recognize the automation and data analytics available for Media Services when used with AWS AI and explore media-specific use cases for these services Identify the next steps in exploring migration to the cloud for one or more Media Services This course covers the media and cloud fundamentals that will empower you to develop a cloud migration strategy for media workflows in support of business goals. The course covers important concepts related to video processing and delivery, the variables that can impact migration decisions, and real-world examples of hybrid and cloud use cases for AWS Media Services. It also introduces security, artificial intelligence, and analytics concepts to help you consider how AWS Media Services fit into your overall cloud strategy. Module 1: Important video concepts Video Metrics Video Compression Video Distribution Major Protocols Used in Video Streaming Module 2: Anatomy of streaming workflows Ingest Process Store Deliver Module 3: Using AWS services in media workflows video-on-demand (VOD) Introduction to AWS Media Services Security Variables Impacting Workflow Design VOD Simple Use Cases VOD Advanced Use Cases Lab 1: Build and run a simple video streaming workflow for VOD content Module 4: Using AWS services in media workflows live streaming Challenges of Live Streaming Live Streaming Simple Use Cases Live Streaming Advanced Use Cases Lab 2: Build and run a simple video streaming workflow for live content Module 5: Optimizing Workflows Cost Considerations Mitigating Risk Monitoring and Automation Exploring Migration Options Additional course details: Nexus Humans AWS Media Essentials for IT Business Decision Makers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Media Essentials for IT Business Decision Makers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Media Essentials for IT Business Decision Makers
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Security Specialist (ECSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Security Specialist (ECSS)
Delivered OnlineFlexible Dates
Price on Enquiry

Effective Data Visualization with Tableau

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is relevant to anyone who needs to work with and understand data including: Business Analysts, Data Analysts, Reporting and BI professionals Marketing and Digital Marketing professionals Digital, Web, e-Commerce, Social media and Mobile channel professionals Business managers who need to interpret analytical output to inform managerial decisions Overview This course will cover the basic theory of data visualization along with practical skills for creating compelling visualizations, reports and dashboards from data using Tableau. Outcome: After attending this course delegates will understand - How to move from business questions to great data visualizations and beyond How to apply the fundamentals of data visualization to create informative charts How to choose the right visualization type for the job at hand How to design and develop basic dashboards in Tableau that people will love to use by doing the following: Reading data sources into Tableau Setting up the roles and data types for your analysis Creating new data fields using a range of calculation types Creating the following types of charts - cross tabs, pie and bar charts, geographic maps, dual axis and combo charts, heat maps, highlight tables, tree maps and scatter plots Creating Dashboards that delight using the all of the features available in Tableau. The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to tourism. From Business Questions to Data Visualisation and Beyond The first step in any data analysis project is to move from a business question to data analysis and then on to a complete solution. This section will examine this conversion emphasizing: The use of data visualization to address a business need The data analytics process ? from business questions to developed dashboards Introduction to Tableau ? Part 1 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Introduction to Tableau ? Part 2 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Key Components of Good Data Visualisation and The Visualisation Zoo In this section the following topics will be covered: Colour theory Graphical perception & communication Choosing the right chart for the right job Data Exploration with Tableau Exploring data to answer business questions is one of the key uses of applying good data visualization techniques within Tableau. In this section we will apply the data visualization theory from the previous section within Tableau to uncover trends within the data to answer specific business questions. The types of charts that will be covered are: Cross Tabs Pie and bar charts Geographic maps Dual axis and combo charts with different mark types Heat maps Highlight tables Tree maps Scatter plots Introduction to Building Dashboards with Tableau In this section, we will implement the full process from business question to final basic dashboard in Tableau: Introduction to good dashboard design Building dashboards in Tableau

Effective Data Visualization with Tableau
Delivered OnlineFlexible Dates
Price on Enquiry