• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27137 Courses

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

CCES Check Point Certified Endpoint Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCES Check Point Certified Endpoint Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Software management - the business perspective (In-House)

By The In House Training Company

Software comes in a variety of guises - application software, firmware, middleware, system software. Increasingly, however, it doesn't necessarily present that way, especially as the boundaries between software, data and source code are becoming more and more blurred. And as software becomes more complex and more difficult to disentangle, so it becomes harder to manage and to value. But as it becomes more integral to every aspect of a business, so it is ever more important to keep on top of the technical, legal and commercial issues that arise, issues such as: To address these issues, organisations need a process for evaluating their current situation from all perspectives and for identifying the key actions they need to take to ensure holistic management of their software. This very practical programme will help set your organisation on the right path. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This programme is designed to give you a deeper understanding of: The technical, legal and commercial risks associated with software development, procurement, use and commercial exploitation The most appropriate processes and responsibilities for managing those risks Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 Software business model What is the software business model? What options exist? Has the software business model been thoroughly reviewed to ensure its viability? This means fully understanding the market opportunity, the business environment and customer and end-user expectations. 2 Technology What are the technologies? How has the technology selection been validated considering the competitiveness, structure, and potential for future innovation? 3 UI and UX What is the UI and UX? How to best articulate this? Has the user interface and user experience been studied from both a subjective and objective view to give insight into customer behaviour? 4 Legal framework / commercial aspects Has the necessary legal framework or commercial aspects that may impact upon use or operation of the software been understood and risks identified and mitigated? 5 Software development What is the software development process? Are both the business management and development team's processes resilient in order to improve the company's capability and the maturity of the software? 6 Software quality What is quality? What are the metrics around software quality? What is the maturity level, based around a qualitative and quantitative assessment? 7 Intellectual property associated What IP should be considered when it comes to software? Does the company understand both the intellectual property risks and potential opportunities associated with this software? 8 Security What does software security mean in this context? How is it being addressed? 9 An holistic approach Review of roles and responsibilities to ensure appropriate management and protection

Software management - the business perspective (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Professional administrator (In-House)

By The In House Training Company

Today's administrative professional needs flexibility and a broad portfolio of skills including self-motivation, assertiveness, and the ability to deal with difficult people. You will benefit from this course if you are an administrator, medical/legal secretary or PA, who wants to enhance your administrative support skills, as well as evaluating your existing techniques. This course will help you identify: your areas of strength and your areas for improvement in the work environment ways to accept new challenges and responsibilities with confidence what motivates you at work techniques to improve your planning and time management ways of improving your influencing and assertiveness skills your preferred working style (and relate it to your interaction with others) ways of using your initiative how to deal with challenging people, using recognised communication methods The course will help you develop a flexible set of skills that will allow you to succeed at work, no matter what the day throws at you. It will help you communicate effectively with a diverse range of colleagues and others with tact and diplomacy. And, finally, it will help you provide the administrative support that is essential for the smooth running of your area and of the organisation as a whole. 1 Introduction Overview Introductions Individual objectives 2 What exactly is your role? Before looking at new skills and techniques, where are you now? Do you have the skills, knowledge and attitude required to be an exceptional administrator? Understand your job criteria Identifying your strengths and areas for development Activity - skills analysis Activity - action plan 3 Building trust How can you build trust? Understanding the links between reliability, consistency and trust What is required to deliver efficient service? Activity: efficient service requirements of the professional administrator 4 Working styles Identifying your working style preference Understanding the importance of a flexible approach Identifying areas of improvement to become a more effective team member Activity: Questionnaire (completing, scoring and charting) Activity: drawbacks of my style Developing your working style 5 Assertiveness Understand the differences between behaviours Activity: Definition and characteristics of assertive / aggressive / passive behaviour Activity: Identifying different behaviours Understanding how to be more assertive How to use assertiveness techniques How to ask for feedback Activity: Making requests assertively Activity: Refusing requests assertively 6 Time management The importance of planning for success The importance of managing interruptions The importance of having clear purpose Time management best practices Activity: How do you plan your time? What prevents you improving your time management? How will you recognise success? 7 Prioritisation How to prioritise work to meet deadlines The prioritisation matrix Activity: Post it! 8 Dealing with interruptions The impact interruptions have on productivity How to manage interruptions Activity: What interruptions do you experience? What tactics can be employed to reduce these interruptions? 9 Close Open forum Summary Action planning

Professional administrator (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Preparing for the Professional Cloud Architect Examination

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Cloud professionals who intend to take the Professional Cloud Architect certification exam. Overview Candidates will be able to identify skill gaps and further areas of study. Candidates will also be directed to appropriate target learning resources. Students in this course will prepare for the Professional Cloud Architect Certification Exam. They will rehearse useful skills including exam question reasoning and case comprehension, tips and review of topics from the Infrastructure curriculum. Understanding the Professional Cloud Architect Certification Position the Professional Cloud Architect certification among the offerings Distinguish between Associate and Professional Provide guidance between Professional Cloud Architect and Associate Cloud Engineer Describe how the exam is administered and the exam rules Provide general advice about taking the exam Sample Case Studies MountKirk Games Dress4Win TerramEarth Designing and Implementing Review the layered model from Design and Process Provide exam tips focused on business and technical design Designing a solution infrastructure that meets business requirements Designing a solution infrastructure that meets technical requirements Design network, storage, and compute resources Creating a migration plan Envisioning future solution improvements Resources for learning more about designing and planning Configuring network topologies Configuring individual storage systems Configuring compute systems Resources for learning more about managing and provisioning Designing for security Designing for legal compliance Resources for learning more about security and compliance Optimizing and Operating Analyzing and defining technical processes Analyzing and defining business processes Resources for learning more about analyzing and optimizing processes Designing for security Designing for legal compliance Resources for learning more about security and compliance Advising development/operation teams to ensure successful deployment of the solution Resources for learning more about managing implementation Easy buttons Playbooks Developing a resilient culture Resources for learning more about ensuring reliability Next Steps Present Qwiklabs Challenge Quest for the Professional CA Identify Instructor Led Training courses and what they cover that will be helpful based on skills that might be on the exam Connect candidates to individual Qwiklabs, and to Coursera individual courses and specializations. Review/feedback of course Additional course details: Nexus Humans Preparing for the Professional Cloud Architect Examination training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Preparing for the Professional Cloud Architect Examination course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Preparing for the Professional Cloud Architect Examination
Delivered OnlineFlexible Dates
Price on Enquiry

Java Programming (Java SE 7)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Java programmers and have worked with databases and with object-oriented programming techniques, who are now ready to create more complex and advanced programs using Java SE 7. Overview Upon successful completion of this course, students will be able to: - create and manage custom classes. - control program flow by writing code to respond to specific criteria. - implement object-oriented programming techniques to create reusable and reliable programs. - work with Java utility class libraries. - use the capabilities of the Java I/O package to read and write data to external files or media. - use collection APIs in Java to manage data. - use generics to enforce compile-time type checking. - use multi-threaded programs to help handle multiple tasks concurrently. - manage Java applications for memory efficiency and create distributable versions of a Java application. Students will work with advanced features of Java. Working with Classes Create Classes Create Variables Write an Expression Work with Arrays Work with Static Class Members Define Methods Use Enumerated Data Types Controlling Program Flow Work with Conditional Statements Work with Looping Statements Handle Exceptions Handle Chained Exceptions Write and Enable Assertions Implementing Object-Oriented Programming Concepts Extend a Class Overload and Override Methods Work with Interfaces Create Inner Classes Examine Object-Oriented Design Concepts Working with Java Utility Class Libraries Work with Strings Format and Parse Strings Work with Dates, Numbers, and Currencies Using the Java I/O Package Work with the File Class Work with Byte Streams Work with Character Streams Read Files Write to a File Manipulate I/O Objects Using Collections Work with the Collection Interface Work with the Set Collection Work with List Collections Work with Queues Work with the Map Collection Work with Collection Utilities Working with Generics Declare Generics Implement Generics Using Multi-Threaded Programs Create a Multi-Threaded Program Synchronize Threads Managing Java Applications Implement Garbage Collection Deploy a Java Application Additional course details: Nexus Humans Java Programming (Java SE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Programming (Java SE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Java Programming (Java SE 7)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolution designers Overview After taking this course, you should be able to:Describe the Cisco IOS XR software architecture, high availability components, and scalability featuresPerform basic configurations on a Cisco IOS XR routerDescribe Cisco IOS XR software operationsDescribe the configuration file systemPerform Cisco IOS XR software installationsConfigure AAA servicesConfigure NTPConfigure Simple Network Management Protocol (SNMP), telemetry, and loggingConfigure routing protocolsMonitor processesUse error messages and core dumps he Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco© Internetwork Operating System (Cisco IOS©) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Cisco IOS XR Software Overview Platform Overview Cisco IOS XR Architecture Cisco IOS XR High Availability Cisco IOS XR Software Configuration Basics Cisco IOS XR Configuration Operations Cisco IOS XR Initial Configuration Reviewing the Configuration Cisco IOS XR Software Operations Examining Configuration Operations Examining Configuration Rollback and Recovery Configuration File System Overview Examining the Binary Configuration Examining the Commit Database Examining the ASCII Configuration Examining the Nonvolatile Generation (NVgen) Files Verifying Cisco Fabric Services (CFS) Integrity Cisco IOS XR Software Installation Software Package Basics Installing Software Packages AAA Security AAA Fundamentals Task-Based Security Configuring a User Security Policy Authentication with Remote Servers Configuring Router to AAA Server Communication Configuring Authentication Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization Configuring Accounting AAA Troubleshooting Network Time Synchronization Network Time Protocol SNMP, Telemetry, and Logging Examining SNMP Examining Telemetry Examining Logging Basic Routing Configuration Configuring Intermediate System to Intermediate System (IS-IS) Configuring Open Shortest Path First (OSPF) Configuring Border Gateway Protocol (BGP) Configuring Routing Protocol for LLN (RPL) Policy Packet Filtering Access Control Lists Unicast Reverse Path Forwarding Management Plane Protection Monitoring Process Examining Processes and Threads Process Crashes Commands for Debugging Processes Restartability of Processes Process Monitoring Identifying Memory Problems Memory Depletion Core Dumps Core Dump Fundamentals Using Core Dump Information Additional course details: Nexus Humans Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

BA10 - Understanding Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview Learn how to initiate a root cause analysis and gather data for investigating process and non-process incidentsDemonstrate how to collect data through interviews and analysisApply powerful techniques to identify and know the difference between symptoms and root causesLearn to know when to use the appropriate technique in root cause identification Learn how to avoid future incidents by developing appropriate recommendations to address causal factors and root causes Develop a process to identify systemic problem areas In this course, participants will learn to apply several practical, systematic methods for analyzing incidents and problems to uncover root causes. Understanding of these techniques will be reinforced by classroom exercises. Introduction & Objectives What is a 'Problem?' Why Problems Persist What is A Root Cause? Why Root Causes are important How to Organize for an RCA RCA Roles and Responsibilities Assemble your RCA Team Modes of Communication How to Resolve Conflict Case Study Exercise Select the Problem to Analyze Define the selection criteria Plan and estimate tasks for the team Finalize the plan and gain agreement among your stakeholders Case Study Exercise Define the Problem What to look for - Problem-as-Given (PAG) vs. Problem-as-Understood (PAU) Developing your problem statement Refining the problem specification Case Study Exercise Identify the Source of the Problem Discuss when to use the appropriate analysis technique to determine the problem source Process Diagram Forms & Checklists Statistical Sampling Fishbone Diagram Surveys Charts - Line, Scatter, Bar, & Pie Case Study Exercise Solution Options Analysis & Selecting the 'Best Fit' How to approach different solution options Brainstorming Weighted Evaluation Selecting the appropriate option Hold an Retrospective on your approach Planning the proposal Case Study Exercise Putting RCA into Practice Create a Root Cause Analysis program within your organization How to develop appropriate recommendations to address root causes at various levels to avoid future incidents Additional course details: Nexus Humans BA10 - Understanding Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA10 - Understanding Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA10 - Understanding Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

SCM510 SAP Inventory Management and Physical Inventory

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Teach participants the basic functions of inventory management and physical inventory, and how to create different goods movements in the SAP system.Familiarize participants with the special functions of inventory management and physical inventory, and the Customizing settings relevant to inventory management and physical inventory. This course will give students an overview and in depth knowledge of the inventory management process in SAP. After attending this class, students will understand the major business processes, functions & configuration in inventory management. Introduction to Inventory Management Defining Inventory Management and Physical Inventory Moving Goods with the MIGO Transaction Goods Receipts (GRs) Posting a GR Without Reference Posting a GR with Reference Posting a GR with Automatic Generation of a PO Posting Cancellations, Return Deliveries, and Returns Applying Order Price Unit in Inventory Management Applying Tolerances and the Delivery Completed Indicator Adding Date Checks to GRs for a PO Stock Transfers and Transfer Postings Performing Transfer Postings Performing Stock Transfers Between Storage Locations Performing Stock Transfers Between Plants Reservations Creating Manual Reservations Evaluating Reservations Checking Availability and Missing Parts Goods Issues (GIs) Posting Unplanned GIs Posting a GI with Reference Configuring Stock Determination Allowing Negative Stock Special Forms of Procurement and Special Stocks Performing the Process of Subcontracting Performing Vendor Consignment Operating Pipeline Processes Posting Goods Movements for Special Stocks Special Features of Material Valuation Posting Goods Movements for Material Types UNBW and NLAG Configuring Split Valuation Physical Inventory Conducting Physical Inventory Analyzing the Determination of Book Inventory Simplifying Physical Inventory Applying Cycle Counting Applying Inventory Sampling Analyses Applying Stock Lists and Document Lists Applying Periodic Processing Customizing Implementing Settings for Documents Setting Up Movement Types Applying Other Customizing Settings Logistics Execution Managing Logistics Execution Processes Posting a GR Against a PO Posting a GI for a Sales Order Additional course details: Nexus Humans SCM510 SAP Inventory Management and Physical Inventory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM510 SAP Inventory Management and Physical Inventory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM510 SAP Inventory Management and Physical Inventory
Delivered OnlineFlexible Dates
Price on Enquiry