Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators. Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution. This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. Course Outline 1 - Solution Overview 2 - Branch Design 3 - Routing 4 - Policy Module #1 - Application Path and QoS Policy 5 - Policy Module #2 - NAT, ZBFW and Security 6 - Event Policy Management Services 7 - DNS and DHCP Services 8 - Operations and Troubleshooting 9 - CloudBlades 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation 11 - DevOps 12 - Next Steps Additional course details: Nexus Humans Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Application Consultant Data Consultant / Manager Developer Consultant Technology Consultant Program / Project Manager Business Analyst Developer User Business Process Owner / Team Lead / Power User Overview This course will prepare you to: Outline SAP Transportation Management business processes Identify and examine the SAP TM building blocks necessary for processing shipments of goods. Engage in Transportation network maintenance, order/requirements integration and management, transportation planning, shipment execution, and freight invoicing and settlement. Use both the SAP ERP and SAP TM systems using the NetWeaver Business Client interface This course will help you to prepare for the blueprinting stage of your SAP Transportation Management implementation or enable you to use the system in your role as a business user. You will gain an overview of the key business transactions and system capabilities to enable you to design the processes you will use within your own organization. You will learn how SAP TM can help you to support Order Management, Transportation Planning, Subcontracting, Execution, Charge Calculation and Settlement. This course is the mandatory foundational prerequisite for all follow-on SAP TM training courses. SAP Transportation Management (SAP TM) Evaluating SAP Transportation Management Evaluating the SAP TM System Landscape SAP TM User Interface Identifying NetWeaver Business Client Components Personalizing Object Worklists Transportation Management Master Data Identifying Master Data Requirements for SAP TM Evaluating the Organizational Structures Used in SAP TM Defining Conditions Determining Freight Incompatibilities Determining Dangerous Goods Shipping Requirements Transportation Order Management Triggering the Transportation Management Process Integrating SAP ERP with SAP TM Managing the Freight Forwarding Process Booking Capacities Transportation Planning Defining the Transportation Planning Process Viewing Freight Units Building Packages Defining Selection Profiles Determining Planning Profiles Accessing the Transportation Cockpit Creating Transportation Proposals Creating Freight Orders Optimizing Loads Transportation Execution Performing Carrier Selection Tendering Freight Orders Triggering Delivery Creation from SAP TM Executing Transportation in SAP ERP Integration between SAP TM and SAP EWM Generating Outputs Monitoring Transportation Events Exporting Freight Orders Analyzing Transportation Management Performance Charge Calculation and Freight Settlement Managing Charge Calculation Master Data Calculating Supplier Charges in Freight Orders Settling Supplier Freight Charges Calculating and Settling Customer Charges in Forwarding Orders Distributing Costs Settling Freight Charges in Group Logistics Companies Managing Freight Contracts
Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Participants in this course will learn how to update, upgrade, and reinstall the macOS then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage FileVault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues Additional course details: Nexus Humans macOS Support Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the macOS Support Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is people who are moving into a database role, or whose role has expanded to include database technologies. Developers that deliver content from SQL Server databases will also benefit from this material. Overview Describe key database concepts in the context of SQL Server Describe database languages used in SQL Server Describe data modeling techniques Describe normalization and denormalization techniques Describe relationship types and effects in database design Describe the effects of database design on performance Describe commonly used database objects This three-day instructor-led course is aimed at people looking to move into a database professional role or whose job role is expanding to encompass database elements. The course describes fundamental database concepts including database types, database languages, and database designs. This course updates and replaces course 10985C previously published under the same title. 1 - Introduction to databases Introduction to Relational Databases Other Databases and Storage Data Analysis SQL Server Database Languages 2 - Data Modeling Data Modelling Designing a Database Relationship Modeling 3 - Normalization Fundamentals of Normalization Normal Form Denormalization 4 - Relationships Introduction to Relationships Planning Referential Integrity 5 - Performance Indexing Query Performance Concurrency 6 - Database Objects Tables Views Stored Procedures, Triggers and Functions Additional course details: Nexus Humans 55313 Administering Configuration Manager, Part 1: Fundamentals and Asset Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55313 Administering Configuration Manager, Part 1: Fundamentals and Asset Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for It is essential information for beginning IT Asset Managers and other IT professionals involved in asset management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview During this course, students learn best practices in Software Asset Management Reducing Risk Increasing Accountability Uncovering Savings Gaining Control of the IT Environment The IAITAM Certified Software Asset Manager (CSAM) Course is a foundational education program that ensures students are able to manage software assets. Students also learn about the ever-changing variables throughout our industry. From software piracy and compliance issues to legislation and organizational challenges, it is necessary to evaluate both the internal and external influences that bring about change in how organizations manage their IT assets. A successful Software Asset Manager must look at the overall goals of the organization and determine where Software Asset Management will be a strategic influence in achieving those goals. This course also includes the exam for CSAM certification. Course Outline The Scope of Software Strategic License Management Software Harvesting License Documentation The Right to Audit Proactive vs. Reactive SAM Developing Goals Savings Opportunities ITAM Compliance Audit Letter Examples of License Data Documentation Compliance Enforcement Understanding the EULA Due Diligence for Compliance The Art of Negotiation Ts & Cs Advice ITAM Automation Selecting a Discovery Tool ITAM Repository Hardware & Organizational Impacts Additional course details: Nexus Humans Certified Software Asset Manager (CSAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Software Asset Manager (CSAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Business Process Architects, Developers, Consultants, Systems Administrators, and Technology Consultants Overview This course will prepare you to: Explain the use of SAP Process Integration and the path to SAP Process Orchestration (AEX, BPM and BRM) Explain SAP Process Integration architecture Configure JAVA scenarios Understand and configure the different options with which a back- end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure) using JAVA. In this course, students learn how to explain the use of SAP Process Integration and learn how to explain SAP Process Integration architecture. Module 1 SAP Process Integration Architecture Module 2 The System Landscape Directory (SLD) Module 3 Interface Objects in the Enterprise Service Repository Module 4 Object Mapping in the Enterprise Service Repository Module 5 Configuration of Integration Directory Communication Objects Module 6 Configuration of Integration Directory Objects for Java Processing Module 7 Operations of SAP Process Integration Module 8 Connectivity Options for SAP Process Integration Module 9 HTTP Connectivity Options Module 10 File Adapter Configuration Module 11 Intermediate Document Connectivity Options Module 12 Configuration of SAP Business Application Programming Interfaces Connectivity Module 13 Enterprise Services and B2B Connectivity Additional course details: Nexus Humans BIT500 SAP Java Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT500 SAP Java Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung richtet sich an Fachexperten für Geschäftsprozesse aller Branchen und IT-Experten, die die Blockchain beruflich als kryptographische Lösung oder als Smart Contract (Computerprotokoll zur Abwicklung von Verträgen) einsetzen oder einsetzen wollen. Overview Mit einem EXIN Blockchain Foundation-Zertifikat weisen Sie professionelle Kenntnisse in den folgenden Bereichen nach: Grundlagen der Blockchain-Technologie Blockchain-Herausforderungen Blockchain-Anwendungen Blockchain-Innovationen EXIN Blockchain Foundation ist eine Zertifizierung auf Basisniveau. Mit dem EXIN Blockchain Foundation-Zertifikat wird professionelle Kenntnisse nachgewiesen Âber Blockchain als Transaktionsverzeichnis analog einem Hauptbuch (Ledger), wie das potenziell als weltweites, dezentralisiertes Register zur Aufzeichnung, Bestandsaufnahme und Å¡bertragung von materiellen Werten, wie z. B. Finanzmitteln, Immobilien, Produkten, aber auch immateriellen Werten, wie Wahlstimmen, Software, Gesundheitsdaten und Ideen genutzt werden kann. Die Zertifizierung deckt die Grundbegriffe der Blockchain-Technologie, m'gliche Anwendungsbereiche, den potenziellen Wert fÂr die Organisation und die der Blockchain zugrundeliegende Technologie ab. Grundalgen der Blockchain Die Blockchain-Technologie Zusâtzliche Blockchain-Elemente Aufbau eines Blockchain-Netzwerks Blockchain-Herausforderungen Die Herausforderungen bei einer Blockchain Begrenzung des Blockchain-Risikos Blockchain-Anwendungen Anwendugsfâlle fÂr Blockchains Blockchain-Technologie fÂr Unternehmenswanwendungen Blockchain-Technologie fÂr gesellschaftliche Anwendungen Erweiterung von Blockchain-Anwendungen Blockchain und globale Wirtschaft Blockchain-Innovationen Innovationen in der Blockchain-Technologie Additional course details: Nexus Humans EXIN Blockchain Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EXIN Blockchain Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Security Engineers Security Administrators Security Operations Specialists Security Analysts Network Engineers Overview Successful completion of this four-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get hands-on experience configuring, managing, and troubleshooting Prisma Access in a lab environment. The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Course Outline 1 - Prisma Access Overview and Definitions 2 - Planning and Design Architecture 3 - Routing SD-WAN Design and CloudGenix 4 - Activate and Configure Service Connections 5 - Rule Enforcement in Prisma Access and SSL Decrypt 6 - Panorama Operations for Prisma Access and Fawkes Overview 7 - Remote Networks 8 - Mobile Users 9- Cloud Secure Web Gateway 10 - Tune, Optimize and Troubleshoot 11 - Manage Multiple Tenants 12 - What?s New in v2.1 13 - Next Steps Additional course details: Nexus Humans Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.