Duration 3 Days 18 CPD hours This course is intended for This class is ideal for business users - the people who need to learn what's possible with Salesforce functionality across the suite of products, but aren't necessarily responsible for managing the application. If you're a customer service manager, business executive, business operations manager, sales operations manager, or any other operations, management, or process analysis 'super user,' this class is just what you need to better understand the business value of the Salesforce Platform. Overview Describe the primary business value of each major Salesforce Cloud. Manage users and data. Manage basic org configuration. Create email templates. Create reports and dashboards. Apply and champion Chatter. Understand the Salesforce implementation and maintenance lifecycle. Extend Salesforce functionality beyond basic configuration. Explore what?s possible with Salesforce. In this 3-day class, our Salesforce experts will walk you through the Salesforce Platform, its specific applications, and their business values and benefits. Familiarize yourself with Salesforce Cloud, and learn about platform features and processes to more effectively support day-to-day Salesforce operations within your organization. Through interactive lectures, discussions, and hands-on exercises, you?ll recognize the core elements of the implementation lifecycle, the key considerations to drive user adoption, and the important components of ongoing management of your Salesforce environment. Introduction Understand How Salesforce Works Explore Salesforce Applications Review Salesforce Organization Data Access and Security Control Org Access Manage Who Views and Modifies Objects Unlock Access to Records Share Access to Records Lock Down Individual Fields User Management and Troubleshooting Create New Users Troubleshoot Login, Record Access, and Field Visibility Issues Salesforce Customizations Think About Your Implementation Explore Custom Fields, Picklists, Page Layouts, and Record Types Create Email Templates Business Processes Automation Review Validation Rules Review Assignment and Escalation Rules Review Web-to-Lead and Entitlements Review Lightning Process Builder and Workflow Review Approval Processes and Visual Workflow Reports Explore the Reports Tab, Folders, and Formats Explore the Report Builder Summarize Your Data Dashboards and Data Insights Get More Insight from Your Data Visualize Your Data with Dashboards Create Your Analytics Strategy Everyday Salesforce Collaborate with Chatter, Groups, and Communities Share Feedback with Chatter Answers and Ideas Go Mobile with Salesforce1 Make Salesforce Part of Your Day Data Management Create a Data Migration Strategy Ensure Data Quality Extending Salesforce Drive a Salesforce Implementation Customize Salesforce Using Custom Objects, Apps, and the Salesforce AppExchange Build It Yourself Wrap-up and Certification Review the Certification Process and Resources
Duration 3 Days 18 CPD hours This course is intended for Individuals preparing for the Cisco Customer Success ManagerSpecialist certification Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technology Overview After taking this course, you should be able to: Describe the role of the Customer Success Manager Describe the tools that the Customer Success Manager uses to ensure customer experience Describe the lifecycle approach to customer experience The Cisco Customer Success Manager (DTCSM) v2.2 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.This course is based on understanding the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification. Course Outline Transition to Subscription Economy Customer and Industry Trends Defining Customer Success and the CSM Role Engaging the Customer for Success Engaging the Customer for Success Addressing Barriers Customer Success Management Activities Success Plan Elements Customer Success Management Activities Additional course details: Nexus Humans Cisco Customer Success Manager v2.2 (DTCSM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Customer Success Manager v2.2 (DTCSM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for new users employed in a data processing environment who are new to Power Systems with IBM i. Overview After completing this course, you should be able to:Explain the functions supported by IBM i operating systemsExplain Power System with IBM i models and generationsExplain which applications are supportedSign on / off the systemUse the display station keyboardUse the online help that is availableUse the different interfaces available for IBM iUnderstand how objects are managedEnter control language (CL) commandsSend and receive messages and work with message queuesManage work and outputExplain basic security concepts on IBM i In this classroom course, you will learn basic concepts and skills you need to be productive users on Power Systems with IBM i. With plenty of hands-on lab exercises, we show everything from signing onto the available user interfaces; green screen environment and IBM Navigator for i.You will learn how objects are managed on the system and how you display these objects. You will learn to use control language (CL) commands (fast path) and how to work with and manage messages on the system. Students will also learn how to the system manages work and how you manage your printouts. Lastly, students will also get a basic overview of security. Introduction and overview to IBM iUsing the 5250 emulation interfaceOverview of IBM I Access Client SolutionsUsing IBM Navigator for iUsing the messages function on IBM iUsing CL commands on IBM iManaging objects on IBM iManaging your work on IBM iIBM i security overviewAdditional education Additional course details: Nexus Humans OE98 Introduction to IBM i for New Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OE98 Introduction to IBM i for New Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands-on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle 19c Database Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, and reseller support. Overview After successfully completing this course, you should be able to:Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations. Configure VPN redundancy. Configure dynamic routing using IPsec VPNs. Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE. Configure generic routing encapsulation (GRE) tunnels. This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. Chapter 1: Course IntroductionChapter 2: ScreenOS VPN Basics Review VPN Review Verifying Operations VPN Monitor Lab: VPN Review Chapter 3: VPN Variations Dynamic Peers Transparent Mode Overlapping Addresses Lab: VPN Variations Chapter 4: Hub-and-Spoke VPNs Concepts Policy-Based Hub-and-Spoke VPNs Route-Based Hub-and-Spoke VPNs with No Policy and NHTB Route-Based Hub-and_Spoke VPNS with Policy Centralized Control Hub-and-Spoke VPNs ACVPNs Lab: Hub-and-Spoke VPNs Chapter 5: Routing over VPNs Routing Overview Configuring RIP Configuring OSPF Case Studies Lab: Dynamic Routing Chapter 6: Using Certificates Concepts and Terminology Configuring Certificates and Certificate Support Configuring VPNs with Certificates Lab: Using Certificates Chapter 7: Redundant VPN Gateways (Optional) Redundant VPN Gateways Other Options Demonstration: Redundant VPN Gateways Chapter 8: Generic Routing Encapsulation (Optional) Configuring GRE Chapter 9: Dial-Up IPsec VPNs (Optional) Basic Dial-Up Configuration Group IKE ID XAUTH and Shared IKE ID Additional course details: Nexus Humans Advanced Juniper Networks VPN Implementations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Juniper Networks VPN Implementations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This class is designed for experienced B2C Commerce Technical Leads, Solution Architects, B2C Commerce Developers, Technical Directors, Owners of Technical Design and Quality Implementations, and anyone looking to earn their Salesforce B2C Commerce Architect credential. We recommend earning the Salesforce B2C Commerce Developer credential, or having equivalent experience, prior to attending this class. Overview When you complete this course, you will be able to: Familiarize yourself with B2C Commerce Cloud and industry best practices Understand ecommerce platform migration strategies Design B2C Commerce implementations that scale gracefully Design multi-site and multi-region solutions Maximize success on the B2C Commerce Architect Exam In this 4-day, expert-led class, learn the industry-standard steps to take a B2C Commerce site through the complete implementation lifecycle. Through expert-led demo, hands-on exercises, and workshops, learn how to design and build secure, scalable B2C Commerce sites that address real-world customer requirements and deliver better digital commerce experiences. Discovery and Design Assess Your Delivery Approach Document the System Landscape Plan for Growth Use the Commerce Cloud Partner LINK Marketplace Building Essentials Define the Implementation Process Review Implementation Best Practices Solve Complex Business Requirements Understand the Build Process and Unit Testing Learn How to Conduct Load Testing Integrations and Customizations Review the Available Integration Approaches Understand Integration Frameworks Review Integration Design Patterns Review Legacy Implementation Considerations Monitoring and Troubleshooting Learn About the Log Settings Capabilities in Business Manager Understand Platform Governance Best Practices Learn How to Do Performance Analysis Especially During Critical Sales Events Discover How to Optimize Implementations Launch Review SEO Configuration Best Practices Understand Launch Activities Monitor Post-Launch Activities Manage Launch Schedules Migrate Data from Legacy Systems Additional course details: Nexus Humans Salesforce Architect B2C Commerce Solutions (ARC300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Architect B2C Commerce Solutions (ARC300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This basic course is for IT personnel with a theoretical background of z/OS. Overview Review the main concepts of z/OS Log on to TSO and start ISPF/PDF Navigate through ISPF/PDF dialogs and use the basic ISPF/PDF functions and the ISPF Editor Use ISPF/PDF to allocate data sets and edit data sets (including hierarchical file system (HFS) files) via the ISPF Editor primary and line commands Use ISPF to create and manipulate (copy, rename, delete, list, sort and merge) data sets Identify security considerations for Multiple Virtual Storage (MVS) data sets and HFS files Describe and use TSO/E commands Perform simple modifications to existing ISPF/PDF panels Invoke a REXX exec and TSO CLIST Tailor existing JCL and submit batch jobs Review job status and job output using SDSF Invoke UNIX processes Manipulate HFS directories and file systems using the UNIX System Services ISHELL This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. Review of the z/Architecture and z/OS An Introduction to ISPF, ISPF/PDF, and RACF System familiarization Working with ISPF/PDF (Part 1 & 2) Allocate new data sets ISPF editor primary commands ISPF editor line command Copy/move/rename/delete data sets and members Data set lists Working with TSO/E Using TSO/E commands Working with JCL Submit a job JCL exercises Working with UNIX System Services Procedures ISHELL and hierarchical file system Additional course details: Nexus Humans ES10 IBM Fundamental System Skills in z/OS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES10 IBM Fundamental System Skills in z/OS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle Database 19c Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 19c Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.