Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Participants learn about the fundamental elements of materials management.Participants understand usage of the procurement processes for stock material, consumable materials, and services, the basic functions from purchasing, inventory management, invoice verification, service entry, and materials planning.Topic-specific exercises in the SAP system give participants the opportunity to gain first-hand practical experience of the above processes. This course will give students the fundamental knowledge and a comprehensive overview of the processes in procurement in SAP. After attending this class, students will understand the major business processes and functions in materials management. Procurement Processes Defining Processes and Organizational Levels in Procurement Maintaining Purchase Orders Posting Goods Receipts Entering Invoices Master Data Maintaining Vendor Master Records Maintaining Material Master Records Using Entry Aids for Master Data Maintenance Performing Mass Maintenance Stock Material Procurement Applying Conditions in Purchasing Handling Requests for Quotations and Quotation Processes Creating Purchase Orders with Reference Maintaining Purchasing Info Records Analyzing Material Valuation Posting Goods Receipts for Purchase Orders Entering Invoices with Reference to Purchase Orders Consumable Material Procurement Purchasing Consumable Materials Creating Purchase Requisitions Creating Purchase Orders with Reference to Purchase Requisitions Entering Valuated and Non-Valuated Goods Receipts Creating Blanket Purchase Orders External Services Procurement Maintaining Master Data for External Services Ordering Services Creating Service Entries and Verifying Invoices Automated Procurement Maintaining Data for Material Requirements Planning (MRP) Maintaining Contracts and Source Lists Performing Procurement Processes Automatically Reporting and Analytics Using Standard Reports Performing Standard Analyses in the Logistics Information System Introduction to the SAP Buyer Role Assessing the Buyer Role Self-Service Procurement Examining the Functions of Self-Service Procurement
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager⢠and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.
This course is designed specifically to help improve your collection rates. The UK's leading trainer in the subject uses practical examples and case studies to show how to use debt collection techniques that really work. This programme will help participants to: Understand debtors and communicate with them effectively Improve their telephone and writing skills Appreciate the key legal issues Track down 'gone-aways' Improve their collection rates 1 Giving credit and collecting debts The benefits when you get it right The cost of getting it wrong 2 Analysing yourself The importance of making the right 'first impression' Assessing your own personal communication style and how this affects your results How do you (or might you) look in the debtor's eyes? What would you like to change? 3 Analysing your debtors Types of debtorThe delaying debtorThe genuine debtorThe cashflow or hardship problem debtorThe ones who never intended to pay Spot the most common reasons and excuses for non-payment - and learn how to deal with them 4 Understanding debt recovery and the law Data protection issues County Court suing enforcement methods Human rights and debt recovery Retention of title matters 5 Telephone skills for debt recovery A 7-point plan which works every time Learning by example: listening to and analysing some pre-recorded (or live) collection callsWhat was done well?What should have been done differently?Did the collector recognise opportunities?Did the collector create opportunities where seemingly none existed?Did the collector negotiate well or not at all? 6 Writing skills for debt recovery Key phrases to avoid What to include A sample letter which gets results in over 90% of cases 7 Tracking down the 'gone aways' A unique debtor-tracing plan Why spend money on external tracers when you can find those 'gone away' debtors for yourself? 8 Course review The traps to avoid Key personal learning points
Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
The QA Level 2 Award in Fire Safety (RQF) qualification is ideal for businesses that have assigned personnel with specific fire safety responsibilities such as fire wardens or fire marshals in the workplace.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of BIG-IP DNS systems. This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Provision the BIG-IP System and Confirm Network Configuration Module 2: Introducing the Domain Name System (DNS) and BIG-IP DNS Understanding the Domain Name System (DNS) Reviewing the Name Resolution Process Implementing BIG-IP DNS Using DNS Resolution Diagnostic Tools Module 3: Accelerating DNS Resolution Introducing DNS Resolution with BIG-IP DNS BIG-IP DNS Resolution Decision Flow Configuring BIG-IP DNS Listeners Resolving DNS Queries in the Labs (Lab Zone Records) Load Balancing Queries to a DNS Server Pool Accelerating DNS Resolution with DNS Cache Accelerating DNS Resolution with DNS Express Introducing Wide IPs Using Other Resolution Methods with BIG-IP DNS Integrating BIG-IP DNS into Existing DNS Environments Module 4: Implementing Intelligent DNS Resolutions Introducing Intelligent DNS Resolution Identifying Physical Network Components Identifying Logical Network Components Collecting Metrics for Intelligent Resolution Configuring Data Centers Configuring a BIG-IP DNS System as a Server Configuring a BIG-IP LTM System as a Server Establishing iQuery Communication between BIG-IP Systems Configuring a Non-F5 Server Defining Links and Routers Configuring Wide IP Pools Configuring Wide IPs Managing Object Status Using the Traffic Management Shell (TMSH) Module 5: Using LDNS Probes and Metrics Introducing LDNS Probes and Metrics Types of LDNS Probes Excluding an LDNS from Probing Configuring Probe Metrics Collection Module 6: Load Balancing Intelligent DNS Resolution Introducing Load Balancing on BIG-IP DNS Using Static Load Balancing Methods Round Robin Ratio Global Availability Static Persist Other Static Load Balancing Methods Using Dynamic Load Balancing Methods Round Trip Time Completion Rate CPU Hops Least Connections Packet Rate Kilobytes per Second Other Dynamic Load Balancing Methods Virtual Server Capacity Virtual Server Score Using Quality of Service Load Balancing Persisting DNS Query Responses Configuring GSLB Load Balancing Decision Logs Using Manual Resume Using Topology Load Balancing Module 7: Monitoring Intelligent DNS Resources Exploring Monitors Configuring Monitors Assigning Monitors to Resources Monitoring Best Practices Module 8: Advanced BIG-IP DNS Topics Implementing DNSSEC Setting Limits for Resource Availability Using iRules with Wide IPs Introducing Other Wide IP Types Implementing BIG-IP DNS Sync Groups Module 9: Final Configuration Projects Final Configuration Projects
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Data Consultants/Managers, and Solution Architects. Overview Students will set up and deliver their own master data from SAP ERP to SAP SCM (APO), and make any necessary master data enhancements to ensure proper planning results in APO.Students will complete the modeling of their supply chain by creating APO master data that is necessary to activate a fully functional Supply Chain in APO. In this course, students learn how to set up and configure the standard interface between the SAP ERP system and SAP SCM with focus on SAP APO. Integration for Supply Chain Modeling Integrating SAP ERP and SAP SCM Configuring an Integration Model Using Monitoring and Error-Processing Tools Setting Up Incremental Data Transfers for Master Data Changes Organizing Integration Models Performing Routine Operations with Background Processing Supply Chain Locations Managing Locations Integrating Plant Data Integrating MRP Areas Managing Transportation Zones Integrating Customers as Locations Integrating Vendors as Locations Integrating Factory Calendars and Time Streams Supply Chain Products Integrating Products Maintaining Product Data External Procurements Relationships Integrating Purchasing Information Records Integrating Scheduling Agreements Network Modeling Creating Means of Transportation Creating Transportation Lanes Supply Chain Resources Integrating Production Resources Creating Supply Chain Management (SCM)-Specific Resources Integrating Capacity Variants Integrating Setup Groups and Matrices Manufacturing Process Modeling Preparing Integration of Master Data Mapping Bill of Materials (BOM) Fields Mapping the Routings Fields Integrating Production Master Data Transferring a Master Recipe to a Production Process Model (PPM) Transferring Characteristics and Classes Quota Arrangement Creating Quota Arrangements Supply Chain Modeling Creating an SAP liveCache Model Creating a Version in SAP SCM Using the Supply Chain Engineer (SCE) Transactional Data Integration Integrating Transactional Data Supply Chain Subcontracting Preparing Master Data for Subcontracting
Duration 1 Days 6 CPD hours This course is intended for Anyone who wants to learn how to create movies - from a home movie to professional looking films using iMovie. This one-day hands-on course will teach the participant the full functionality of iMovie. The course will begin with how to import video and photographs into iMovie; how to review and organize the footage; how to shape a story using the editing and trimming tools; how to add music and sound and other video effects and overlays. Lastly, the class will explore sharing your completed movies with your Mac computer, YouTube and other streaming outlets. Introduction to iMovie Adding Media from Photo Library Other Ways to Import Media From iPad, iPhone, or iPod Touch Record Video Directly into iMovie Importing Media from Mac Playing or Skimming Video Sorting and Searching for Clips Marking Clips as Favorite or Rejected Creating Movies Creating a New Movie Viewing and Managing Projects Setting Movie Themes Selecting Clips Adding and Trimming Clips Moving and Splitting Clips Adding and Modifying Transitions Adding and Editing Titles Adding Music and Sound Clips Working with Trailers (If required) Creating Trailer Adding Video Adding Titles and Credits Converting Trailer to Movie Adding Video Effects Enhancing Clip Adjusting Clip?s Order Cropping and Rotating Clips Stabilizing Shaky Clips Adding Video Effects Adding Freeze Frame Creating Effects with Multiple Clips Slow Down and Speed Up Clips Adding Instant Replay or Rewind Effect Copy Effects and Adjustments Sharing Video Clips and Projects Email Movie, Trailer, and Clip Exporting Quick Time File Exporting an Image Share Online Customizing iMovie iMovie Preferences Customizing Project Settings Changing iMovie Window Layout Changing How Clips are Displayed Organizing Media Organizing Media and Events Working with Multiple Libraries Consolidating Projects and Events Keyboard Shortcuts and Gestures Overview of Keyboard Shortcuts Keyboard Shortcuts Multi-Touch Gestures Force Touch Trackpad Gestures
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, and Business Process Owner/Team Lead/Power Users. Overview Create Web Intelligence documents for your reporting needsRetrieve data by building queries using SAP BusinessObjects universesUse Web Intelligence to enhance documents for easier analysisOrganize, manage and distribute documents using the BI launch pad This course is designed to give students the comprehensive skills and in-depth knowledge needed to access, analyze and share data using SAP BusinessObjects BI launch pad and SAP BusinessObjects Web Intelligence. Web Intelligence Describing Web Intelligence Concepts Explaining Web Intelligence Core Functions Describing Web Intelligence and the SAP BusinessObjects Business Intelligence Platform Web Intelligence Documents with Queries Creating Queries Creating a Document Modifying a Document?s Query Modify the Query Panel Data Return Restrictions from Queries Restricting Data with Query Filters Modifying a Query with a Predefined Query Filter Applying a Single-Value Query Filter Using Wildcards in Query Filters Using Prompts to Restrict Data Using Complex Filters Web Intelligence Document Design Modifying Web Intelligence Documents Displaying Data in Tables Using Tables Presenting Data in Free-standing Cells Presenting Data in Charts Presentation of Data in Documents Using Breaks and Calculations Using Sorts and Hiding Data Formatting Breaks and Cross Tables Filtering Report Data Ranking Data Highlighting Information with Formatting Rules Organizing a Report into Sections Web Intelligence Document Formatting Formatting Documents Formatting Charts Data Calculation Applying Formulas and Variables Using Formulas and Variables Drilling Functionality Analyzing the Data Cube Drilling in an Web Intelligence Document Web Intelligence Documentation Management Publishing Documents to the Corporate Repository Logging In to the BI Launch Pad Managing Documents in BI Launch Pad Viewing a Web Intelligence Document in the BI Launch Pad Sharing Web Intelligence Documents Setting BI Launch Pad Preferences Logging Off From the BI Launch Pad