Duration 2 Days 12 CPD hours This course is intended for Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment. Overview Explain the benefits of virtual network security. Understand the basic functions, components, and advantages of VSX technology. Examine the VSX management infrastructure and understand how traffic flows within a VSX network. Discuss options for deploying VSX technology within various types of organizations. Understand how to install and configure VSX Gateways and Virtual Systems. Describe different routing schemes and features that are available to use within the VSX environment. Understand how to deploy additional VSX networking configurations that may be required in the environment. Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters. Understand how Virtual System Load Sharing works to enhance VSX network performance. Understand how to use the VSX Provisioning Tool to add and remove virtual devices. Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment. Understand how to employ tools for optimizing resources allocated in a VSX environment. Identify various VSX command line tools commonly used to retrieve information and perform configuration changes. Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment. Understand how to troubleshoot and debug issues that may occur in a VSX environment. This course provides a comprehensive understanding of the Check Point VSX solution and describes how to deploy it within the corporate network environment. Course Topics VSX Overview Virtual System Installation and Configuration VSX Clustering Advanced VSX Features Troubleshooting VSX LAB EXERCISES Configuring the VSX Environment Deploying a Virtual System with a Physical Interface Deploying a VS with Bonded VLAN Interfaces Configuring Virtual System HA Converting VSX High Availability to Virtual System Load Sharing Maintaining the VSX Environment Using the CLI to Manage VSX Performance Tuning in VSX Troubleshooting VSX Issues Upgrading a VSX Environment Additional course details: Nexus Humans CCVS Check Point Certified VSX Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCVS Check Point Certified VSX Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for the Information Systems communications professional who is planning to install TCP/IP for z/OS and for TCP/IP users who are interested in installing and customizing IBM's TCP/IP product in interoperability environments and main applications. Overview Describe IBM's z/OS TCP/IP product offering Describe the installation requirements and system customization for the z/OS TCP/IP implementation Define network interface attachments that produce connectivity for z/OS TCP/IP communications Construct TCP/IP configuration statements for z/OS to allow operation and connectivity to an existing TCP/IP network Configure TCP/IP for z/OS for basic communications functions Construct TCP/IP configuration statements for z/OS for selected TCP/IP application protocols services This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS. TCP/IP for z/OS introduction . z/OS system prerequisites for TCP/IP . Basic customization . Network interfaces . Name services . OMPRoute . Telnet . Enterprise Extender . SyslogD . FTP . SMTP . Additional course details: Nexus Humans CB69 IBM TCP/IP for z/OS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CB69 IBM TCP/IP for z/OS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge communicating, etiquette, professionalism and time management for the office environment. Overview Upon successful completion of this course, students will be able to communicate, be professional and manage their time effectively in a business environment. In this course, students will learn how to communicate, act and manage time effective in a business environment. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives The Big Picture What is Communication? How Do We Communicate? Other Factors in Communication Understanding Communication Barriers An Overview of Common Barriers Language Barriers Cultural Barriers Differences in Time and Place Paraverbal Communication Skills The Power of Pitch The Truth about Tone The Strength of Speed Non-Verbal Communication Understanding the Mehrabian Study All About Body Language Interpreting Gestures Speaking like a Star S = Situation T = Task A = Action R = Result Summary Listening Skills Seven Ways to Listen Better Today Understanding Active Listening Sending Good Signals to Others Asking Good Questions Open Questions Closed Questions Probing Questions Appreciative Inquiry The Purpose of AI The Four Stages Examples and Case Studies Mastering the Art of Conversation Level One: Discussing General Topics Level Two: Sharing Ideas and Perspectives Level Three: Sharing Personal Experiences Our Top Networking Tips Advanced Communication Skills Understanding Precipitating Factors Establishing Common Ground Using ?I? Messages Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Principles of Professional Behavior Always be Your Best Meeting and Greeting Sending Social Invitations to Business Associates Interview Etiquette Interviewing Before the Interview In the Waiting Room During the Interview After the Interview Job Fair Interviews Planning & Attending Business Meetings Office Meetings Meal Meetings Electronic Etiquette Voicemail Cell Phones Email Multiculture Etiquette Defining the Challenge Five Steps to Dealing with Diversity Guidelines for Managing Diverse Relationships Time Management Concepts Benefits of better time utilization Who controls your schedule? Your Job: What You Are Responsible for Accomplishing? Your job responsibilities Setting objectives Setting priorities How to Use Your Time Gathering data-the time log Analyzing the data Delegation: Working Through Others Why some people don't delegate Levels of delegation How to delegate Benefits of delegation Getting started Planning: Keys to Achievement Planning: Keys to Achievement Coping with Common Time Wasters Coping with self-generated time wasters Coping with environmental time wasters Personal Needs that Get in the Way of Effective Time Utilization Needs profile analysis Self-assessment questionnaire Applying needs assessment results Planning for Improvement Six tips for effective time management Planning for improved time utilization Follow-Up: Staying on Track Time savings progress report Time savings progress chart Time management progress survey Additional course details: Nexus Humans Business Soft Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Soft Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Business Analysis principles and techniques. Key areas are: The breath of the role of a Business Analyst The processes and techniques of strategy analysis Investigation of an organization's business systems Techniques used within stakeholder analysis and the need for analyzing perspectives Conceptual modelling and business activity models Business improvements through gap analysis The Business case within the business change lifecycle The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The course provides in-depth knowledge and practice in Business Analysis Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Practice Exam Details Business Analysis Certification Scheme Rationale for Business Analysis The role of the BA throughout the stages of the Business change lifecycle The scope of the BA role within the context of the range of analysis activities Three areas of competencies Understanding the Strategic Context Techniques in practice: MOST Resource audit PESTLE Porter's Five Forces SWOT analysis CSF, KPI and Performance target Balanced Business Score Card Understanding the Current Situation Identification of stakeholder categories Identification of relevant investigation techniques The rationale for taking a holistic view Rich pictures, Mind Maps and Fishbone diagrams Stakeholder Analysis and Management Power/interest and level of interest Appropriate stakeholder management strategy Stakeholder perspectives and CATWOE technique Analysing and Modelling Business Activities Conceptual models of a business situation Five types of high level activity Planning activities Enabling activities Doing activities Monitoring and control activities Three types of business events The consensus business activity model Identifying Potential Solutions Different categories of business rules Gap analysis (through conceptual business activity model and as-is business situation) Components of a new business model Building the Business Case Rationale for the development of a business case Contents of a business case Identification of tangible/intangible costs and benefits, risks and impacts Rationale for the financial case and appraisal techniques Business case review in the business change lifecycle Additional course details: Nexus Humans Business Analysis - Practice training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Practice course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is aimed at anyone who wants to harness the power of data analytics in their organization. Overview After completing this course delegates will be capable of writing effective R code to manipulate, analyse and visualise data to enable their organisations make better, data-driven decisions. This course teaches delegates with no prior programming or data analytics experience how to perform data manipulation, data analysis and data visualisation in R. Course Outline Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. The R programming language is one of the most powerful and flexible tools in the data analytics toolkit. This course teaches delegates with no prior programming or data analytics experience how to perform data manipulation, data analysis and data visualisation in R. Mastery of these techniques will allow delegates to immediately add value in their work place by extracting valuable insight from company data to allow better, data-driven decisions. The course will explore the following topics through a series of interactive workshop sessions: What is R? Basic R programming conventions Data structures in R Accessing data in R Descriptive statistics in R Statistical analysis in R Data manipulation in R Data visualisation in R Additional course details: Nexus Humans Beginning Data Analytics With R training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning Data Analytics With R course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL
Duration 3 Days 18 CPD hours This course is intended for This course is designed for existing Python programmers who have at least one year of Python experience and who want to expand their Python proficiencies. Overview In this course, students will expand their Python proficiencies. Students will: Create object-oriented Python applications. Design and create a GUI. Store data in a database from Python applications. Communicate using client/server network protocols. Manage multiple processes with threading. Implement unit testing. Package an application for distribution. Students will build upon basic Python skills, learning more advanced topics such as object-oriented programming patterns, development of graphical user interfaces, data management, threading, unit testing, and creating and installing packages. Usinig Object-Oriented Python Create and Use Classes in an Application Use Magic Methods Incorporate Class Factories Creating a GUI Design a GUI Create and Arrange a GUI Layout Interact with User Events Using Databases Basics of Data Management Use SQLite Databases Manipulate SQL Data Network Programming Basics of Network Programming Create a Client/Server Program Managing Multiple Processes with Threading Create a Threaded Application Manage Thread Resources Implementing Unit Testing Test-Driven Development Write and Run a Unit Test Case Create a Test Suite Packaging an Application for Distribution Create a Package Structure Generate the Package Distribution Files Generate a Windows Executable Additional course details: Nexus Humans Python Programming - Advanced training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Python Programming - Advanced course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours Additional course details: Nexus Humans Orientation - Consumer Students training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Orientation - Consumer Students course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.