Duration 3 Days 18 CPD hours This course is intended for Project team members and Key-Users responsible for the maintenance of Execution Steps for process orders and production orders to generate interactive PI Sheets and work instructions for operators and workers in the production plant and to realize the data exchange with the automation and process control world. In this course, students will attain the ability to maintain Execution Steps for process orders and production orders to generate interactive PI sheets and work instructions. Course Outline Process management / process integration Control recipes / control instructions XSteps Process messages Customizing
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 3.5 Days 21 CPD hours This course is intended for Intermediate Users of Office 365 and Excel Overview Creating Advanced Formulas Analyzing Data with Logical and Lookup Functions Organizing Worksheet Data with Tables Visualizing Data with Charts Analyzing Data with PivotTables, Slicers, and PivotCharts Inserting Graphics Enhancing Workbooks This course builds upon the foundational Microsoft Office Excel 2016, you create advanced workbooks and worksheets using advanced formulas and organizing your data into tables. Excel Intermediate Learn how to navigate Pivot Tables, (for example, Create a Pivot Table/ add data/ Add calculations); Formulas, Data organization (for example, multiple worksheets) Excel Advanced Data Analysis (for example, sparklines) , Macros (making changes to macros) and Building A Fast Dashboard (PivotCharts, slicers, etc.) Office 365 Training Getting More with OneDrive Office 365 Training When is a Team a Team? Includes Using Video with Audio, Exploring Teams/Navigating among Teams etc.
Duration 5 Days 30 CPD hours This course is intended for Database DesignersSupport EngineerTechnical AdministratorDatabase AdministratorsData Warehouse Administrator Overview Use Oracle Restart to manage components.Upgrade database to Oracle Database 12c.Install Oracle Grid Infrastructure for a Standalone Server.Create a container database.Create an Oracle DatabaseInstall Oracle Database 12c software.Monitor the Database.Manage Database Performance.Implement Database Auditing.Configure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and Tasks.Schedule Jobs to Run Inside or Outside of the Database.Configure Oracle Net Services.Configure your Database For Backup and Recovery Operations.Describe Oracle Database Architecture.Manage the Oracle Database Instance.Manage Oracle Database Storage structures. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c.
Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. Course Outline Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 5 Days 30 CPD hours In this course, you?ll learn how to program Lightning Web Components with markup, JavaScript, CSS, Apex, and the Salesforce Lightning Design System (SLDS). Additional course details: Nexus Humans Salesforce Programming Lightning Web Components (DEX602) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Programming Lightning Web Components (DEX602) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance