• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

60426 Courses

HA400 SAP ABAP Programming for SAP HANA

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HA400 SAP ABAP Programming for SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

HA350 SAP HANA - Data Management

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for consultants, project team members, and administrators who want to learn how to implement data provisioning and data transformation for their SAP HANA project. In this course, students will learn the essential techniques and tools of data provisioning and data transformation for SAP HANA. This course will help students identify the most effective data provisioning solutions for their SAP HANA project. Course Outline Trigger-based replication with SAP Landscape Transformation ETL based data provisioning using SAP Data Services Connecting SAP HANA to data sources using SAP HANA Smart Data Access Real-time data loading using Smart Data Streaming ETL based loading using Smart Data Integration and Smart Data Quality SAP HANA Direct Extractor Connection Fundamentals of SAP Replication Server Additional course details: Nexus Humans HA350 SAP HANA - Data Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA350 SAP HANA - Data Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HA350 SAP HANA - Data Management
Delivered OnlineFlexible Dates
Price on Enquiry

HA250 SAP Migration to SAP HANA using DMO

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Support Consultant System Administrator Technology Consultant Overview The objective of this course is to enable students to use the one-step migration procedure (DMO - Database Migration Option) to SAP HANA autonomously. This course covers the most important tasks for an SAP HANA administrator for the combined update & migration of an SAP system to the SAP HANA database. Furthermore, it provides details about the procedure and technical details of the process. Getting Familiar with Database Migration Option (DMO) Listing DMO Benefits Explaining DMO Basics Preparing Database Migration Option (DMO) Procedure Ensuring DMO Prerequisites are Fulfilled on the Host Configuring SAP Host Agent for DMO Examining the SUM UI Configuration of Database Migration Option (DMO) Procedure Starting the DMO Run Continuing DMO with Roadmap Steps Configuration and Checks Continuing DMO with Roadmap Steps Preprocessing Listing DMO Procedure Steps Monitoring the Migration Resetting the DMO Procedure Tuning the DMO Downtime Listing the DMO Steps After Roadmap Step Preprocessing Explaining the DMO Release Schedule Listing Migration Options to SAP HANA

HA250 SAP Migration to SAP HANA using DMO
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)

FortiGate Security
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Administering BIG-IP

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring

F5 Networks Administering BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Configuring BIG-IP APM - Access Policy Manager v13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Configuring BIG-IP APM - Access Policy Manager v13.x
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Cloud Computing Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Diese Zertifizierung richtet sich an Experten aus Geschäftsbetrieben aller Branchen, die mit der Cloud-Technologie arbeiten oder an dieser Technologie und ihrem Nutzen für Unternehmen interessiert sind: Alle Mitarbeiter von internen oder externen Service Providern, Ihre Kunden Manager, Auditoren Overview Die Zertifizierung EXIN Cloud Computing Foundation validiert das Wissen von Kandidaten in folgenden Bereichen: Cloud - Prinzipien Implementierung von Management des Cloud Computing Nutzung von Cloud Computing Sicherheit, Identität und Privatsphäre im Cloud Computing Bewertung des Cloud Computing Unter Cloud Computing versteht man die Implementierung und Nutzung der Cloud - Technologie um IT - Services bereitzustellen, die an einem andren Standort gehostet werden. Cloud-Prinzipien Das Cloud - Konzept Entwicklung des Cloud Computing Cloud - Architektur Vorteile und Beschr„nkungen des Cloud Computing Implementierung und Management des Cloud Computing Aufbau lokaler Cloud - Umgebungen Management - Prinzipien fr Cloud - Services Nutzung von Cloud Computing Zugriff auf die Cloud Untersttzung von Business - Prozessen durch Cloud Computing Cloud - Nutzung durch Service Provider Sicherheit, Identit„t und Privatsph„re im Cloud Computing Sicherheit im Cloud Computing Identit„ts- und Privatsph„renmanagement Bewertung des Cloud Computing Business Cas fr das Cloud Computing Bewertung von Cloud - Implementierungen

EXIN Cloud Computing Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN BCS Artificial Intelligence Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The EXIN BCS Artificial Intelligence Foundation certification is focused on individuals with an interest in, (or need to implement) AI in an organization, especially those working in areas such as science, engineering, knowledge engineering, finance, education or IT services. Overview You will be able to Describe how Artificial (AI) is Part of 'Universal Design', and 'The Fourth Industrial Revolution' Demonstrate Understanding of the Artificial Intelligence (AI) Intelligen Agent Description Explain the Benefits of Artificial Intelligence (AI) Describe how we Learn from Data - Functionality, Software and Hardware Demonstrate an Understanding that Artificial Intelligence (AI) (in Particular, Machine Learning (ML)) will Drive Humans and Machines to Work Together Describe a ''Learning from Experience'' Agile Approach to Projects Candidates should be able to demonstrate a knowledge and understanding in the application of ethical and sustainable Artificial Intelligence (AI):- Human-centric Ethical and Sustainable Human and Artificial Intelligence (AI) Ethical and Sustainable Human and Artificial Intelligence (AI) Recall the General Definition of Human and Artificial Intelligence (AI) Describe what are Ethics and Trustworthy Artificial Intelligence (AI) Describe the Three Fundamental Areas of Sustainability and the United Nationïs Seventeen Sustainability Goals Describe how Artificial Intelligence (AI) is Part of 'Universal Design', and 'The Fourth Industrial Revolution' Understand that Machine Learning (ML) is a Significant Contribution to the Growth of Artificial Intelligence (AI) Artificial Intelligence (AI) and Robotics Demonstrate Understanding of the Artificial Intelligence (AI) Intelligent Agent Description Describe what a Robot is Describe what an intelligent Robot is Applying the Benefits of Artificial Intelligence (AI) ? Challenges and Risks Describe how Sustainability Relates to Human-Centric Ethical Artificial Intelligence (AI) and how our Values will Drive our use of Artificial Intelligence (AI) and will Change Humans, Society and Organizations Explain the Benefits of Artifical Intelligence (AI) Describe the Challenges of Artificial Intelligence (AI) Projects Demonstrate Understanding of the Risks of Artificial Intelligence (AI) Projects List Opportunities for Artificial Intelligence (AI) Identify a Typical Funding Source for Artificial Intelligence (AI) Projects and Relate to the NASA Technology Readiness Levels (TRLs) Starting Artificial Intelligence (AI): how to Build a Machine Learning (ML) Toolbox ? Theory and Practice Describe how we Learn from Data - Functionality, Software and Hardware Recall which Rypical, Narrow Artificial Intelligence (AI) Capability is Useful in Machine Learning (ML9 and Artificial Intelligence (AI) AgentsïFunctionality The Management, Roles and Responsibilities of Humans and Machines Demonstrate an Understanding that Artificial Intelligence (AI) (in Particular, Machine Learning (ML)) will Drive Humans and Machines to Work Together List Future Directions of Humans and Machines Working Together Describe a ''Learning from Experience'' Agile Approach to Projects

EXIN BCS Artificial Intelligence Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

EWM100 Processes in SAP Extended Warehouse Management - Overview

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM

EWM100 Processes in SAP Extended Warehouse Management - Overview
Delivered OnlineFlexible Dates
Price on Enquiry

Effective Presentations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for individuals who may need to present information effectively in a professional environment. Overview Define what makes a presentation effective. Plan presentations. Design a presentation framework. Develop the presentation body. Create supporting materials. Prepare for your presentation. Deliver presentations. Conduct a question-and-answer session. Deliver group presentations and virtual presentations. The ability to deliver presentations is vital to achieving advancement for yourself and for your ideas. Few skills in life will contribute to your success as much as presentation skills. Without a dynamic and coherent presentation, even stellar ideas can fail to convince your audience. In this course, you will learn to organize your ideas to create coherent and convincing oral presentations, while also utilizing available visual aids and using public-speaking techniques to strengthen your delivery. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success, you will need to have experience writing in a professional context and creating presentations using Microsoft Office PowerPoint. 1. Defining Presentation Effectiveness Identify Qualities of Effective Presentations Evaluate Yourself as a Presenter 2. Planning Presentations Analyze the Audience Establish Your Presentation\'s Objectives 3. Designing the Presentation Create the Presentation Structure Organize the Presentation Body Write the Conclusion First Write the Introduction 4. Developing the Presentation Body Select Evidence Write the Presentation Body Create Visuals 5. Creating Supporting Materials Create a Slide Deck Create Speaker Aids Create Audience Handouts 6. Preparing for Your Presentation Rehearse the Presentation Plan Event Logistics 7. Delivering Presentations Connect with Your Audience Present Powerfully Utilize a Slide Deck Effectively 8. Conducting a Question-and-Answer Session Answer Questions Handle Challenging Questions 9. Presenting in Common Business Scenarios Plan and Deliver a Virtual Presentation Plan and Deliver Group Presentations 10. Key Course Information This course focuses on the skills necessary to prepare and deliver an effective presentation; that being said, the learner will not be creating, delivering, or designing a specific presentation from start to finish in this course (this course only provides the foundational knowledge for doing this work back at the office). This course consists of instructor lecture along with course activities corresponding with the main course objectives. In terms of the course activities, 50% will be discussion based - 25% will be in a group-work format - and 25% will be hands-on/involve a digital tool, such as a PowerPoint or Word file. The intent is for students leaving this course to take the skills learned and apply them to their efforts of creating more effective presentations upon returning to the workplace. Additional course details: Nexus Humans Effective Presentations (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Presentations (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Effective Presentations
Delivered OnlineFlexible Dates
Price on Enquiry