• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2045 Audit courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

C)ISSO - Certified Information Security Systems Officer Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. COURSE OUTLINE * Risk Management * Security Management * Identification and Authentication * Access Control * Security Models and Evaluation * Operations Security * Vulnerability Assessments * Symmetric Cryptography and Hashing * Network Connections * Network Protocols and Devices * Telephony, VPNs, and Wireless * Security Architecture and Attacks * Software Development Security * Database Security * Malware and Software Attacks * Business Continuity * Disaster Recovery * Incident Management, Law, and Ethics * Physical Security ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSO - Certified Information Security Systems Officer Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

TW108G IBM Security Verify Access Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. UNIT 1 * Introduction to IBM Security Verify Access UNIT 2 * Architecture and deployment UNIT 3 * Managing users, groups, and domains UNIT 4 * Reverse Proxy (WebSEAL) concepts UNIT 5 * Managing access control UNIT 6 * Configuring junctions for back-end resources UNIT 7 * Authentication framework and methods UNIT 8 * Logging, auditing, and tracing ADDITIONAL COURSE DETAILS: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TW108G IBM Security Verify Access Foundations
Delivered on-request, onlineDelivered Online
Price on Enquiry

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. COURSE INTRODUCTION * Instructor introduction * Learning objectives * Course structure and objectives * Course logistics and agenda MODULE 1: GOVERNANCE AT SCALE * Governance at scale focal points * Business and Technical Challenges MODULE 2: GOVERNANCE AUTOMATION * Multi-account strategies, guidance, and architecture * Environments for agility and governance at scale * Governance with AWS Control Tower * Use cases for governance at scale MODULE 3: PREVENTIVE CONTROLS * Enterprise environment challenges for developers * AWS Service Catalog * Resource creation * Workflows for provisioning accounts * Preventive cost and security governance * Self-service with existing IT service management (ITSM) tools MODULE 4: DETECTIVE CONTROLS * Operations aspect of governance at scale * Resource monitoring * Configuration rules for auditing * Operational insights * Remediation * Clean up accounts MODULE 5: RESOURCES * Explore additional resources for security governance at scale ADDITIONAL COURSE DETAILS: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered on-request, onlineDelivered Online
Price on Enquiry

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway GETTING STARTED * Introduction to Citrix ADC * Feature and Platform Overview * Deployment Options * Architectural Overview * Setup and Management BASIC NETWORKING * Networking Topology * Citrix ADC Components * Routing * Access Control Lists ADC PLATFORMS * Citrix ADC MPX * Citrix ADC VPX * Citrix ADC CPX * Citrix ADC SDX * Citrix ADC BLX HIGH AVAILABILITY * Citrix ADC High Availability * High Availability Configuration * Managing High Availability * In Service Software Upgrade * Troubleshooting High Availability LOAD BALANCING * Load Balancing Overview * Load Balancing Methods and Monitors * Load Balancing Traffic Types * Load Balancing Protection * Priority Load Balancing * Load Balancing Troubleshooting SSL OFFLOADING * SSL Overview * SSL Configuration * SSL Offload * Troubleshooting SSL Offload * SSL Vulnerabilities and Protections SECURITY * Authentication, Authorization, and Auditing * Configuring External Authentication * Admin Partitions MONITORING AND TROUBLESHOOTING * Citrix ADC Logging * Monitoring with SNMP * Reporting and Diagnostics * AppFlow Functions * Citrix Application Delivery Management * Troubleshooting CITRIX GATEWAY * Introduction to Citrix Gateway * Advantages and Utilities of Citrix Gateway * Citrix Gateway Configuration * Common Deployments APPEXPERT EXPRESSIONS * Introduction to AppExpert Policies * Default Policies * Explore Citrix ADC Gateway Policies * Policy Bind Points * Using AppExpert with Citrix Gateway AUTHENTICATION, AUTHORIZATION, AND SECURE WEB GATEWAY * Authentication and Authorization * Multi-Factor Authentication * nFactor Visualizer * SAML authentication MANAGING CLIENT CONNECTIONS * Introduction to Client Connections * Session Policies and Profiles * Pre and Post Authentication Policies * Citrix Gateway Deployment Options * Managing User Sessions INTEGRATION FOR CITRIX VIRTUAL APPS AND DESKTOPS * Virtual Apps and Desktop Integration * Citrix Gateway Integration * Citrix Gateway WebFront * ICA Proxy * Clientless Access and Workspace App * Access Fallback * SmartControl and SmartAccess for ICA CONFIGURING CITRIX GATEWAY * Working with Apps on Citrix Gateway * RDP Proxy * Portal Themes and EULA

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as: Consulting Systems Engineer Deployment Engineer Network Administrator Network Manager Network Engineer Site Reliability Engineer Systems Engineer Technical Solutions Architect Wireless Design Engineer Wireless Engineer Overview After completing the course, you should be able to: Plan new Cisco Meraki architectures and expand existing deployments Design the network for scalable management and high availability Describe how to automate and scale Meraki deployments with dashboard tools Use dynamic routing protocols to expand networks and improve WAN performance Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them Secure, expand, and shape the network Implement switched network concepts and practices, and configure guests networks Implement wireless configurations concepts and practices Describe endpoint management concepts and practices using Cisco Meraki Systems Manager Describe physical security concepts and practices Gain network insight by monitoring applications Describe how to prepare monitoring, logging, and alerting services Set up reporting and auditing capabilities in the Cisco Meraki dashboard Monitor and troubleshoot issues using Cisco Meraki tools The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 elevates your knowledge of Cisco© Meraki? technology suite. In this advanced technical training course, you?ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification. COURSE OUTLINE * Planning new Cisco Meraki architectures and expanding existing deployments * Designing for scalable management and high availability * Automating and scaling Meraki deployments * Designing routing and practices on the Meraki platform * Describing Quality of Service (QoS) and traffic shaping design * Building VPN and WAN topologies * Securing, expanding, and shaping the network * Describing network concepts and practices * Implementing wireless configuration practices and concepts * Describing Endpoint management concepts and practices * Describing physical security concepts and practices * Gaining network insight through monitoring applications * Preparing monitoring, logging, and alerting services * Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard * Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools * ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1
Delivered on-request, onlineDelivered Online
Price on Enquiry

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. FUNDAMENTAL BLOCKCHAIN SECURITY CRYPTOGRAPHY FOR THE BLOCKCHAIN HASH FUNCTIONS * Public Key Cryptography * Elliptic Curve Cryptography * A Brief Introduction to Blockchain The Blocks * The Chains * The Network * Promises of the Blockchain * Blockchain Security Assumptions Digital Signature Security * Hash Function Security * Limitations of Basic Blockchain Security Public Key Cryptography Review * Real-Life Public Key Protection * Cryptography and Quantum Computers * Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function * Hash function with poor non-locality * Hash function with small search space * Breaking Public Key Cryptography Brute Forcing a Short Private Key * Brute Forcing a Poorly-Chosen Private Key CONSENSUS IN THE BLOCKCHAIN * Blockchain Consensus and Byzantine Generals Blockchain Networking Review * Byzantine Generals Problem Relation to Blockchain * Byzantine Fault Tolerance * Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough * Proof of Work What is Proof of Work? * How does Proof of Work Solve BGP? * Proof of Work Security Assumptions * Attacking Proof of Work * Proof of Stake What is Proof of Stake? * How does Proof of Stake Solve BGP? * Proof of Stake Security Assumptions * Attacking Proof of Stake * General Attacks on Blockchain Consensus * Other Blockchain Consensus Algorithms * Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack * Performing a Selfish Mining Attack * Attacking Proof of Stake Performing a XX% Attack * Performing a Long-Range Attack * Malleable Transaction Attacks ADVANCED BLOCKCHAIN SECURITY MECHANISMS ARCHITECTURAL SECURITY MEASURES PERMISSIONED BLOCKCHAINS * Checkpointing * Advanced Cryptographic Solutions Multiparty Signatures * Zero-Knowledge Proofs * Stealth Addresses * Ring Signatures * Confidential Transactions * Lab 3 (Tentative) Permissioned Blockchains * 51% on a Checkpointed Blockchain * Data mining on a blockchain with/without stealth addresses * Zero-Knowledge Proof Simulation * Trying to fake knowledge of a ZKP * Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum * Consensus in Ethereum * Smart Contracts in Ethereum * Ethereum Security * Pros and Cons of Ethereum Blockchains * Introduction to Hyperledger Security What is Hyperledger * Consensus in Hyperledger * Smart Contracts in Hyperledger * Hyperledger Security * Pros and Cons of Hyperledger Blockchains * Introduction to Corda Security What is Corda * Consensus in Corda * Smart Contracts in Corda * Corda Security * Pros and Cons of Corda Blockchains * Lab 4 BLOCKCHAIN RISK ASSESSMENT WHAT ARE THE RISKS OF THE BLOCKCHAIN? * Information Security * Information Sensitivity Data being placed on blockchain * Risks of disclosure * Regulatory Requirements Data encryption * Data control * PII protection * Blockchain Architectural Design Public and Private Blockchains * Open and Permissioned Blockchains * Choosing a Blockchain Architecture * Lab 5 * Exploring public/private open/permissioned blockchains? BASIC BLOCKCHAIN SECURITY BLOCKCHAIN ARCHITECTURE * User Security Protecting Private Keys * Malware * Update * Node Security * Configuring MSPs * Network Security * Lab 6 (TBD) SMART CONTRACT SECURITY INTRODUCTION TO SMART CONTRACTS * Smart Contract Security Considerations Turing-Complete * Lifetime * External Software * Smart Contract Code Auditing Difficulties * Techniques * Tools * Lab 7 (Tentative) * Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities * Module 8: Security Implementing Business Blockchains Ethereum Best Practices * Hyperledger Best Practices * Corda Best Practices * Lab 8 NETWORK-LEVEL VULNERABILITIES AND ATTACKS INTRODUCTION TO BLOCKCHAIN NETWORK ATTACKS * 51% Attacks * Denial of Service Attacks * Eclipse Attacks * Routing Attacks * Sybil Attacks * Lab 9 * Perform different network-level attacks SYSTEM-LEVEL VULNERABILITIES AND ATTACKS INTRODUCTION TO BLOCKCHAIN SYSTEM VULNERABILITIES * The Bitcoin Hack * The Verge Hack * The EOS Vulnerability * Lab 10 SMART CONTRACT VULNERABILITIES AND ATTACKS INTRODUCTION TO COMMON SMART CONTRACT VULNERABILITIES * Reentrancy * Access Control * Arithmetic * Unchecked Return Values * Denial of Service * Bad Randomness * Race Conditions * Timestamp Dependence * Short Addresses * Lab 11 * Exploiting vulnerable smart contracts SECURITY OF ALTERNATIVE DLT ARCHITECTURES WHAT ARE ALTERNATIVE DLT ARCHITECTURES? * Introduction to Directed Acyclic Graphs (DAGs) * DAGs vs. Blockchains * Advantages of DAGs * DAG Vulnerabilities and Security * Lab 12 * Exploring a DAG network

Blockchain Security Training
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle PeopleSoft Time and Labor - North America Rel. 9.2

By Nexus Human

Duration 5 Days 30 CPD hours Overview Ensure a smooth, rapid implementation of PeopleSoft Time and Labor. Better understand how to facilitate the management, planning, reporting and approving of time, and calendar and schedule creation and usage. Set Up System and Time and Labor Tables Learn about and set up the tables that support your Time and Labor system. Identify how to track employee time by period and define workgroups and task groups to group time reporters into useful segments for processing. Manage Time Reporting Enroll time reporters into Time and Labor, and assign them to work schedules. Report time using different tools. Process reported time using the rules you defined to match your business processes. This PeopleSoft Time and Labor - North America Rel. 9.2 training will show you how to implement the PeopleSoft Time and Labor product encompassing features and functionality , and develop a solid foundation of knowledge that allows you to enroll time reporters into Time and Labor, assign them to work schedules, and report and process reported time. SETTING UP PEOPLESOFT HUMAN RESOURCES, PAYROLL, AND BENEFITS TABLES * Indentifying Prerequisite Human Resources, Benefits, and Payroll Tables Defining Prerequisite Tables Defining Holiday Schedules Defining Earnings Codes and Programs Defining Pay Groups and Pay Calendars SETTING UP BASIC PEOPLESOFT TIME AND LABOR TABLES * Setting Up Time Zone Offsets Setting Up the Time and Labor Installation Table Setting Up Manager Time Calendar View Options Selecting the Labor Distriution and Labor Dilution Options ESTABLISHING TIME REPORTING CODES * Describing Time Reporting Codes (TRC) Defining Time Reporting Code Categories Establishing Time Reporting Codes Defining TRC Programs Defning Compensatory Time Plans ESTABLISHING TIME PERIODS * Describing Time Periods Establishing Time Periods ESTABLISHING PLANNED OVERTIME * Describing Planned Overtime Features Establishing Planned Overtime CREATING WORKGROUPS * Describing Key Workgroup Concepts Creating Workgroups DEFINING TEMPLATE BUILT RULES * Identifying Online Rule Definition Tools Identifying Steps to Define Rules Defining Template Built Rules Defining Rule Programs Exporting and Importing Rules Describing Rule Template Creation CREATING TASK GROUPS * Identifying Task Functinlaity Concepts Creating Task Templates Creating Task Profiles Creating Taskgroups Describing Task Profile Reporting Precedence BUILDING SCHEDULES * Identifying Scheduling Concepts Describing Scheduling Integrations Identifying the Steps to Create a Schedule Setting Up Schedules Validating Schedules SETTING UP TIME REPORTERS * Creating Time Reporter Data Maintaining Time Reporter Data Assigning Time Reporters to a Schedule Assigning and Viewing Compensatory Time Off Plans SETTING UP GROUPS AND SECURITY * Describing PeopleSoft Time and Labor Groups and Security Setting Up Group Creating Security Setting Up Dynamic Groups Setting Up Static Groups Viewing Time Reporters in Groups Setting Up Group Security REPORTING TIME USING RAPID ENTRY * Describing Time Reporting Establishing Rapid Time Templates Performing Rapid Entry RUNNING THE TIME ADMINISTRATION PROCESS * Describing the Time Administration Process Describing Time Reporter and Payable Time Status REPORTING TIME USING SELF-SERVICE * Identifying Time Reporting Defining Time Reoprting Templates Defining User Preferences Reporting Time Using Timesheets Reporting Time Using the Web Clock Identifying Mass Time Reporting Requesting Overtime Requesting Absence MANAGING EXCEPTIONS * Defining Exceptions Managing Exceptions USING FLUID AND WORKFORCE AVAILABILITY * Setting Up the Time and Labor Mobile Applications Entering Time Reporting as an Employee Managing Time Administration as a Manager Setting Up Workforce Availability Viewing Workforce Availability for Daily and Weekly Time INTEGRATING WITH PEOPLESOFT PAYROLL FOR NORTH AMERICA * Integrating with Absence Management Preparing for a Payrun Running the Time and Labor Load Process SETTING UP AND USING AUTO ENROLLMENT * Setting Up Auto Enrollment Defining Auto Enrollment Groups Previewing the Enrollment Data PERFORMING LABOR DISTRIBUTION AND DILUTION * Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs AUDITING AND ADJUSTING PAYABLE TIME * Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets PERFORMING LABOR DISTRIBUTION AND DILUTION * Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs AUDITING AND ADJUSTING PAYABLE TIME * Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets ADDITIONAL COURSE DETAILS: Nexus Humans Oracle PeopleSoft Time and Labor - North America Rel. 9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle PeopleSoft Time and Labor - North America Rel. 9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle PeopleSoft Time and Labor - North America Rel. 9.2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Systems Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview In this course, you will learn to: Recognize the AWS services that support the different phases of Operational Excellence, a WellArchitected Framework pillar. Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM). Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config. Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment. Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog. Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches. Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance. Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand. Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment. Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config. Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service. State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment. Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier. Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report. This course teaches systems operators and anyone performing system operations functions how to install, configure, automate, monitor, secure, maintain and troubleshoot the services, networks, and systems on AWS necessary to support business applications. The course also covers specific AWS features, tools, andbest practices related to these functions. MODULE 1: INTRODUCTION TO SYSTEM OPERATIONS ON AWS * Systems operations * AWS Well-Architected Framework * AWS Well-Architected Tool MODULE 2A: ACCESS MANAGEMENT * Access management * Resources, accounts, and AWS Organizations MODULE 2B: SYSTEM DISCOVERY * Methods to interact with AWS services * Introduction to monitoring services * Tools for automating resource discovery * Inventory with AWS Systems Manager and AWS Config * Troubleshooting scenario * Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config MODULE 3: DEPLOYING AND UPDATING RESOURCES * Systems operations in deployments * Tagging strategies * Deployment using Amazon Machine Images (AMIs) * Deployment using AWS Control Tower * Troubleshooting scenario MODULE 4: AUTOMATING RESOURCE DEPLOYMENT * Deployment using AWS CloudFormation * Deployment using AWS Service Catalog * Troubleshooting scenario * Hands-On Lab: Infrastructure as Code MODULE 5: MANAGE RESOURCES * AWS Systems Manager * Troubleshooting scenario * Hands-On Lab: Operations as Code MODULE 6A: CONFIGURE HIGHLY AVAILABLE SYSTEMS * Distributing traffic with Elastic Load Balancing Amazon Route 53 MODULE 6B: AUTOMATE SCALING * Scaling with AWS Auto Scaling * Scaling with Spot Instances * Managing licenses with AWS License Manager * Troubleshooting scenario * MODULE 7: MONITOR AND MAINTAINING SYSTEM HEALTH * Monitoring and maintaining healthy workloads * Monitoring distributed applications * Monitoring AWS infrastructure * Monitoring your AWS account * Troubleshooting scenario * Hands-On Lab: Monitoring Applications and Infrastructure MODULE 8: DATA SECURITY AND SYSTEM AUDITING * Maintain a strong identity and access foundation * Implement detection mechanisms * Automate incident remediation * Troubleshooting scenario * Hands-On Lab: Securing the Environment MODULE 9: OPERATE SECURE AND RESILIENT NETWORKS * Building a secure Amazon Virtual Private Cloud (Amazon VPC) * Networking beyond the VPC * Troubleshooting scenario MODULE 10A : MOUNTABLE STORAGE * Configuring Amazon Elastic Block Storage (Amazon EBS) * Sizing Amazon EBS volumes for performance * Using Amazon EBS snapshots * Using Amazon Data Lifecycle Manager to manage your AWS resources * Creating backup and data recovery plans * Configuring shared file system storage * MODULE 10B: OBJECT STORAGE * Deploying Amazon Simple Storage Service (Amazon S3) with Access Logs, Cross-Region Replication, and S3 Intelligent-Tiering * Hands-On Lab: Automating with AWS Backup for Archiving and Recovery MODULE 11: COST REPORTING, ALERTS, AND OPTIMIZATION * Gain AWS expenditure awareness * Use control mechanisms for cost management * Optimize your AWS spend and usage * Hands-On Lab: Capstone lab for SysOps ADDITIONAL COURSE DETAILS: Nexus Humans Systems Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Systems Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Systems Operations on AWS
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle 12c Administration I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. ORACLE DATABASE ARCHITERCTURE OVERVIEW * The Database Instance * Database Memory Structures * Database Process Structures * Database Storage Architecture * Oracle Clusterware CONFIGURING THE HOST FOR STANDALONE INSTALLLATION * Host Configuration Overview * Choosing a Database Host * Choosing an Operating System * Proprietary Unix vs Open-Source Linux * Making the OS Selection * Prepare an Oracle LINUX Installation * Perform Oracle LINUX Installation * Configure the LINUX Host * Step 1 - Confirm General System Requirements * Step 2 - Confirm The Operating System Platform * Step 3 - Confirm LINUX Package Requirements * Step 4 - Confirm Network Configuration * Configure Host for Virtualization * VM Technologies * Configure Oracle Linux for Virtualization * Step 1 - Download Linux Updates * Step 2 - Check Linux Kernel * Step 3 - Download Latest yum Configuration File * Step 4 - Enable Oracle Linux Add-ons * Step 5 - Install VirtualBox * Oracle Optimal Flexible Architecture * OFA Goals * ORACLE_BASE * ORACLE_HOME * Database Files * Multiple ORACLE_HOMEs * Databse Software Upgrades * Mutliple Oracle Software Installations GRID INFRASTRUCTURE CONFIGURATION * Configure the Linux Installation * About ASM Devices * Configure Linux Devices for ASM * Partioning a Device * Oracle ASMLib * Configue MS Windows Devices GRID INFRASTRUCTURE INSTALLATION * Perform the Installation * Download * Unpack the Installation Package * Launch the Installation Session * The Installation Dialog * Verify the Installation * Operating System Confirmation * Oracle Utilities Setup * SQL*Plus Confirmation * Using EM Cloud Control * Troubleshooting Problems DATABASE INSTALLATION CONFIGURAION * Configure a Linux Installation * System Groups & Users * Configure Kernel Parameters * Create the Physical Directories * Configure MS Windows Installation * Prerequisite Checks & Fixup Utility DATABASE INSTALLATION * ABOUT THE INSTALLATION * The Installation Tools * About The Installation Dialog * The Installation Session Log * PERFORM INSTALLATION ON LINUX * Download * Unpack The Installation Files * Set Environment Variables * Launch The Installation * SERVER CLASS INSTALLATION DIALOG * More About The Global Database Name * About Enterprise Manager Cloud Control * Secure The New Database * PERFORM INSTALLATION ON WINDOWS * Launch The Installation * POST---INSTALLATION CONFIGURATION * Required Environment Variables * Defining The Environment Variables * About SSH * VERIFY THE INSTALLATION * SQL*PlusConfirmation * Operating System Confirmation * Firewall Configuration * Accessing EM Database Express CREATING DATABSES USING DBCA * About DBCA * DBCA Templates * Are You Sure? * DEFAULT CONFIGURATION DATABASE * ADVANCED MODE DATABASE * File Location Variables * Database Vault and Label Security * CONFIGURE AN EXISTING DATABASE * DELETE A DATABASE * MANAGE TEMPLATES * MANUALLY CREATE A DATABASE * The CREATE DATABASE Command USING ORACLE RESTART * WHAT IS ORACLE RESTART? * What Oracle Restart Does * Is Oracle Restart Deprecated? * Registering With Oracle Restart * More About srvctl * Terminal Session Configuration * COMPONENT STATUS USING SRVCTL * Database Status * Grid Infrastructure Status * Oracle Home Status * CONFIGURATION USING SRVCTL * Examining A Database Configuration * Examining The Listener Configuration * Examining The ASM Configuration * Manual Registration * ListenerConfiguration Modification * Database ConfigurationModification * STARTUP/SHUTDOWN USING SRVCTL * Why Use srvctl? * MANAGING ORACLE RESTART * Obtaining Oracle Restart Status * Start/Stop Oracle Restart PREPARING FOR A DATABASE UPGRADE * What is a Database Upgrade? * Database Upgrade Methods * Real World Database Upgrade * Develop A Database Upgrade Plan * ABOUT THE DATABASE VERSION * Direct Upgrade * The COMPATIBLE Database Parameter * PRE-UPGRADE PREPARATIONS * Oracle Warehouse Builder * Oracle Label Security (OLS) * Oracle Database Vault * Locating The Older Database Installations * THE PRE-UPGRADE INFORMATION TOOL * Pre-Upgrade Information Tool Files * Run The Pre---Upgrade Information Tool * Examining The Pre---Upgrade Information Tool Results UPGRADE TO ORACLE DATABSE 12C * Launch DBUA * Database Upgrade Dialog POST-UPGRADE TASKS * Post-Upgrade Checklist * Enable Unified Auditing * Migrate to Unified Auditing * Database Parameter Changes * Enable New Features * Source Destination Specific Post-Upgrade Tasks ORACLE ARCHITECTURE: THE SYSTEMS INFRASTRUCTURE * About Enterprise Architectures * The Relational Database * Legacy Computing Models * The Multi-Tiered Computing Model * Scaling Up * Cloud-Based Deployment * ORACLE INFRASTRUCTURE ECOSYSTEM * USING ORACLE ENTERPRISE MANAGER * More About EM * Using EM Database Express * Using EM Cloud Control ORACLE ARCHITECTURE: THE DATABASE HOST * The Database Server Stack * PROCESSOR LAYER * CPU Resources * Memory Resources * I/O & STORAGE PROCESSING * OS LAYER PROCESSING MODES * DATABASE SERVER VIRTUALIZATION * STORAGE VIRTUALIZATION * ORACLE DATABASE SERVER STACK * ORACLE ENGINEERED SYSTEMS * Oracle Exadata Database Platform * Exalogic Cloud Machine * Exalytics BI Machine ORACLE ARCHITECTURE: PRINCILPLES & TECHNOLOGY CONCEPTS * Grid Computing Principles * Why Grid Computing? * What Is Grid Computing? * PARALLELIZATION PRINCIPLES * Hardware Parallelization * Grid Computing Devices * Clustered Database Servers * CLOUD COMPUTING PRINCIPLES * Multi-Tenancy ORACLE ARCHITECTURE: THE RDBMS INSTALLATION & THE DATABASE INSTANCE * The Database Server Software * Database Versions & Releases * Database Editions * Using PRODUCT_COMPONENT_VERSION View * The Core Database Components * Using V$VERSION View * Understanding The Database Version Number * The COMPATIBLE Database Parameter * DATABASE INSTANCE ELEMENTS * Individual Elements Of A Database Instance * Physical Database Elements * An Operational Database installation * DATABASE INSTANCE CONFIGURATIONS * Single Instance * Parameter Files & Instance Configuration * MAX_STRING_SIZE Parameter Example * Independent Instances * Clustered Instances * The Database Instance In A Multi-tenant Configuration * RECONFIGURING A DATABASE INSTANCE * Static Vs. Dynamic Parameters * Dynamic Parameter Setting * Parameter Setting Scope * Parameter Setting Level * Setting Upgrade Related Parameters * DATABASE COMPONENTS * Advanced Data Functionality Components * Security Components * High-Performance Components * Administration Components * Database F

Oracle 12c Administration I
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle Database 12c - Administration Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase AdministratorsDatabase DesignersSupport EngineerTechnical Administrator Overview Monitor the DatabaseManage Database PerformanceImplement Database AuditingConfigure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and TasksSchedule Jobs to Run Inside or Outside of the DatabaseConfigure Oracle Net ServicesConfigure your Database For Backup and Recovery OperationsDescribe Oracle Database ArchitectureManage the Oracle Database InstanceManage Oracle Database Storage structuresCreate and Administer User Accounts The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance. The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.

Oracle Database 12c - Administration Workshop
Delivered on-request, onlineDelivered Online
Price on Enquiry