• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27 Certified Technology Specialist (CTS) courses delivered Live Online

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. MODULE 1: METHODOLOGY & ASSESSMENT * The Citrix Consulting Methodology * Citrix Consulting Methodology Use * Business Drivers * Prioritize Business Drivers * User Segmentation * User Segmentation Process * App Assessment Introduction * App Assessment Analysis * Why Perform a Capabilities Assessment? * Common Capabilities Assessment Risks MODULE 2: USER LAYER * Endpoint Considerations * Peripherals Considerations * Citrix Workspace App Version Considerations * Citrix Workspace App Multiple Version Considerations * Network Connectivity and the User Experience * Bandwidth and Latency Considerations * Graphics Mode Design Considerations * HDX Transport Protocols Considerations * Media Content Redirection Considerations * Session Interruption Management Session Reliability Feature Considerations * Session Interruption Management Auto-Client Reconnect Feature Considerations * Session Interruption Management ICA Keep-Alive Feature Considerations MODULE 3: ACCESS LAYER * Access Matrix * Access Layer * Access Layer Communications * Double-Hop Access Layer Considerations * Citrix Cloud Access Layer Considerations * Use Cases for Multiple Stores * Define Access Paths per User Group * Define Number of URLs * Configuration and Prerequisites for Access Paths * Citrix Gateway Scalability * Citrix Gateway High Availability * StoreFront Server Scalability * StoreFront Server High Availability MODULE 4: RESOURCE LAYER - IMAGES * Flexcast Models * VDA Machine Scalability * VDA Machine Sizing with NUMA * VDA Machine Sizing * VDA Machine Scalability Cloud Considerations * Scalability Testing and Monitoring * Secure VDA Machines Network Traffic * Secure VDA Machines Prevent Breakouts * Secure VDA Machines Implement Hardening * Secure VDA Machines Anti-Virus * Review of Image Methods * Citrix Provisioning Overall Benefits and Considerations * Citrix Provisioning Target Device Boot Methods * Citrix Provisioning Read Cache and Sizing * Citrix Provisioning Write Cache Type * Citrix Provisioning vDisk Store Location * Citrix Provisioning Network Design * Citrix Provisioning Scalability Considerations * Citrix Machine Creation Services Overall Benefits and Considerations * Citrix Machine Creation Services Cloning Types * Citrix Machine Creation Services Storage Locations & Sizing * Citrix Machine Services Read and Write Cache * App Layering Considerations * Image Management Methods MODULE 5: RESOURCE LAYER - APPLICATIONS AND PERSONALIZATION * Application Delivery Option * Determine the Optimal Deployment Method for an App * General Application Concerns * Profile Strategy Profile Types Review * Citrix Profile Management Design Considerations * Citrix Profile Management Scaling * Citrix Profile Management Permissions * Policies Review * Optimize Logon Performance with Policies * Printing Considerations MODULE 6: CONTROL LAYER * Pod Architecture Introduction * Pod Architecture Considerations * Citrix Virtual Apps and Desktops Service Design Considerations * Implement User Acceptance Testing * Load Balancing the Machine Running the VDA * Citrix Director Design Considerations * Management Console Considerations * Change Control * Delivery Controller Scalability and High Availability * Control Layer Security * Configuration Logging Considerations * Session Recording MODULE 7: HARDWARE/COMPUTE LAYER * Hypervisor Host Hardware Considerations * Separating Workloads Considerations * Workload Considerations * VMs Per Host and Hosts Per Pool * Citrix Hypervisor Scalability * VM Considerations in Azure and Amazon Web Services * Storage Tier Considerations * Storage I/O Considerations * Storage Architecture * Storage RAID & Disk Type * Storage Sizing LUNs * Storage Bandwidth * Storage in Public Cloud * Datacenter Networking Considerations * Securing Hypervisor Administrative Access * Secure the Physical Datacenter * Secure the Virtual Datacenter MODULE 8: MODULE 8: HIGH AVAILABILITY AND MULTIPLE LOCATION ENVIRONMENTS * Redundancy vs. Fault Tolerance vs. High Availability * Multi-Location Architecture Considerations * Multi-Site Architecture Considerations * Global Server Load Balancing * Optimal Gateway Routing * Zone Preference and Failover * StoreFront Resource Aggregation * StoreFront Subscription Sync * Hybrid Environment Options * Citrix Provisioning Across Site * Site Database Scalability and High Availability * Citrix Provisioning Across Sites Considerations * Citrix Machine Creation Across Sites * App Layering Across Sites * Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices * Profile Management Multi-Site Replication Considerations * Folder Redirections and Other User Data in a Multi-Location Environment * Application Data Considerations * Cloud-Based Storage Replication Options * Multi-Location Printing Considerations * Zone Considerations * Active Directory Considerations MODULE 9: DISASTER RECOVERY * Tiers of Disaster Recovery * Disaster Recovery Considerations * Business Continuity Planning and Testing * Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered on-request, onlineDelivered Online
Price on Enquiry

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. INSTALLING CISCO TELEPRESENCE MANAGEMENT SERVER * Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS CONFIGURING CISCO TELEPRESENCE MANAGEMENT SUITE (TMS) * Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources BOOKING CONFERENCING * Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler REPORTING ON TMS * Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System MANAGING AND TROUBLESHOOTING TMS * Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server
Delivered on-request, onlineDelivered Online
Price on Enquiry

CWS-250 Citrix DaaS Deployment and Administration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Create Citrix DaaS workloads. Deliver app and desktop resources to users. Migrate existing on-premises Citrix Virtual Apps and Desktops 2203 LTSR infrastructure to Citrix Cloud. In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and resource locations that the host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. MODULE 1: INTRODUCTION TO CITRIX DAAS * New Citrix Workspace Packaging * Citrix Virtual Apps and Desktops - On- Premises Site * What is Citrix Cloud? * Why Citrix DaaS? * What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? * Citrix Cloud Administration MODULE 2: PLANNING - CITRIX DAAS ARCHITECTURE, SECURITY, AND OPERATIONS * Architecture and Deployment Options * Citrix DaaS Security * Citrix DaaS Operations MODULE 3: PLANNING - CITRIX CLOUD CONNECTORS * Cloud Connector Architecture * Cloud Connector Services and Communications Overview * Cloud Connector Operations in a Resource Location * Cloud Connector Resiliency * Installing, Updating, and Removing Cloud Connectors * Supported Domain Scenarios for Cloud Connectors * Securing Cloud Connector Communications * Local Host Cache (LHC) * Citrix Cloud Connector vs Delivery Controller Operations MODULE 4: PLANNING - CITRIX DAAS RESOURCE LOCATIONS * Citrix DaaS Resource Locations * Citrix DaaS Hosting Connections * Zones MODULE 5: ACTIVE DIRECTORY, AUTHENTICATION, AND AUTHORIZATION * Active Directory Design Options * Desktops from Non-Domain Joined VDAs * Citrix Federated Authentication Service and Identity Provider Services MODULE 6: PLANNING - PROVISIONING VDA WORKLOADS AND DELIVERING RESOURCES * Master Images * Machine Creation Services (MCS) in Citrix DaaS * Citrix Provisioning in Citrix DaaS * Machine Catalogs * Delivery Groups * Citrix Cloud Library MODULE 7: PLANNING - PROVISIONING VDA WORKLOADS AND DELIVERING RESOURCES * Selecting Between Citrix digital workspace experience and StoreFront * Citrix StoreFront and Citrix digital workspace experience Communications * Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway * Access Layer Communications * User Authentication MODULE 8: PLANNING - CITRIX DAAS ADMINISTRATION * Citrix Cloud Manage and Monitor * Delegated Administration * Citrix DaaS Remote PowerShell Software Development Kit * Manage Multiple Resource Locations MODULE 9: PLANNING - PUBLIC CLOUD CONSIDERATIONS * General Public Cloud Considerations * Using Autoscale to Power Manage Machines in a Public Cloud * Microsoft Azure as a Citrix DaaS Resource Location * Amazon Web Services as a Citrix DaaS Resource Location * Google Cloud as a Citrix DaaS Resource Location MODULE 10: PLANNING - MIGRATING TO CITRIX DAAS FROM CITRIX VIRTUAL APPS AND DESKTOPS * Citrix Cloud Migration Options and Considerations * Citrix Automated Configuration Tool * Citrix Image Portability Service MODULE 11: MANAGE - OPERATIONS AND SUPPORT IN CITRIX CLOUD * Citrix Cloud Connector Support * Updating and Rolling Back Machine Catalogs * VDA Restore * Citrix Self-Help Strategy * Monitor Your Environment ADDITIONAL COURSE DETAILS: Nexus Humans CWS-250 Citrix DaaS Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-250 Citrix DaaS Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-250 Citrix DaaS Deployment and Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)TIA - Certified Threat Intelligence Analyst Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. COURSE OUTLINE * Threat Intelligence Basics * Cyber Threats * Threat Actors * Case Studies * Threat Identification * Proactive Approach

C)TIA - Certified Threat Intelligence Analyst Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Continuous Testing Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as: Delivery Staff DevOps Engineers IT Managers Project Managers Lab Staff Maintenance and Support Staff Quality Assurance Managers Quality Assurance Teams Release Managers Testers Software Engineers Overview The learning objectives for DTE include a practical understanding of: The purpose, benefits, concepts and vocabulary of DevOps testing How DevOps testing differs from other types of testing DevOps testing strategies, test management and results analysis Strategies for selecting test tools and implementing test automation Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows How DevOps testers fit with a DevOps culture, organization and roles This comprehensive course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. This course prepares you for the Continuous Testing Foundation(CTF) certification. COURSE OBJECTIVES AND MODULES, LOGISTICS WHAT IS DEVOPS TESTING AND ITS BUSINESS BENEFITS? RELATION OF DEVOPS TESTING IN OTHER TEST METHODOLOGIES DEVOPS TESTING BEST PRACTICES * DevOps Testing Terminology * Culture changes * Organization changes * Process and team friction * Motivation strategies * Measuring Success * Continuous Evolution * Troubleshooting WHAT IS THE DEVOPS PIPELINE? * DevOps Testing on the pipeline * Test strategy choices * Pre-Flight strategies * Continuous Integration Testing * System, Delivery and Customer Testing * Test Environments * Lab Management * Topology orchestration TEST AUTOMATION FRAMEWORKS * Test Tools Selection criterion Automated metrics KEY CONCEPTS * Test Case Best Practices & Design Exercise * Test Suite Best Practices & Design Exercise * Principles of DevOps Management * DevOps Test Management Metrics * DevOps Management Tools * DevOps Test Results Analysis * Integrating DevOps Results Analysis * Test Management Exercise * Fictitious Product Test Requirements * Individual Exercise * Class discussion * Exam Preparation

Continuous Testing Foundation (DevOps Institute)
Delivered on-request, onlineDelivered Online
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. INTRODUCTION TO THREAT INTELLIGENCE * Understanding Intelligence * Understanding Cyber Threat Intelligence * Overview of Threat Intelligence Lifecycle and Frameworks CYBER THREATS AND KILL CHAIN METHODOLOGY * Understanding Cyber Threats * Understanding Advanced Persistent Threats (APTs) * Understanding Cyber Kill Chain * Understanding Indicators of Compromise (IoCs) REQUIREMENTS, PLANNING, DIRECTION, AND REVIEW * Understanding Organization?s Current Threat Landscape * Understanding Requirements Analysis * Planning Threat Intelligence Program * Establishing Management Support * Building a Threat Intelligence Team * Overview of Threat Intelligence Sharing * Reviewing Threat Intelligence Program DATA COLLECTION AND PROCESSING * Overview of Threat Intelligence Data Collection * Overview of Threat Intelligence Collection Management * Overview of Threat Intelligence Feeds and Sources * Understanding Threat Intelligence Data Collection and Acquisition * Understanding Bulk Data Collection * Understanding Data Processing and Exploitation DATA ANALYSIS * Overview of Data Analysis * Understanding Data Analysis Techniques * Overview of Threat Analysis * Understanding Threat Analysis Process * Overview of Fine-Tuning Threat Analysis * Understanding Threat Intelligence Evaluation * Creating Runbooks and Knowledge Base * Overview of Threat Intelligence Tools INTELLIGENCE REPORTING AND DISSEMINATION * Overview of Threat Intelligence Reports * Introduction to Dissemination * Participating in Sharing Relationships * Overview of Sharing Threat Intelligence * Overview of Delivery Mechanisms * Understanding Threat Intelligence Sharing Platforms * Overview of Intelligence Sharing Acts and Regulations * Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

CSF-202: Citrix Content Collaboration Enterprise Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Content Collaboration, with little or no previous Content Collaboration experience. Potential students include networking administrators, engineers, and architects interested in learning how to deploy or manage Citrix Content Collaboration. Overview Understand Enterprise File Synchronization, Sharing, and Citrix Content Collaboration architecture How to navigate the Citrix Content Collaboration administration interface and build StorageZones How to manage Citrix Content Collaboration users in an Active Directory environment Different StorageZone deployment considerations and scenarios In this course, you?ll learn about how to use Citrix Content Collaboration to share, sync, and secure content for your organization. You?ll understand the Content Collaboration architecture, StorageZone configurations and deployment options available, how to manage and administer your Content Collaboration environment, Citrix Files applications, and how single sign-on, and how to use the User Management Tool for Content Collaboration CONTENT COLLABORATION ARCHITECTURE OVERVIEW * Introduction to Enterprise File Sync and Sharing (EFSS) including its use cases, legal, and data security considerations * Review Content Collaboration architecture, components and storage features MANAGEMENT AND ADMINISTRATION * Getting Started in Content Collaboration * How to configure and manage users, folders, permissions and administrative settings * Additional cloud-based features and integrations STORAGE ZONE DEPLOYMENTS AND CONFIGURATION * Overview of Storage Zones architecture and deployment options for customer-managed storage including proof-ofconcept, high-availability, and multi-site deployments * Review system, networking, and hosting requirements including steps for server preparation, installation and configuration * Manage, monitor, and upgrade Storage Zone deployments for optimal performance SINGLE SIGN-ON AND USER MANAGEMENT * Overview of SAML 2.0 protocol and single-sign on use cases,security and benefits * Single Sign-on settings for Content Collaboration and supported identity provider configurations * User provisioning with User Management Tool (UMT) and task scheduling for automated updates synchronization with Active Directory CITRIX FILES APPLICATIONS * Citrix Files application system requirements, configuration and settings * Compare features and functionalities for various use case applications and workflows * Lifecycle product version considerations ADDITIONAL COURSE DETAILS: Nexus Humans CSF-202: Citrix Content Collaboration Enterprise Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CSF-202: Citrix Content Collaboration Enterprise Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CSF-202: Citrix Content Collaboration Enterprise Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified IT Specialist (CITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT STRATEGY * The need for Information Technology * Enterprise architecture * Service catalogue * Service level management * Sustainable development IT ORGANISATION * Personnel need * Roles and responsibilities * Sourcing * Selection process * Hiring staff * Managing staff * Career planning * Training / job rotation * Performance appraisal * Staff departures VENDOR SELECTION / MANAGEMENT * The importance of vendors * Vendor selection * Request For Information (RFI) * Request For Proposal (RFP) * Proposal evaluation * Vendor reference checks * Contract negotiation * Contract management * Vendor management * Re-compete vendors PROJECT MANAGEMENT * Methodologies * Project organisation * Starting up / initiating * Planning / initiation a project * Risk * Quality * Scope * Work / Product Breakdown Structure * PERT diagram / Gantt chart * Cost * Communication APPLICATION MANAGEMENT * Software Development Life Cycle (SDLC) * Software Quality Assurance (SQA) * Requirements * Development * Testing * Adoption (implementation) * Maintenance SERVICE MANAGEMENT * Incident management * Problem management * Change management BUSINESS CONTINUITY MANAGEMENT * Standards and guidelines * Objectives * Context * Interested parties * Scope * Roles and responsibilities * Resources and competences * Awareness and communication * Documentation * Business Impact Analysis RISK MANAGEMENT * Guidelines * Context establishment * Identification * Analysis * Evaluation * Treatment * Communication * Monitoring and control INFORMATION SECURITY MANAGEMENT * Standards * Confidentiality * Integrity * Availability * Controls types * Guideline for controls selection * Control categories * Information security awareness * Security incident response INFORMATION AND KNOWLEDGE MANAGEMENT * Information management * Data management * Information management - technologies * Business intelligence * Data management - technologies * Best practices in data governance * Pitfalls in data governance BUSINESS CHANGE MANAGEMENT * Business change * Frameworks, models and techniques * Needs identification * Cloud computing * Social media / digital marketing * Big data * Internet of Things (IoT) QUALITY MANAGEMENT * Standards, guidelines and frameworks * Objectives * Activities * Services review * Customer feedback * Customer survey * Key Performance Indicators (KPI) * Metrics * Scorecards and reports * Quality register EXAM * Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified IT Specialist (CITS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISTQB Certified Tester, Advanced Level - Technical Test Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers, Functional Testers, Test Automation Specialists, Performance Specialists, Environment and Data Specialists, Security Specialists Prerequisites for taking part in the workshop: It is recommended that participants should have completed the ISTQB© Certified Tester Foundation Level certification, or have attended the workshop. Overview Defined tasks need to be structured according to the technical requirements and the internal structure of the system needs to be analysed in detail in order to achieve the expected level of quality and detect errors during development. The ISTQB© Advanced Level Technical Test Analyst certification will teach you on the basis of the current ISTQB© Advanced Level syllabus. The various procedures, techniques and tools for non-functional system testing will be explained, and you will then be in a position to apply these in your future work as a Technical Test Analyst. The three-day certification will be followed by a two-hour examination. During the workshop, our experienced trainers will fully prepare you for the ISTQB© Advanced Level Technical Test Analyst examination. Following on from the ISTQB© Certified Tester Foundation Level training, this workshop covers the increasing technical challenges faced by system testing in particular. TOPIC 1 * Tasks of a Technical Test Analyst in risk-based testing TOPIC 2 * Structure-based testing: Simple condition test, condition/decision test, modified condition/decision test, multiple condition test, path test, API test, selection of structure-based procedures TOPIC 3 * Analytical testing methods: static analysis (control flow analysis, data flow analysis, improved maintainability/adaptability with static analysis, call graphs), dynamic analysis (detection of memory leaks/?rogue? pointers, analysis of system performance) TOPIC 4 * Quality features in technical tests (ISO 25000 standard): Planning aspects of technical testing, security testing, reliability testing, performance testing, resource usage, maintainability testing, portability testing TOPIC 5 * Review checklists (architecture and code reviews) TOPIC 6 * Testing tools and automation, tool integration, test automation projects, specific testing tools TOPIC 7 * Practical exercises on all core topics NOTES * In order to take the examination, you must show at least 18 months? practical experience as a tester and be certified at ISTQB© Foundation Level. Confirmation from your employer or from your reference customers are accepted as proof of practical experience. ADDITIONAL COURSE DETAILS: Nexus Humans ISTQB Certified Tester, Advanced Level - Technical Test Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Certified Tester, Advanced Level - Technical Test Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ISTQB Certified Tester, Advanced Level - Technical Test Analyst
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. EXPLORING CISCO TETRATION * Data Center Challenges * Define and Position Cisco Tetration * Cisco Tetration Features * Cisco Tetration Architecture * Cisco Tetration Deployment Models * Cisco Tetration GUI Overview IMPLEMENTING AND OPERATING CISCO TETRATION * Explore Data Collection * Install the Software Agent * Install the Hardware Agent * Import Context Data * Describe Cisco Tetration Operational Concepts EXAMINING CISCO TETRATION ADM AND APPLICATION INSIGHT * Describe Cisco Tetration Application Insight * Perform ADM * Interpret ADM Results Application Visibility EXAMINING CISCO TETRATION INTENT-BASED NETWORKING * Describe Intent-Based Policy * Examine Policy Features * Implement Policies ENFORCING TETRATION POLICY PIPELINE AND COMPLIANCE * Examine Policy Enforcement * Implement Application Policy * Examine Policy Compliance Verification and Simulation EXAMINING TETRATION SECURITY USE CASES * Examine Workload Security * Attack Prevention * Attack Detection * Attack Remediation EXAMINING IT OPERATIONS USE CASES * Key Features and IT Operations Use Cases * Performing Operations in Neighborhood App-based Use Cases EXAMINING PLATFORM ENHANCEMENT USE CASES * Integrations and Advanced Features * Third-party Integration Examples * Explore Data Platform Capabilities EXPLORING CISCO TETRATION ANALYTICS ADMINISTRATION * Examine User Authentication and Authorization * Examine Cluster Management * Configure Alerts and Syslog ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered on-request, onlineDelivered Online
Price on Enquiry