SAP FICO
Finance and Controlling (FICO) training, is an essential training for the finance professionals. FICO training covers the major aspects of FI (Financial Accounting) and CO (Controlling) required by organizations of varying sizes. During the training, the aspirants will learn how to integrate different modules of ERP for bringing financial automation by getting complete information on…
-
Teacher admin
-
- 123 Students
Linux CE Copy
Introduction to Linux Certified Engineer 1. Introduction to LCE 2. System configuration and management 2.1 Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems or Interfaces 2.2 Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting 2.3 Route IP Traffic and Create Static Routes 2.4 Use Firewalld and…
-
Teacher admin
-
- 0 Students
EDRP- Ec Council Disaster Recovery Program
Course/Certification Available Dates EDRP- Ec Council Disaster Recovery Program August: Weekend: 10th, 24th EDRP- Ec Council Disaster Recovery Program September: Weekend: 7th, 21st, 28th EDRP- Ec Council Disaster Recovery Program October: Weekend: 12th, 19th EC-COUNCIL DISASTER RECOVERY PROFESSIONAL v3 The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement,…
-
Teacher admin
-
- 35 Students
RPA Robotic Process Automation
About The Course This course aims to make you understand the concepts around Robotic Process Automation using the leading RPA tool named ‘UiPath’. Robotic Process Automation is the automation of repetitive and rule based human tasks working with the software applications at the presentation/UI level i.e. no software integrations are needed at middleware, server or…
-
Teacher admin
-
- 0 Students
Mobile Penetration Testing
Advanced Mobile Hacking & Forensics Advanced Mobile Hacking & Forensics Exam Mobile Hacking and Digital Forensic Challenges History of Digital Forensics Global Legal System – Challenges Technical Aspects of Mobile Forensics (What are the challenges) Trace, Seize and investigate – Cyber Crime Case Scenarios Criminal / Civil Incidents …
-
Teacher admin
-
- 0 Students
Wire Shark
Course Content for Wire Shark Training Table of Contents Chapter 1: The World of Network Analysis ………………………………………………………… 1 Define Network Analysis ………………………………………………………………………………………… 2 Follow an Analysis Example ……………………………………………………………………………………. 3 Walk-Through of a Troubleshooting Session ……………………………………………………………… 6 Walk-Through of a Typical Security Scenario (aka Network Forensics) ………………………… 8 Troubleshooting Tasks for the Network Analyst ………………………………………………………..
-
Teacher admin
-
- 0 Students
Shell Scripting Bash
Advance Bash Shell Scripting course provides advanced level skills to help Linux users increase their performance using shell scripts. Students will learn how to create, debug, and read complex Bash shell scripts to customize their Linux enterprise systems. This advanced training will help build the requisite expertise through shell scripting to manage, operate and maintain…
-
Teacher admin
-
- 0 Students
Splunk Training
Splunk Power User & Admin Certification Training About the Course This Splunk Power User and Admin Certification Training includes concepts which are required for both Splunk Power Users and Splunk Administrators. By the end of this training, you will learn their roles, responsibilities and be ready for implementation. The Training helps you work with Configuration…
-
Teacher admin
-
- 0 Students
Linux CSA
Introduction Access a Shell Prompt and Issue Commands Use Input/Output Redirection Use grep and Regular Expressions to Analyze Text Access Remote Systems Using SSH Log in and Switch Users in Multiuser Targets Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2 Create and Edit Text Files Create, Delete, Copy and Move Files…
-
Teacher admin
-
- 0 Students
Linux CE
Introduction to Linux Certified Engineer 1. Introduction to LCE 2. System configuration and management 2.1 Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems or Interfaces 2.2 Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting 2.3 Route IP Traffic and Create Static Routes 2.4 Use Firewalld and…
-
Teacher admin
-
- 0 Students