Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network operations center (NOC) operators System administrators System engineers Technical support personnel Channel partners, resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Cisco IOS XR general architecture Introduction to the Cisco IOS XR command line interface (CLI) Basic system configuration Tracing the switch fabric data path Monitoring the Cisco IOS XR system Working within the Cisco IOS XR configuration file system Interpreting Cisco IOS XR error messages and log file messages Creating system core dumps This 4-day course, Introduction to Cisco IOS© XR (IOSXR100), is an instructor led, lab-based, hands-on course, where you learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations for configuration, software, file system configuration, and monitoring. Basic troubleshooting for how to troubleshoot problems relating to process failures, frozen processes, and high CPU and memory consumption is also covered. This course introduces you to the features and functions of the Cisco IOS XR Software operating system. Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, switch fabric data path, basic software operations, configuration file overview, monitoring the Cisco IOS XR operating system, and working with error messages and core dumps. Module 1: Cisco IOS XR Software Overview Cisco IOS XR Architecture High Availability Scalability Module 2: Cisco IOS XR Configuration Basics Configuration Operations Initial Configuration Reviewing the Configuration Route Processor Redundancy Module 3: Switch Fabric Architecture Cisco IOS XR Architecture, High Availability, and Scalability Review Verifying the Fabric Data Path Module 4: Cisco IOS XR Software Operations Examining the Operation Basics Examining Configuration Operations Examining Configuration Rollback and Recovery Examining Process Management Module 5: Configuration File System Overview Configuration File System Module 6: Monitoring the Cisco IOS XR Operating System Cisco IOS XR Architecture System Monitoring Commands Module 7: Error Messages and Core Dumps System Error Messages Logging System Messages Cisco IOS XR Core Dumps
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for experienced DBAs and technical individuals, with experience on other relational database platforms, who plan, implement, and maintain Db2 11.1 for Linux, UNIX, and Windows databases. These skills can also be utilize to support cloud based databases using Db2 on Cloud or Db2 Hosted environments. Overview Please refer to course overview This course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed. We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA). Overview of Db2 11Command Line Processor (CLP) and GUI UsageThe Db2 EnvironmentCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryLocks and ConcurrencyDatabase Maintenance, Monitoring and Problem DeterminationSecurityDatabase Rebuild SupportDb2 Database and Table Space RelocationUsing Explain ToolsUsing Indexes for PerformanceAdvanced Monitoring
Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, site reliability engineers, and other IT professionals with some Ansible experience who are interested in learning how to manage and automate the deployment, configuration, and operation of key network services included with Red Hat Enterprise Linux 8. Overview Provide key network services using software included with Red Hat Enterprise Linux 8, including DNS with Unbound and BIND9, DHCP and DHCPv6, client e-mail transmission, printing service, NFS and SMB protocol file sharing, SQL database service with MariaDB, and web services using Apache HTTPD, nginx, Varnish, and HAProxy. Configure advanced networking for server use cases, including device teaming. Use Red Hat Ansible Engine to automate the manual deployment and configuration tasks covered in this course. Learn how to configure, manage, and scale key services used in the data center Red Hat Services Management and Automation (RH358) is designed for IT professionals with some experience managing Linux© systems and want to learn more about how to manage and deploy network services included with Red Hat© Enterprise Linux which are particularly important in the modern IT data center. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible© Engine to automate your work in a scalable, repeatable manner. This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. 1 - Manage network services Discuss and review key tools and skills needed to manage network services. 2 - Configure link aggregation Improve the redundancy or throughput of network connections of servers by configuring Linux network teaming between multiple network interfaces. 3 - Manage DNS and DNS servers Explain the operation of DNS service, troubleshoot DNS issues, and configure servers to act as a DNS caching nameserver or as an authoritative name server. 4 - Manage DHCP and IP address assignment Explain and configure services used for IPv4 and IPv6 address assignment including DHCP, DHCPv6, and SLAAC. 5 - Manage printers and printing files Configure systems to print to a network printer that supports IPP Everywhere, as well as manage existing printer queues. 6 - Configure email transmission Discuss how mail servers operate, then configure a server to use system tools and Postfix to send email messages through an outbound mail relay. 7 - Configure MariaDB SQL databases Discuss the basic operation of SQL-based relational databases, perform basic SQL queries for troubleshooting, and be able to set up a simple MariaDB database service. 8 - Configure web servers Provide web content from Apache HTTPD or Nginx web servers, then configure them with virtual hosts and TLS-based encryption. 9 - Optimize web server traffic Improve performance of your web servers by using Varnish to cache static content being served and HAProxy to terminate TLS connections and balance load between servers. 10 - Provide file-based network storage Deliver simple file-based network shares to clients using the NFS and SMB protocols. 11 - Access block-based network storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Hadoop Developers Overview Through instructor-led discussion and interactive, hands-on exercises, participants will navigate the Hadoop ecosystem, learning topics such as:How data is distributed, stored, and processed in a Hadoop clusterHow to use Sqoop and Flume to ingest dataHow to process distributed data with Apache SparkHow to model structured data as tables in Impala and HiveHow to choose the best data storage format for different data usage patternsBest practices for data storage This training course is the best preparation for the challenges faced by Hadoop developers. Participants will learn to identify which tool is the right one to use in a given situation, and will gain hands-on experience in developing using those tools. Course Outline Introduction Introduction to Hadoop and the Hadoop Ecosystem Hadoop Architecture and HDFS Importing Relational Data with Apache Sqoop Introduction to Impala and Hive Modeling and Managing Data with Impala and Hive Data Formats Data Partitioning Capturing Data with Apache Flume Spark Basics Working with RDDs in Spark Writing and Deploying Spark Applications Parallel Programming with Spark Spark Caching and Persistence Common Patterns in Spark Data Processing Spark SQL and DataFrames Conclusion Additional course details: Nexus Humans Developer Training for Spark and Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developer Training for Spark and Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developed for IT Professionals interested in learning how to manage Citrix Endpoint Management on-premises or cloud environments using leading practices. Potential students include Administrators and Implementers. Overview How to manage a Citrix Endpoint Management implementation in a On-premises or cloud environment How to perform common enterprise mobility management tasks and mobile application managementUnderstand the device enrollment processHow to perform monitoring, troubleshooting, and reporting on a Citrix Endpoint Management Enterprise solution Students will explore how to manage Citrix Endpoint Management in this course. Venture into the cloud as students learn to manage devices, apps, and users. Students will learn how the architecture, management, and communication flow function with Citrix Endpoint Management Service and how they can fit their organization?s needs. Students will learn how to administer their Citrix Endpoint Management environment and how to support your end users, as well as working with applications and securing a variety of endpoints. Introduction to Citrix Endpoint Management Citrix Endpoint Management Features Citrix Cloud and Citrix Endpoint Management Citrix Endpoint Management User Experience and Security Citrix Endpoint Management Entitlements Citrix Endpoint Management Architecture Citrix Endpoint Management Prerequisites Citrix Endpoint Management Server Citrix Endpoint Management and Microsoft Intune Apple APNs and Google Firebase Cloud Messaging MDX Architecture and Features Cloud Components Cloud Component Overview Onboarding and Access Cloud Connector and Cloud Resource Locations Cloud Migration Cloud Updates and Features Common Device Management Tasks Administrative Console Overview Delivery Groups Device Policies Device Enrollment Enrollment Methods iOS Device Enrollment Android Device Enrollment Windows 10 Enrollment Other Devices Managing Device Security Security Policies Automated Actions Android for Work ActiveSync Filtering Shared Devices Working with Apps Application Integration Citrix Endpoint Management Productivity Apps Application Security with MDX 3rd Part Applications Integrating Citrix Content Collaboration Citrix Content Collaboration Overview Integrating Citrix Endpoint Management with Content Collaboration Content Collaboration Workflows Maintaining and Troubleshooting Maintaining Citrix Endpoint Management Maintaining Certificates Troubleshooting Citrix Gateway (formerly NetScaler Gateway) Troubleshooting Tools for Citrix Productivity Apps Firewall Issues Monitoring and Reporting Monitoring and Reporting of Devices Monitoring and Reporting of Citrix Content Collaboration Additional course details: Nexus Humans CEM-205 Manage Citrix Endpoint Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CEM-205 Manage Citrix Endpoint Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developers Administrators Overview Understand why Blockchain is needed and where Explore the major components of Blockchain Learn about Hyperledger Fabric v1.1 and the structure of the Hyperledger Architecture Lean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership Services Perform comprehensive labs on writing chaincode Explore the architecture of Hyperledger Fabric v1.1 Understand and perform in depth labs on Bootstrapping the Network Gain a detailed understanding of the benefits, components and architecture of Hyperledger Composer Learn Hyperledger Explorer and Hyperledger Composer Playground Perform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contract Build applications on Hyperledger Fabric v1.1 This instructor-led Hyperledger training course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric and Hyperledger Composer. This Hyperledger training course has several comprehensive labs, giving you real world experience.In 3 days, you will learn the need for blockchain applications, where blockchain is used, and about Hyperledger Fabric, the open source framework for developing blockchain applications and solutions with a modular architecture. Introduction to Blockchain Introduction to Blockchain What is Blockchain Types of network Public network Permissioned network Private network Need for Blockchain Components of Blockchain Consensus Provenance Immutability Finality Where can Blockchain be used Example on Blockchain How Blockchain Works How Blockchain Works Structure of Blockchain Block Hash Blockchain Distributed Lifecycle of Blockchain Smart Contract Consensus Algorithm Proof of Work Proof of Stake Practical Byzantine Fault Tolerance Actors of Blockchain Blockchain developer Blockchain operator Blockchain regulator Blockchain user Membership service provider Building A Small Blockchain Application Introduction to Hyperledger Fabric v1.1 Introduction to Hyperledger What is Hyperledger Why Hyperledger Where can Hyperledger be used Hyperledger Architecture Membership Blockchain Transaction Chaincode Hyperledger Fabric Features of Hyperledger Fabric Installation of prerequisite Getting Started With Fabric Model The Fabric Model Features of Fabric Model Chaincode SDKs Ledger Privacy through channels Security and Membership services Assets Consensus Components of Fabric Model Peer Orderer Certificate Authority Building your network Chaincode Chaincode Chaincode API How to write a Chaincode Lab Work Architecture of Hyperledger Fabric v1.1 Architecture of Hyperledger Fabric Transaction Ledger Nodes Peer Endorser Ordering Nodes Channels Certificate Authority Transaction Flow Lab Work Bootstrapping Bootstrapping the Network Introduction Lab Work Task 1 - Generate the crypto material for the various participants. Task 2 - Generate the genesis block for the Orderer node and start ordering service (solo node). Task 3 - Generated the configuration transaction block to create a new channel. Task 4 - Sign the configuration block and create the new channel. Task 5 - Make peers of all the organizations join the channel that we created in Task 4 Introdcution to Hyperledger Explorer Introduction To Hyperledger Explorer Block Details Peer List Chaincode List Transaction Details Installation of Hyperledger Explorer Starting the Explorer App Introduction to Hyperledger Composer Introduction Components of Hyperledger Composer Benefits of Hyperledger Composer Key Concepts Hyperledger Composer Solution Installation Hyperledger Composer Playground Hyperledger Composer Playground Introduction Playground Overview Lab Work Additional course details: Nexus Humans Hyperledger Training - Developing on Hyperledger Fabric training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Hyperledger Training - Developing on Hyperledger Fabric course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview Please refer to course overview This course is designed to teach you how to:Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.Implement Db2 Self Tuning Memory management for specific database memory areas. Advanced MonitoringDb2 Table Space ManagementDb2 Database Memory ManagementDatabase rebuild supportDb2 database and tablespace relocationDb2 Incremental Backup