• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6225 Acro courses delivered Online

CUIC11.6AU-Cisco Unified Intelligence Center 11.6 for Advanced Users

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco technical customers (IT, telephony members, etc.) Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the CUIC High-Level Architecture and Deployment considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Describe the installation and function of both the Controller Node Member Nodes. CUIC Configurations as well as how to upgrade the product is discussed. Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Describe what a Value List is and its function in CUIC Describe how Value Lists are created Describe what a Collection is and when you would use it when running reports Describe what are Report Definitions Describe the creation of Report Definitions and how to build a new Report using the new Report Definition The Cisco Unified Intelligence Center 11.6 for Advanced Users v1.1 (CUIC11.6AU v1.1) course is a 2-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview for the Advanced User Understanding Cisco Unified Intelligence Center Deployment Considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Installing Cisco Unified Intelligence Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Using CUIC Value Lists and Collections as well as Report Definitions Using Value Lists and Collections Using Report Definitions

CUIC11.6AU-Cisco Unified Intelligence Center 11.6 for Advanced Users
Delivered OnlineFlexible Dates
Price on Enquiry

iOS Deployment Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This two-day course provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interactive discussions and hands-on exercises guide students through the configuration, management, and supervision of iOS devices. Students? knowledge and skills are tested and reinforced by working through real-world scenarios The Role of MDM, VPP, and DEP How to successfully deploy iOS devices Identify and respond to challenges when deploying and managing devices without MDM Apple IDs Explain what an Apple ID is and identify when it?s needed Security How security is relevant in the context of a given deployment scenario Design and implement a deployment solution for a given scenario DEP Devices Configure DEP registered devices for Over-the-Air Enrollment Configure and manage settings, apps, and content on user-owned and company-owned devicesPrerequisites Manual Configuration Explore the challenges and inconsistencies when manually configuring multiple devices. Creating Configuration profiles using Apple Configurator to view and edit a configuration profile. Learn how profiles ensure consistency across multiple devices Manage Settings The iOS MDM protocol How a MDM solution is used to configure and manage devices over-the-air with consistency and accountability Apps and Content Introduce and define VPP Assign apps and content to their user and then configure and test managed 'open in' functionality Company-Owned (Personalized and Shared) Configure settings to enable Over-the-Air Enrollment and supervision and learn how users can personalize company-owned devices. Configure and test shared (shared) device scenarios and how Apps and content are distributed to the devices Workshop Real-world deployment scenarios Design a deployment that meets your scenario?s needs

iOS Deployment Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response

VMware Carbon Black EDR Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Power BI Online

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The student should be familiar with Excel and the concepts of datasets and basic reporting. Overview Understand and utilize Power BI Online. Understand and examine the differences between Power BI Desktop and Power BI Online. Understand and explore the Power BI Online interface. Understand and perform importing Excel worksheets, CSV, TXT, PBIX. Understand connecting to databases. Understand other forms of data. Understand data refresh. Understand and perform creating a new Power BI report. Understand and perform adding filters to a report. Understand and perform adding KPI's to a report. Understand and perform creating a Power BI dashboard. Understand and perform pinning tiles. Understand sharing reports and dashboards. Understand Power BI Mobile. This Logical Operations courseware is no longer available on the LO Store, but can be purchased by phone orderThis one-day course familiarizes the student with Power BI Online, which allows the student to intuitively discover and automate the import, transformation, and combination of data across a variety of data sources. COURSE OVERVIEW Introduction Course Materials Facilities Prerequisites What We'll Be Discussing INTRODUCTION TO POWER BI ONLINE What is Power BI Online Examining the Differences Between Power BI Desktop and Power BI Online Exploring the Power BI Online Interface IMPORTING DATA Utilizing Excel (.xlsx or .xlsm), Comma Separated Value (.csv), and Power BI Desktop (.pbix) Files Connecting to Databases Examining Other Forms of Data Understanding Data Refresh CREATING REPORTS Creating a New Power BI Report Adding Filters to a Power BI Report Adding KPI?s to a Report CONFIGURING DASHBOARDS Creating a Power BI Dashboard Pinning Tiles SHARING REPORTS AND DASHBOARDS Sharing Reports and Dashboards Exploring Power BI Mobile

Microsoft Power BI Online
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for email digital marketers who manage the email channel for their organization. Whether you are new to Marketing Cloud or looking for tips on how to improve your existing customer journeys, this class is a great place to start. No prior knowledge of Marketing Cloud is needed. Overview When you complete this course, you will be able to: Explain compliance concepts to ensure optimal deliverability. Use tools within Marketing Cloud to uphold deliverability standards. Utilize Email Design best practices to ensure the best customer experience. Develop effective, relevant messages using Content Builder. Design and test different delivery methods and options when sending an email message. Design and execute customer journeys using automation tools within Marketing Cloud. Differentiate the use cases for different automation activities in Automation Studio and Journey Builder. Define fundamental data management and structure terminology. Use data segmentation tools to create targeted emails. Apply a simple data model concept to a real-world scenario. Define subscriber statuses, unsubscribe methods, and preferences. Analyze marketing campaigns using common KPIs. Solve a common marketing problem using troubleshooting guidance. Prioritize testing methods and tools to ensure quality control. Explain fundamental account and sending administration. Know where to go for more information, guidance, and support. Describe capabilities across the platform. Start your journey to becoming a Marketing Cloud Specialist. In this 5-day, expert-led class, you will learn how to build customer journeys within Marketing Cloud. Our team of Marketing Cloud pros will walk you through best practices related to executing, monitoring, and analyzing your journeys, arming you with the tools and know-how to design personalized journeys and engage with your customers in a whole new way. Course Outline Introduction to Salesforce Marketing Cloud Administration Subscriber and Data Management Email Message Design and Creation Message Testing, Delivery, and Email Marketing Best Practices Marketing Automation Analytics and Troubleshooting Summary

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)
Delivered OnlineFlexible Dates
Price on Enquiry

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Customers and systems operators that want to learn fundamental AOS concepts and navigate Prism on AHV. Junior IT administrators and business leaders who manage Nutanix clusters in the datacenter and want a formal, hands-on, detailed introduction to Nutanix datacenter administration. The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix?s Hybrid Cloud solution.Begin by exploring the history of this technology space, including different types of clouds, and how on-prem and public infrastructures came together to create hybrid operating models. Then, delve deeper into essential Nutanix products ? AOS, AHV, and Prism ? while discussing how these products were designed to solve business challenges.And conclude by discussing certain fundamental aspects involved in operating the Nutanix Hybrid Cloud, such as cluster updates, managing virtual machines, reporting and performance metrics, and more Module 1: Introduction Describe course terminology, such as three-tier architecture, hyperconverged architecture, and public, private, and hybrid clouds. Module 2: Understanding AOS Concepts Describe self-healing architecture Describe replication factor Describe Nutanix multicloud solutions Module 3: Understanding Cluster Management Concepts Explain Prism Element features and benefits Explain Prism Central features and benefits Manage the Image Repository Upgrade the hypervisor and AOS on a cluster Describe Life Cycle Manager. Module 4: Understanding Storage Concepts Define a storage pool and storage container Identify components of AOS Distributed Storage Identify space-saving technologies Module 5: Managing VMs Create and manage virtual machines (VMs) Add a VM to a category Describe Acropolis Dynamic Scheduler (ADS) Describe data locality Module 6: Monitoring VMs and Cluster Health Use metrics to identify performance issues Measure VM performance using Nutanix tools: Health dashboard, Analysis dashboard, Alerts dashboard Use the Support Portal and Insights Module 7:Understanding Data Protection Concepts Describe how to enable data protection on a VM Define a retention policy Define Nutanix Mine Identify the different types of replication targets

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)
Delivered OnlineFlexible Dates
Price on Enquiry

Docker Fundamentals Plus Enterprise Operations Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server

Docker Fundamentals  Plus Enterprise Operations Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

JMR - Junos Multicast Routing

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. This course benefits individuals responsible for implementing, monitoring, and troubleshooting multicast components in a service provider's network. Overview Identify the components of IP multicast Explain how IP multicast addressing works Identify the need for reverse path forwarding (RPF) in multicast Explain the role of IGMP and describe the available IGMP versions Configure and monitor IGMP Explain the differences between dense-mode and sparse-mode protocols Describe rendezvous point (RP) discovery options Configure and monitor PIM dense and sparse modes Configure and monitor rendezvous point discovery mechanisms Explain the purpose and operation of MSDP Describe the usage of MSDP within a single PIM domain with Anycast RP Describe the usage of MSDP across multiple PIM domains Configure and monitor MSDP Compare the any-source multicast (ASM) and source-specific multicast (SSM) service models Describe the basic requirements, benefits, and caveats of SSM List the address ranges used for SSM Illustrate the role of IGMPv3 and PIM-SM in an SSM implementation Configure and monitor SSM Describe the default PIM sparse mode information distribution Explain how routing policies alter PIM message traffic Describe how MSDP advertises messages to established peers Identify the role of a policy in controlling MSDP message advertisement Explain how you can use a policy to scope multicast groups This two-day course is designed to provide students with detailed coverage of multicast protocol. Course IntroductionIntroduction to Multicast Overview of Multicast Multicast Addresses Reverse Path Forwarding Internet Group Management Protocol Multicast Routing Protocols Overview of Multicast Routing Protocols PIM-DM PIM-SM MSDP MSDP Anycast RP Source-Specific Multicast Overview of SSM Operation SSM Addresses IGMPv3 and SSM PIM-SM and SSM SSM Case Study Multicast and Policy Multicast and Policy Overview Controlling PIM Join and Register Messages Controlling BSR Messages Controlling MSDP SA Messages Implementing Multicast Scoping

JMR - Junos Multicast Routing
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 1 Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

Enterprise Linux System Admin 1 Essentials
Delivered OnlineFlexible Dates
Price on Enquiry