Duration 5 Days 30 CPD hours This course is intended for This class is designed for email digital marketers who manage the email channel for their organization. Whether you are new to Marketing Cloud or looking for tips on how to improve your existing customer journeys, this class is a great place to start. No prior knowledge of Marketing Cloud is needed. Overview When you complete this course, you will be able to: Explain compliance concepts to ensure optimal deliverability. Use tools within Marketing Cloud to uphold deliverability standards. Utilize Email Design best practices to ensure the best customer experience. Develop effective, relevant messages using Content Builder. Design and test different delivery methods and options when sending an email message. Design and execute customer journeys using automation tools within Marketing Cloud. Differentiate the use cases for different automation activities in Automation Studio and Journey Builder. Define fundamental data management and structure terminology. Use data segmentation tools to create targeted emails. Apply a simple data model concept to a real-world scenario. Define subscriber statuses, unsubscribe methods, and preferences. Analyze marketing campaigns using common KPIs. Solve a common marketing problem using troubleshooting guidance. Prioritize testing methods and tools to ensure quality control. Explain fundamental account and sending administration. Know where to go for more information, guidance, and support. Describe capabilities across the platform. Start your journey to becoming a Marketing Cloud Specialist. In this 5-day, expert-led class, you will learn how to build customer journeys within Marketing Cloud. Our team of Marketing Cloud pros will walk you through best practices related to executing, monitoring, and analyzing your journeys, arming you with the tools and know-how to design personalized journeys and engage with your customers in a whole new way. Course Outline Introduction to Salesforce Marketing Cloud Administration Subscriber and Data Management Email Message Design and Creation Message Testing, Delivery, and Email Marketing Best Practices Marketing Automation Analytics and Troubleshooting Summary
Duration 2 Days 12 CPD hours This course is intended for Customers and systems operators that want to learn fundamental AOS concepts and navigate Prism on AHV. Junior IT administrators and business leaders who manage Nutanix clusters in the datacenter and want a formal, hands-on, detailed introduction to Nutanix datacenter administration. The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix?s Hybrid Cloud solution.Begin by exploring the history of this technology space, including different types of clouds, and how on-prem and public infrastructures came together to create hybrid operating models. Then, delve deeper into essential Nutanix products ? AOS, AHV, and Prism ? while discussing how these products were designed to solve business challenges.And conclude by discussing certain fundamental aspects involved in operating the Nutanix Hybrid Cloud, such as cluster updates, managing virtual machines, reporting and performance metrics, and more Module 1: Introduction Describe course terminology, such as three-tier architecture, hyperconverged architecture, and public, private, and hybrid clouds. Module 2: Understanding AOS Concepts Describe self-healing architecture Describe replication factor Describe Nutanix multicloud solutions Module 3: Understanding Cluster Management Concepts Explain Prism Element features and benefits Explain Prism Central features and benefits Manage the Image Repository Upgrade the hypervisor and AOS on a cluster Describe Life Cycle Manager. Module 4: Understanding Storage Concepts Define a storage pool and storage container Identify components of AOS Distributed Storage Identify space-saving technologies Module 5: Managing VMs Create and manage virtual machines (VMs) Add a VM to a category Describe Acropolis Dynamic Scheduler (ADS) Describe data locality Module 6: Monitoring VMs and Cluster Health Use metrics to identify performance issues Measure VM performance using Nutanix tools: Health dashboard, Analysis dashboard, Alerts dashboard Use the Support Portal and Insights Module 7:Understanding Data Protection Concepts Describe how to enable data protection on a VM Define a retention policy Define Nutanix Mine Identify the different types of replication targets
Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server
Duration 2 Days 12 CPD hours This course is intended for This certification is appropriate for anyone who is interested in working as a Scrum Master or for someone who is already a Scrum master in his organization. Scrum Master is an important role in any Scrum team and need not be a technology expert to be effective. Moreover, although Scrum is popular in the IT industry, it can be used effectively across different industries. The SBOK Guide, on which the SMC course is based on, can be used as an effective guide for implementation. Overview The participants will be prepared to take SMC⢠certification exam and pass. Also they will be able to apply the concepts in their day to day job. This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Introduction Course Objectives Course Methodology Certification Schema Exam Format Overview of Agile Agile Manifesto Agile Principles What has Changed Agile Methods Overview of Scrum Definition and brief history of Scrum Why Scrum Scrum vs. Traditional Project Management Benefits of Scrum Overview of A Guide to the Scrum Body of Knowledge (SBOK? Guide) Framework of the SBOK? Guide Who uses the SBOK? Guide How to use the SBOK? Guide Scrum Flow Principles Empirical Process Control Self-organization Collaboration Value-based Prioritization Time-boxing Iterative Development Scrum Aspects Organization Business Justification Quality Change Risk Scrum Phases and Processes Initiate Plan and Estimate Implement Review and Retrospect Release Scaling Scrum Scaling Scrum for Large Projects Scaling Scrum for the Enterprise Transition to Scrum Mapping Traditional Roles To Scrum Maintaining Stakeholder Involvement Importance Of Executive Support
Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. This course benefits individuals responsible for implementing, monitoring, and troubleshooting multicast components in a service provider's network. Overview Identify the components of IP multicast Explain how IP multicast addressing works Identify the need for reverse path forwarding (RPF) in multicast Explain the role of IGMP and describe the available IGMP versions Configure and monitor IGMP Explain the differences between dense-mode and sparse-mode protocols Describe rendezvous point (RP) discovery options Configure and monitor PIM dense and sparse modes Configure and monitor rendezvous point discovery mechanisms Explain the purpose and operation of MSDP Describe the usage of MSDP within a single PIM domain with Anycast RP Describe the usage of MSDP across multiple PIM domains Configure and monitor MSDP Compare the any-source multicast (ASM) and source-specific multicast (SSM) service models Describe the basic requirements, benefits, and caveats of SSM List the address ranges used for SSM Illustrate the role of IGMPv3 and PIM-SM in an SSM implementation Configure and monitor SSM Describe the default PIM sparse mode information distribution Explain how routing policies alter PIM message traffic Describe how MSDP advertises messages to established peers Identify the role of a policy in controlling MSDP message advertisement Explain how you can use a policy to scope multicast groups This two-day course is designed to provide students with detailed coverage of multicast protocol. Course IntroductionIntroduction to Multicast Overview of Multicast Multicast Addresses Reverse Path Forwarding Internet Group Management Protocol Multicast Routing Protocols Overview of Multicast Routing Protocols PIM-DM PIM-SM MSDP MSDP Anycast RP Source-Specific Multicast Overview of SSM Operation SSM Addresses IGMPv3 and SSM PIM-SM and SSM SSM Case Study Multicast and Policy Multicast and Policy Overview Controlling PIM Join and Register Messages Controlling BSR Messages Controlling MSDP SA Messages Implementing Multicast Scoping
Duration 5 Days 30 CPD hours This course is intended for This course is designed for business analysts. Overview After completing this course, you should be able to:Describe the benefits of implementing an Operational Decision Manager solution, and the collaboration that is required between the business and development teamsIdentify the main user roles that are involved in designing and developing an Operational Decision Manager solution, and the tasks that are associated with each roleExplain modeling concepts and the UML notation that is relevant to modeling for business rules and eventsDefine and implement object models for business rulesSet up the rule authoring environment in Designer by working with decision services and synchronizing across development and business environmentsCustomize the vocabulary that is used in rulesDiscover and analyze business rules for implementationUse the Operational Decision Manager rule editors to author business rules and decision tablesRun tests and simulations in the Decision Center Enterprise console to validate decision logic and rule changesExplain governance issues and work with Operational Decision Manager features that support decision governance This course introduces business analysts to IBM Operational Decision Manager V8.7.1. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager. Course Outline Course introduction Introducing IBM Operational Decision Manager V8.7.1 Exercise: Operational Decision Manager in action Modeling for business rules Exercise: Building the model on paper Exercise: Implementing the model Understanding decision services Exercise: Setting up a decision service Working with the BOM Exercise: Working with the BOM Introducing Decision Center Exercise: Exploring the Decision Center Business console Exercise: Exploring the Decision Center Enterprise console Introducing rule authoring Exercise: Understanding the case study Discovering and analyzing rules Exercise: Discovering rules Exercise: Analyzing rules Working with conditions in rules Exercise: Working with conditions in rules Working with definitions in rules Exercise: Working with definitions in rules Writing complete rules Exercise: Writing complete rules Authoring decision tables and trees Exercise: Authoring decision tables and trees Exercise: Authoring rules: Putting it all together Running tests and simulations in the Enterprise console Exercise: Running tests and simulations in the Enterprise console Introducing decision governance Exercise: Working with the decision governance framework Course summary
Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for business users, educators, students, and knowledge workers in a variety of roles and fields who want to be able to use the apps included in Google Workspace to create and manage various types of files and communicate and collaborate with colleagues. Overview In this course, you will use the various apps included in Google Workspace to work productively as part of a team. You will: Navigate the Google Workspace environment and use Gmail to send and manage email correspondence. Manage schedules using Google Calendarâ¢. Communicate with colleagues over text, voice, and video using Google Chat and Google Meet. Store and share files using Google Drive. Collaborate on documents using Google Docs, Google Slidesâ¢, and Google Keepâ¢. Collaborate on data using Google Sheets and Google Formsâ¢. Collaborate on websites using Google Sitesâ¢. The core productivity apps that make up the Google Workspace? suite enable users to work together on a variety of projects and tasks across many different industries and job roles. This course will teach you how to work efficiently and effectively in apps like Gmail?, Google Drive?, Google Docs?, Google Sheets?, Google Meet?, Google Chat?, and more?all while participating in a collaborative team environment. Lesson 1:Getting Started with Google Workspace Topic A: Navigate Google Workspace Topic B: Send and Manage Email Using Gmail Lesson 2:Managing Schedules Using Google Calendar Topic A: Create and Manage Events Topic B: Customize Calendars Topic C: Create and Share Calendars Topic D: Create and Manage Tasks Lesson 3:Communicating Using Google Chat and Google Meet Topic A: Chat Using Google Chat Topic B: Participate in Meetings Using Google Meet Lesson 4:Storing and Sharing Files Using Google Drive Topic A: Add Files and Folders Topic B: Manage Files and Folders Lesson 5:Collaborating on Documents Using Docs, Slides, and Keep Topic A: Create and Edit Documents Using Google Docs Topic B: Design Presentations Using Google Slides Topic C: Take Notes Using Google Keep Lesson 6:Collaborating on Data Using Sheets and Forms Topic A: Create and Manage Spreadsheets Using Google Sheets Topic B: Design Surveys Using Google Forms Lesson 7:Collaborating on Websites Using Sites Topic A: Create and Edit Sites Topic B: Share and Publish Sites
Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence