Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people who have a basic understanding of Microsoft© Outlook© and want to know how to use its advanced features to manage their email communications, calendar events, contact information, search functions, and other communication tasks. Overview In this course, you will use Outlook?s advanced features to customize and manage your email communications, including using advanced features to organize emails; managing calendar settings and options; managing contact information; scheduling tasks; and managing Outlook archives and data file settings. You will: Insert objects in messages, and modify properties and global options. Organize, search, and manage messages. Protect your mailbox and manage its size. Use rules and Quick Steps to automate message management. Work with advanced calendar settings. Import and forward contacts. Assign delegate permissions and share Outlook items with others. Archive and back up Outlook items using data files. In this course, you will customize command sets, configure mail accounts, set global options, perform advanced searches, apply filters to intercept mail and control spam, create rules to automate mail management tasks, work with calendars and contacts, manage tasks, preserve data with archives and data files, as well as share and delegate access to your Outlook items. In short, you'll work with a wide range of features and options and, in so doing, understand why Outlook is a leading personal management system.This course builds upon the foundational knowledge presented in the Microsoft© Outlook© for Office 365? (Desktop or Online): Part 1 course and will help you customize a communication system well-suited to your work style.This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Outlook Associate (Office 365 and Office 2019): Exam MO-400 . Modifying Message Properties and Customizing Outlook Topic A: Insert Hyperlinks and Symbols Topic B: Modify Message Properties Topic C: Add Email Accounts to Outlook Topic D: Customize Outlook Options Organizing, Searching, and Managing Messages Topic A: Group and Sort Messages Topic B: Filter and Manage Messages Topic C: Search Outlook Items Managing Your Mailbox Topic A: Manage Junk Email Options Topic B: Manage Your Mailbox Size Automating Message Management Topic A: Use Automatic Replies Topic B: Use Rules to Organize Messages Topic C: Create and Use Quick Steps Working with Calendar Settings Topic A: Set Advanced Calendar Options Topic B: Create and Manage Additional Calendars Topic C: Manage Meeting Responses Managing Contacts Topic A: Import and Export Contacts Topic B: Use Electronic Business Cards Topic C: Forward Contacts Sharing Outlook Items Topic A: Assign and Manage Tasks Topic B: Share Your Calendar Topic C: Share Your Contacts Managing Outlook Data Files Topic A: Use Archiving to Manage Mailbox Size Topic B: Work with Outlook Data Files
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. Migrate virtual machines Migrate and control automatic migration of virtual machines. Manage virtual machine images Manage virtual machine snapshots and disk images. Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project
Duration 5 Days 30 CPD hours This course is intended for Students preparing to take the CCNP Collaboration certification Network administrators Network engineers Systems engineers Overview After taking this course, you should be able to: Describe the Cisco Collaboration solutions architecture Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP) Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication Implement Cisco Unified Communications Manager provisioning features Describe the different codecs and how they are used to transform analogue voice into digital streams Describe a dial plan, and explain call routing in Cisco Unified Communications Manager Implement Public Switched Telephone Network (PSTN) access using MGCP gateways Implement a Cisco gateway for PSTN access Configure calling privileges in Cisco Unified Communications Manager Implement toll fraud prevention Implement globalized call routing within a Cisco Unified Communications Manager cluster Implement and troubleshoot media resources in Cisco Unified Communications Manager Describe Cisco Instant Messaging and Presence, including call flows and protocols Describe and configure endpoints and commonly required features Configure and troubleshoot Cisco Unity Connection integration Configure and troubleshoot Cisco Unity Connection call handlers Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic Define QoS and its models Implement classification and marking Configure classification and marking options on Cisco Catalyst switches The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) v1.1 course helps you prepare for advanced-level roles focused on implementation and operation of Cisco collaboration solutions. You will gain the knowledge and skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS©) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.This course helps prepare you to take the exam:350-801 Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)After you pass this exam, you earn Cisco Certified Specialist - Collaboration Core certification and satisfy the core requirement for these certifications:CCNP CollaborationCCIE CollaborationThis course prepares you for the 300-435 Automating Cisco Enterprise Solutions (ENAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Enterprise Solutions (ENAUI) because it provides crucial foundational knowledge essential to success. Course Outlines Describing the Cisco Collaboration Solutions Architecture Exploring Call Signaling over IP Networks Integrating Cisco Unified Communications Manager LDAP Implementing Cisco Unified Communications Manager Provisioning Features Exploring Codecs Describing Dial Plans and Endpoint Addressing Implementing MGCP Gateways Implementing Voice Gateways Configuring Calling Privileges in Cisco Unified Communications Manager Implementing Toll Fraud Prevention Implementing Globalized Call Routing Implementing and Troubleshooting Media Resources in Cisco Unified Communications Manager Describing Cisco Instant Messaging and Presence Enabling Cisco Jabber© Configuring Cisco Unity Connection Integration Configuring Cisco Unity Connection Call Handlers Describing Collaboration Edge Architecture Analyzing Quality Issues in Converged Networks Defining QoS and QoS Models Implementing Classification and Marking Configuring Classification and Marking on Cisco Catalyst Switches
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions architects and cloud architects seeking their AWS Certified Solutions Architect - Associate certification Customers and APN Partners who have 6 to 12 months of experience with AWS including a strong architecture background and experience Individuals who prefer an instructor led course for training and exam readiness Individuals who have not taken the Architecting on AWS course in the last ~6 months Overview In this course, you will learn to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly available Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well-Architected Framework to improve architectures with AWS solutions Navigate the logistics of the examination process, exam structure, and question types Identify how questions relate to AWS architectural concepts Interpret the concepts being tested by an exam question This five-day, instructor-led course helps busy architects get away from the day-to-day to get focused and ready for their AWS Certified Solutions Architect ? Associate exam. Attendees learn the fundamentals of building IT infrastructure on AWS, so they can build scalable and resilient solutions in the cloud, by spending the first 3 days on the Architecting on AWS course. They?ll start getting in the exam readiness mindset with bonus end of module quizzes. Next, they?ll learn strategies to answer exam questions and avoid common mistakes with the Exam Readiness: AWS Certified Solutions Architect ? Associate half-day course. The course broadens attendees? knowledge of AWS services with deep dives into Amazon Redshift, Amazon Kinesis, and AWS Key Management Service, and then concludes with two quizzes and an instructor guided review of the AWS Certified Solutions Architect ? Associate practice exam. Architecting on AWS Module 1: Introduction Module 2: The Simplest Architectures Hands-On Lab 1: Hosting a Static Website Module 3: Adding a Compute Layer Module 4: Adding a Database Layer Hands-On Lab 2: Deploying a Web Application on AWS Module 5: Networking in AWS Part 1 Hands-On Lab 3: Creating a Virtual Private Cloud Architecting on AWS (continued) Module 6: Networking in AWS Part 2 Module 7: AWS Identity and Access Management (IAM) Module 8: Elasticity, High Availability, and Monitoring Hands-On Lab 4: Creating a Highly Available Environment Module 9: Automation Hands-On Lab 5: Automating Infrastructure Deployment with AWS CloudFormation Module 10: Caching Architecting on AWS (continued) Module 11: Building Decoupled Architectures Module 12: Microservices and Serverless Architectures Hands-On Lab 6: Implementing a Serverless Architecture with AWS Managed Services Module 13: RTP/RPO and Backup Recovery Setup Module 14: Optimizations and Review Exam Readiness: AWS Certified Solutions Architect -- Associate Module 0: The Exam Module 1: Design Resilient Architectures Module 2: Design Performant Architectures Module 3: Specify Secure Applications and Architectures Module 4: Design Cost-Optimized Architectures Module 5: Define Operationally Excellent Architectures Exam Readiness Additional deep dive of AWS services Quiz #1 Practice exam: AWS Certified Solutions Architect ? Associate Quiz #2 Wrap-up
Duration 2 Days 12 CPD hours This course is intended for #NAME? Overview The learning objectives for CDA include a practical understanding of: Goals, history, terminology, and pipeline The importance, practices, and transformation of a DevOps collaborative culture Design practices, such as modular design and microservices Continuous Integration (Cl), such as version control, builds, and remediation Tenets and best practices of Continuous Testing (CT) Continuous Delivery and Deployment (CD): packaging, containers, and release Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps Infrastructure and tools: frameworks, tools, and infrastructure as code Security Assurance: DevSecOps The opportunity to hear and share real-life scenarios This course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APls and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.This course prepares you for the Continuous Delivery Ecosystem Foundation(CDEF) certification. Course Introduction Course goals Course agenda CDA Concepts Continuous delivery (CD) definition Architecting for continuous delivery Continuous delivery and DevOps Relationships between CD, Waterfall, Agile, ITIL, and DevOps Benefits of continuous delivery CDA Culture Importance of culture to the CD Architect What a CD Architect can do about culture How to maintain culture Assignment: DevOps culture and practices to create flow Design Practices for Continuous Delivery Why design is important to continuous delivery CD Architect?s role in design Key design principles CD best practices Microservices and containers Continuous Integration Continuous integration (CI) defined CD Architect?s role in CI Importance of CI Benefits of CI CI best practices Assignment: Optimizing CI workflows Continuous Testing Continuous testing (CT) defined Importance of CT Benefits of CT CD Architect?s role in CT Five tenets of CT CT best practices Assignment: Handling environment inconsistencies Continuous Delivery and Deployment Continuous delivery defined Continuous deployment defined Benefits of continuous delivery and deployment CD Architect?s role in continuous delivery and deployment Continuous delivery and deployment best practices Assignment: Distinguishing continuous delivery and deployment Continuous Monitoring Continuous monitoring defined Importance of continuous monitoring CD Architect?s role in continuous monitoring Continuous monitoring best practices Assignment: Monitoring build progress Infrastructure and Tools Importance of infrastructure and tools CD Architect?s role in infrastructure and tools Building a DevOps toolchain Infrastructure/tools best practices Assignment: identifying common infrastructure/tool components Security Assurance Importance of security assurance DevSecOps and Rugged DevOps defined CD Architect?s role in security Security best practices Assignment: Applying security practices Capstone exercise Identifying toolchain and workflow improvements Summary Additional Sources of Information Exam Preparations Exam requirements Sample exam review
Duration 2 Days 12 CPD hours This course is intended for Report Authors Overview Create query models Create reports based on query relationships Introduction to dimensional data Introduction to dimensional data in reports Dimensional report context Focus your dimensional data Calculations and dimensional functions Create advanced dynamic reports This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity. Create query models Build a query and connect it to a report Answer a business question by referencing data in a separate query Create reports based on query relationships Create join relationships between queries Combine data containers based on relationships from different queries Create a report comparing the percentage of change Introduction to dimensional reporting concepts Examine data sources and model types Describe the dimensional approach to queries Apply report authoring styles Introduction to dimensional data in reports Use members to create reports Identify sets and tuples in reports Use query calculations and set definitions Dimensional report context Examine dimensional report members Examine dimensional report measures Use the default measure to create a summarized column in a report Focus your dimensional data Focus your report by excluding members of a defined set Compare the use of the filter() function to a detail filter Filter dimensional data using slicers Calculations and dimensional functions Examine dimensional functions Show totals and exclude members Create a percent of base calculation Create advanced dynamic reports Use query macros Control report output using a query macro Create a dynamic growth report Create a report that displays summary data before detailed data and uses singletons to summarize information Design effective prompts Create a prompt that allows users to select conditional formatting values Create a prompt that provides users a choice between different filters Create a prompt to let users choose a column sort order Create a prompt to let users select a display type Examine the report specification Examine report specification flow Identify considerations when modifying report specifications Customize reporting objects Distribute reports Burst a report to email recipients by using a data item Burst a list report to the IBM Cognos Analytics portal by using a burst table Burst a crosstab report to the IBM Cognos Analytics portal by using a burst table and a master detail relationship Enhance user interaction with HTML Create interactive reports using HTML Include additional information with tooltips Send emails using links in a report Introduction to IBM Cognos Active Reports Examine Active Report controls and variables Create a simple Active Report using Static and Data-driven controls Change filtering and selection behavior in a report Create interaction between multiple controls and variables Active Report charts and decks Create an Active Report with a Data deck Use Master detail relationships with Decks Optimize Active Reports Create an Active Report with new visualizations