Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features
Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring
Duration 1 Days 6 CPD hours This course is intended for This course is for employees of Sun Life who want to expand their skills when using HUE to work with SQL databases. Overview Upon successful completion of this course, students will be able to better operate HUE when interacting with SQL databases. In this course, students will learn additional skills when using HUE to interact with SQL databases. Using Subqueries to Perform Advanced Querying Search Based on Unknown Values Compare a Value with Unknown Values Search Based on the Existence of Records Generate Output Using Correlated Subqueries Filter Grouped Data Within Subqueries Perform Multiple-Level Subqueries Manipulating Table Data Insert Data Modify and Delete Data Manipulating the Table Structure Create a Table Create a Table with Constraints Modify a Table's Structure Back Up Tables Delete Tables Working with Views Create a View Manipulate Data in Views Create Aliases Modify and Delete Views Indexing Data Create Indexes Drop Indexes Managing Transactions Create Transactions Commit Transactions
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 3 Days 18 CPD hours This course is intended for This advanced course is for Infrastructure Specialist, Senior Technical Specialist,Technical Specialist, Support Engineers, and System Architects. Overview Understand the MDM Architecture and how the Physical, Virtual and Hybrid MDM handles a service request Understand the core Workbench features available for the InfoSphere MDM Understand how MDM using OSGi for deploying customizations to the product Create a new Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Service using the Workbench Wizard Create a new Composite Service using a transiant object containing other existing business objects Customize and deploy a Virtual configuration Create a new Virtual Callout Handler Create a new Virtual Composite View Generate new Services based on the Virtual configuration (eSOA) Customize a Hybrid MDM implementation Understand the Adaptive Service Interface (ASI) This course is designed for anyone who wants to get an understanding of how to use and customize the InfoSphere Master Data Management using the InfoSphere MDM Workbench InfoSphere MDM Architecture . OSGi and MDM . Data Additions . Physical Data Extensions . MDM Physical Behavior Extensions . Composite Services . Adaptive Services Interface (ASI) . Virtual Data Model . Virtual Handlers . eSOA Toolkit . Hybrid MDM .
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Course Objectives Identify the basic components and operations of the Unified CCE solution. Configure and script a basic UCCE CVP deployment. Perform the ICM configuration tasks required to support basic agent functionality. Build and test a basic ICM script utilizing microapps. Configure and script UCCE to support reporting requirements, precision queuing and RONA. Identify how to successfully deploy the CVP VXML component in a Unified CCE solution. Generate basic reports using Cisco Unified IC. The Administering Cisco Unified Contact Center Enterprise Part 1 (AUCCE1) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course describes the requirements, resources and tools needed to perform routine adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those administering the solution, or who may be responsible for Level 1-2 support of the solution. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: UCCE Configuration and Scripting Module 3: Unified CCE Inbound Agent Considerations Module 4: Unified CCE IVR/VRU Functionality Module 5: Additional UCCE Considerations Module 6: VXML Implementation Module 7: Cisco Unified Intelligence Center Reporting
NR Medical Training offers the Qualsafe First Response Emergency Care (FREC 3) Level 3 RQF, a nationally accredited qualification ideal for anyone aspiring to be a first responder. This course is tailored for a wide range of professionals, including police officers, firefighters, and event medical staff, as well as roles like Emergency/Community First Responders, Door Supervisors, and Security Guards.