Duration 3 Days 18 CPD hours This course is intended for This advanced course is for Infrastructure Specialist, Senior Technical Specialist,Technical Specialist, Support Engineers, and System Architects. Overview Understand the MDM Architecture and how the Physical, Virtual and Hybrid MDM handles a service request Understand the core Workbench features available for the InfoSphere MDM Understand how MDM using OSGi for deploying customizations to the product Create a new Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Service using the Workbench Wizard Create a new Composite Service using a transiant object containing other existing business objects Customize and deploy a Virtual configuration Create a new Virtual Callout Handler Create a new Virtual Composite View Generate new Services based on the Virtual configuration (eSOA) Customize a Hybrid MDM implementation Understand the Adaptive Service Interface (ASI) This course is designed for anyone who wants to get an understanding of how to use and customize the InfoSphere Master Data Management using the InfoSphere MDM Workbench InfoSphere MDM Architecture . OSGi and MDM . Data Additions . Physical Data Extensions . MDM Physical Behavior Extensions . Composite Services . Adaptive Services Interface (ASI) . Virtual Data Model . Virtual Handlers . eSOA Toolkit . Hybrid MDM .
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Course Objectives Identify the basic components and operations of the Unified CCE solution. Configure and script a basic UCCE CVP deployment. Perform the ICM configuration tasks required to support basic agent functionality. Build and test a basic ICM script utilizing microapps. Configure and script UCCE to support reporting requirements, precision queuing and RONA. Identify how to successfully deploy the CVP VXML component in a Unified CCE solution. Generate basic reports using Cisco Unified IC. The Administering Cisco Unified Contact Center Enterprise Part 1 (AUCCE1) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course describes the requirements, resources and tools needed to perform routine adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those administering the solution, or who may be responsible for Level 1-2 support of the solution. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: UCCE Configuration and Scripting Module 3: Unified CCE Inbound Agent Considerations Module 4: Unified CCE IVR/VRU Functionality Module 5: Additional UCCE Considerations Module 6: VXML Implementation Module 7: Cisco Unified Intelligence Center Reporting
NR Medical Training offers the Qualsafe First Response Emergency Care (FREC 3) Level 3 RQF, a nationally accredited qualification ideal for anyone aspiring to be a first responder. This course is tailored for a wide range of professionals, including police officers, firefighters, and event medical staff, as well as roles like Emergency/Community First Responders, Door Supervisors, and Security Guards.
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Manage and configure the Carbon Black App Control sever based on organizational requirements. Implement rules to support business processes and automatic approvals. Identify scenarios and use cases for Custom rules and Event rules. Describe common troubleshooting scenarios for the Carbon Black App Control server. Describe common troubleshooting scenarios for the Carbon Black App Control Windows agent. This course teaches you how to configure and scope the rules within VMware Carbon Black© App ControlTM product to maintain the system according to your organization?s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Custom Rules Basics Execute / Write action rules Precedence Paths tom Rules Best Practices Rule Triad Rule multiplication Rule Types Custom rule type overview Optimizing Custom Rules Evaluating events Event Rules Creating and editing Testing before implementing Creating and editing Testing before implementing Server versus agent issues Server Capabilities Tools, logs, common issues, scenarios Agent Capabilities Tools, logs, common issues, scenarios
Duration 5 Days 30 CPD hours This course is intended for Network Video Operator and Administrator Voice / UC / Collaboration / Communications Engineer Collaboration Tools Engineer Collaboration Sales / Systems Engineer Overview Upon completing this course, the learner will be able to meet these overall objectives: Install, configure, maintain, and troubleshoot Cisco visual collaboration solutions. This course assists the student in preparing for the Cisco TelePresence Video Specialist Certification. Upon completing this course, the learner will be able to meet these overall objectives Module 1: Advanced Cisco Expressway Features Introducing Cisco video network solutions Exploring Cisco Expressway basic setup Explaining regular expressions in a Cisco Expressway environment Deploying components of Cisco Expressway Security Exploring the fundamentals of subzonesÿ Administering call control Implementing subzone bandwidth management Implementing zones Exploring clustering Applying troubleshooting Module 2: Advanced Cisco Meeting Server Features Introducing the Cisco meeting server Exploring API configuration Exploring resilient and scalable deployments Additional features Module 3: Cisco Collaboration Meeting Room Solutions with Cisco TelePresence Server Introducing Collaboration Meeting Room cloud, premises, and hybrid products Deploying the TelePresence Server and TelePresence conductor Applying troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite (TMS) Solution Explaining Cisco TMS Installation Describing TMS operation Explaining TMS conference scheduling and management Configuring permissions Applying troubleshooting Module 5: Cisco Cloud Solutions - WebEx and Spark Introducing WebEx and Spark cloud solutions Exploring Spark administration configuration Deploying Spark hybrid services Exploring Spark APIs and BOTs configuration Module 6: Cisco TelePresence Content Server (Optional Module) Examining Cisco TCS operation and configuration
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 2 Days 12 CPD hours This course is intended for Project Managers, Business Analysts, Business and IT stakeholders working with analysts Overview Provide a solid foundation for applying business process modeling principles and best practices with BPMN Demonstrate how to solve practical business problems using BPMN Business Process Diagrams (BPDs) Students will learn to map business processes easily and efficiently using the industry standard - BPMN which stands for Business Process Modeling Notation from the Object Management Group (OMG). Students will learn the best practices in process mapping using the latest industry standards (BPMN) so that both the business and IT stakeholders will be able to understand the models and map processes consistently through-out their organization. Introduction What is Business Process Modeling? What is Business Process Modeling Notation (BPMN)? Benefits of BPMN An Overview of Governance An overview of governance Key governance questions to ask What happens if you don?t have effective governance? Mapping the Business Problem Define a strategic outcomes map Define a Business model and relevant processes Modeling Simple BPMN Structures When do you use BPMN? What are simple BPMN structures? AS-IS vs. TO-BE modeling Modeling Complex BPMN Structures What are complex BPMN structures When to use complex BPMN structures Analyzing Process Models Identifying poor process models Creating process models that everyone can understand Identify criteria for a well-defined process Process Mapping vs. Process Modeling Determine when to create a process map Determine when to create a process model Asking the four ?Ares? Additional Resources Learning about BPMN 2.0 More useful BPMN links BPMN 2.0 free editors
Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection
Duration 5 Days 30 CPD hours This course is intended for Data center systems engineers Field engineers Architects Cisco partners using Cisco Nexus Series switch platforms Overview After taking this course, you should be able to: Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families Describe Cisco Nexus platform implementations Explain Cisco Nexus platform management Describe Port Channels and Virtual Port Channels Configure First Hop Redundancy protocols Configure security features of Cisco Nexus devices Describe the Cisco Nexus devices routing and forwarding Describe Virtual Extensible LAN (VXLAN) Describe Quality of Service (QoS) on Cisco Nexus Devices Explain system management and monitoring processes Describe Cisco NX-OS programmability Describe Cisco Nexus storage services Configure device aliases and zoning Configure FCoE Configure NPIV and NPV modes The Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the CiscoNexus switch platform and teach you how to install, configure, and manage Cisco Nexusswitch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes. Course Outline Describing Cisco Nexus Series Switches Describing Cisco Nexus Platforms Implementation Describing Cisco Nexus Platforms Management Describing Port Channels and Virtual Port Channels Configuring First Hop Redundancy Protocols Configuring Cisco Nexus Security Features Describing Cisco NX-OS Routing and Forwarding Describing Virtual Extensible LAN Describing QoS on Cisco Nexus Devices Configuring System Management and Monitoring Describing Cisco NX-OS Programmability Describing Cisco Nexus Storage Services Configuring Fibre Channel Over Ethernet Describing Device Aliases and Zoning Configuring NPIV and NPV Modes