MySQL Performance & Tuning training course description This MySQL Performance & Tuning course is designed for Database Administrators, Application Developers and Technical Consultants who need to monitor and tune the performance of MySQL servers and databases. The course provides practical experience in monitoring and tuning MySQL servers and databases. Note: This MySQL Performance & Tuning course does not cover clustering (other than at overview level), replication or non-standard storage engines such as Falcon and PBXT. What will you learn Develop a monitoring and tuning plan Use server configuration and status variables. Identify and improve problem queries. Make efficient use of indexes. Monitor and size memory caches and locks. Tune the MyISAM and InnoDB storage engine. Evaluate the use of partitioning for performance. MySQL Performance & Tuning training course details Who will benefit: Anyone who wishes to monitor and tune MySQL performance. Prerequisites: Delegates must have a working knowledge of MySQL Database Administration Duration 3 days MySQL Performance & Tuning training course contents Introduction to performance tuning Tuning overview, Resolving performance issues, Recommended approach to tuning, Items to evaluate, Where to look, Planning a monitoring routine, Building a new database for performance, Tuning an existing database, Setting suitable goals. MySQL performance tuning tools Administration tools, the information schema, performance-related SHOW commands, benchmarking tools, the MySQL performance schema, MonYog. Hands on Obtaining performance information. Schema design Normalisation, de-normalisation, naming conventions, load generation, stress testing and benchmarking tools, selecting data types, data types, character sets, choosing storage engines. Hands on effects of design on performance. Statement tuning Overview of statement tuning, identifying problem queries, the optimizer, explain, explain extended. Hands on identifying problem queries and using explain. Indexes Index overview, Types of index, Index tuning, Indexes and joins. Hands on Indexes and performance. Server configuration and monitoring Server configuration variables, server status variables, table cache, multi-threading, connection issues, query cache. Hands on setting and interpreting server variables and caching. Locking Types of locking, locking and storage engines, effects of locking on performance. Hands on locking and performance. The InnoDB engine Transactions, crash recovery, locking, monitoring InnoDB, caches and buffers, configuring data files, configuring the log files. Hands on InnoDB configuration and performance. Other storage engines MyISAM engine, merge engine, archive engine, memory engine, blackhole engine, CSV engine, the Spider engine, the ColumnStore engine, the MyRocks engine, mixing sorage engines. Hands on storage engine performance. Overview of clustering and performance Advantages of performance, advantages of clustering, performance issues and clustering, the NDBCluster engine, the Galera cluster, the Percona XtraDB cluster, MySQL InnoDB cluster, the federated engine, the federatedX engine, overview of other high availability techniques. NOSQL and Mencached overview. Dumping and loading data SQL statements versus delimited data, parameters affecting dump performance, parameters affecting load performance. Hands on dump and load performance. Partitioned tables Partitioned tables concepts, range partitioning, hash partitioning, key partitioning, list partitioning, composite partitioning or subpartitioning, partition pruning. Hands on partitioned table performance.
European Data Protection Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. About This Course Delivered in a modular format, this four day course covers Days 1 & 2 Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Days 3 & 4 Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included? 1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates Who Should Attend? This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.
SNMPc training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SNMPc training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SNMPc training course content Getting started with SNMPc Manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using SNMPc. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using SNMPc Polling, obtaining MIB information, MIB walking. Compiling MIBs. Hands on Monitoring devices. Groups. MIB walking. SNMP traps. Alarms Events and alarms, thresholds, event actions. Hands on Automatic alarms. Reports Creating reports, trend reports, customising reports. Hands on Performance reports. Graphs. Administration Users, customised views, backups, the database. Hands on Adding a user. Backups.
NNMi for engineers training course description A hands on course focusing on network management using Network Node Manager (NNMi) on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use NNMi. Diagnose faults using NNMi. Recognise the MIB structure. NNMi for engineers training course details Who will benefit: Network administrators. Network operators. Those wishing to find out more about how their NNMi works. Prerequisites: TCP/IP foundation for engineers Duration 2 day NNMi for engineers training course content Network management What is network management? Benefits, issues, demonstration. Getting started with NNMi Starting NNMi, IP discovery, IP monitoring, controlling IP discovery. Using NNMi Mapping devices, map layouts, maps and submaps, objects and symbols, object attributes, colour codings, polling. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Parts of SNMP SNMP architecture, MIBs, The protocol. NNMi SNMP configuration NNMi alarm browser NNMi alarms, alarm categories, filtering alarms, alarm details window. MIBs MIB1, MIB2, The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. NNMi MIB loader and browser. Monitoring devices Polling, obtaining MIB information. Diagnostic tools Poll node, the ping window, protocol test, locate route NNMi fault management Alarms, polling, fault management, setting thresholds and configuring traps.
HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.
H.323 training course description A hands on course covering IP telephony with H.323. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on H.323 protocols though, progressing from what H.323 is through signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, conferencing, and interoperability. Hands on practicals follow each major theory session. What will you learn Explain how H.323 works. Analyse H.323 packets. Deploy H.323 IP telephony solutions. Integrate H.323 with other telephony solutions. H.323 training course details Who will benefit: Technical staff working with H.323 Prerequisites: Voice Over IP Duration 2 days H.323 training course contents VoIP review Brief review of VoIP, IP, telephones and voice. RTP, RTCP, mixers and translators. What is H.323? The framework, Why H.323, history, H.323 standards and the ITU, H.323 versions 1,2,3,4, and 5, Annexes and Appendices, capabilities, services, How H.323 works, a basic call. H.323 protocol stack The overall framework, Audio codecs (H.7xx), Video codecs (H.26x), T.120 data conferencing. H.323 Architecture Endpoints: Terminals, MCUs, gateways. Gatekeepers, border and peer elements, design issues, signalling with and without gatekeepers. H.225 Packet format, ASN.1, Information elements, Call setup, Call control. Gatekeepers Gatekeeper features, admissions, address translation, bandwidth management, call routing, zones, administrative domains, gatekeeper discovery, call establishment, fast connect. RAS packet formats, RAS signalling. Alternate gatekeepers. H.245 Purpose, call control channel, relationship with H.225, message format, tunnelling. H.323 Supplementary services Conferencing: point to point, multipoint, hybrid, broadcast, H.332. H.450.x. Call transfer, diversion, hold and waiting. Remote device control (H.282, H.283). Capability exchange, Video. Security H.235. Authentication, privacy, transport layer level security. Interoperability Gateways, Inter working with PSTN, SIP and H323. H.246. Annexes and Appendices An overview.
RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.
Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.
Going the digital experience research route? Learn how a human centric approach to digital transformation results in a positive experience for all involved.