Duration 3 Days 18 CPD hours This course is intended for This course is designed for broadcast engineers. It might also be of interest to technical solution architects, network engineers, and network administrators. Overview After taking this course, you should be able to: Describe the overall solution and how it works, and identify all components of the solution and their functions Understand initial sizing and capacity Understand the basic requirements for IPFM Understand how Non-Blocking Multicast (NBM) and multicast function in the IPFM Understand and verify Precision Time Protocol (PTP) clocking Describe the DCNM Media Controller Demonstrate the DCNM Media Controller configuration and verification Explain how to deploy an IPFM solution in a high-availability manner Use the DCNM Media Controller to monitor fabric and to troubleshoot basic connectivity and performance issues Understand the approach and basic steps involved in responding to alarms and other notifications The Operating Cisco IP Fabric for Media Solution(IPFMSN) v2.0 course introduces you to the Cisco© IP Fabric for Media (IPFM) solution. The course is designed for broadcast engineers who will use IP technologies to replace Serial Digital Interface (SDI)-based deployments. You will learn about Cisco IPFM deployment, operation, and troubleshooting.The course also covers the Data Center Network Manager (DCNM) Media Controller, a core component of the Cisco IPFM solution. Through lab exercises that focus on building IP fabric as a baseline for a complete IPFM solution, you will learn how to deploy and troubleshoot the DCNM Media Controller to control flows through the fabric. Course Outline Introducing Cisco IP Fabric for Media Media over IP Standardization Designing Cisco IPFM Solution Building Cisco IP Fabric for Media Exploring Non-Blocking Multicast in Cisco IPFM Describing Cisco DCNM Introducing Cisco DCNM PowerOn Auto Provisioning (POAP) Process Implementing Cisco DCNM Flow and Host Policies Precision Time Protocol Cisco IPFM Operations, Administration, and Management Cisco IPFM High Availability Monitoring and Troubleshooting Cisco IPFM Operation
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Network Administrator, Systems Administrator. Overview Upon successful completion of this course, students will be able to Configure and use Transparent Data Encryption, Understand and use Oracle Key Vault, Understand Oracle Data Redaction, Understand and use Oracle Data Masking and Subsetting, Understand security risks and identify appropriate Oracle solutions, Configure general authentication and authorization, Understand and implement Global Users, Set up and maintain a simple wallet, Install and use Oracle Database Vault, and Configure and use Transparent Sensitive Data Protection. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. Additional course details: Nexus Humans Oracle Database Security - Preventive Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Preventive Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. Course Outline Setting up a DB2 database Referential integrity Getting data into and out of DB2 Keeping your DB2 data in good shape Application data recovery basics Program preparation and Bind Security Serialization Additional course details: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Data center systems engineers Field engineers Architects Cisco partners using Cisco Nexus Series switch platforms Overview After taking this course, you should be able to: Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families Describe Cisco Nexus platform implementations Explain Cisco Nexus platform management Describe Port Channels and Virtual Port Channels Configure First Hop Redundancy protocols Configure security features of Cisco Nexus devices Describe the Cisco Nexus devices routing and forwarding Describe Virtual Extensible LAN (VXLAN) Describe Quality of Service (QoS) on Cisco Nexus Devices Explain system management and monitoring processes Describe Cisco NX-OS programmability Describe Cisco Nexus storage services Configure device aliases and zoning Configure FCoE Configure NPIV and NPV modes The Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the CiscoNexus switch platform and teach you how to install, configure, and manage Cisco Nexusswitch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes. Course Outline Describing Cisco Nexus Series Switches Describing Cisco Nexus Platforms Implementation Describing Cisco Nexus Platforms Management Describing Port Channels and Virtual Port Channels Configuring First Hop Redundancy Protocols Configuring Cisco Nexus Security Features Describing Cisco NX-OS Routing and Forwarding Describing Virtual Extensible LAN Describing QoS on Cisco Nexus Devices Configuring System Management and Monitoring Describing Cisco NX-OS Programmability Describing Cisco Nexus Storage Services Configuring Fibre Channel Over Ethernet Describing Device Aliases and Zoning Configuring NPIV and NPV Modes
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB. Overview Building Globally Distributed Applications with Cosmos DB Migrate MongoDB Workloads to Cosmos DB Migrate Cassandra DB Workloads to Cosmos DB This course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB. Building Globally Distributed Applications with Cosmos DB Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Migrate MongoDB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Migrate Cassandra DB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Additional course details: Nexus Humans DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 1 Days 6 CPD hours This course is intended for Anyone who wants to learn how to create movies - from a home movie to professional looking films using iMovie. This one-day hands-on course will teach the participant the full functionality of iMovie. The course will begin with how to import video and photographs into iMovie; how to review and organize the footage; how to shape a story using the editing and trimming tools; how to add music and sound and other video effects and overlays. Lastly, the class will explore sharing your completed movies with your Mac computer, YouTube and other streaming outlets. Introduction to iMovie Adding Media from Photo Library Other Ways to Import Media From iPad, iPhone, or iPod Touch Record Video Directly into iMovie Importing Media from Mac Playing or Skimming Video Sorting and Searching for Clips Marking Clips as Favorite or Rejected Creating Movies Creating a New Movie Viewing and Managing Projects Setting Movie Themes Selecting Clips Adding and Trimming Clips Moving and Splitting Clips Adding and Modifying Transitions Adding and Editing Titles Adding Music and Sound Clips Working with Trailers (If required) Creating Trailer Adding Video Adding Titles and Credits Converting Trailer to Movie Adding Video Effects Enhancing Clip Adjusting Clip?s Order Cropping and Rotating Clips Stabilizing Shaky Clips Adding Video Effects Adding Freeze Frame Creating Effects with Multiple Clips Slow Down and Speed Up Clips Adding Instant Replay or Rewind Effect Copy Effects and Adjustments Sharing Video Clips and Projects Email Movie, Trailer, and Clip Exporting Quick Time File Exporting an Image Share Online Customizing iMovie iMovie Preferences Customizing Project Settings Changing iMovie Window Layout Changing How Clips are Displayed Organizing Media Organizing Media and Events Working with Multiple Libraries Consolidating Projects and Events Keyboard Shortcuts and Gestures Overview of Keyboard Shortcuts Keyboard Shortcuts Multi-Touch Gestures Force Touch Trackpad Gestures
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to improve their phone skills. Overview Upon successful completion of this course, students will be more confident in handling the phone, resulting in new customers while retaining current clientele. In this course, students will learn about different types of calls and the etiquette associated with them. Getting Started Housekeeping Items Pre-Assignment Review Workshop Objectives The Parking Lot Action Plan Aspects of Phone Etiquette Phrasing Tone of Voice Speaking Clearly Listen to the Caller Case Study Using Proper Phone Language Please and Thank You Do Not Use Slang Avoid Using the Term ?You? Emphasize What You Can Do, Not What You Can?t Case Study Eliminate Phone Distractions Avoid Eating or Drinking Minimize Multi-Tasking Remove Office Distractions Do Not Let Others Interrupt Case Study Inbound Calls Avoid Long Greeting Messages Introduce Yourself Focus on Their Needs Be Patient Case Study Outbound Calls Be Prepared Identify Yourself and Your Company Give Them the Reason for the Call Keep Caller Information Private Case Study Handling Rude or Angry Callers Stay Calm Listen to the Needs Never Interrupt Identify What You Can Do For Them Handling Interoffice Calls Transferring Calls Placing Callers on Hold Taking Messages End the Conversation Case Study Handling Voicemail Messages Ensure the Voice Mail Has a Proper Greeting Answer Important Messages Right Away Ensure Messages are Delivered to the Right Person When Leaving A Message for Others... Case Study Methods of Training Employees Group Training One-on-One Training Peer Training Job Shadowing Case Study Correcting Poor Telephone Etiquette Screening Calls Employee Evaluations Peer Monitoring Customer Surveys Case Study Wrapping Up Words From The Wise Review Of The Parking Lot Lessons Learned Recommended Reading Completion Of Action Plans And Evaluations
Duration 3 Days 18 CPD hours This course is intended for The course will likely be attended by SQL Server report creators who are interested in alternative methods of presenting data. Overview After completing this course, students will be able to: ? Perform Power BI desktop data transformation. ? Describe Power BI desktop modelling. ? Create a Power BI desktop visualization. ? Implement the Power BI service. ? Describe how to connect to Excel data. ? Describe how to collaborate with Power BI data. ? Connect directly to data stores. ? Describe the Power BI developer API. ? Describe the Power BI mobile app. The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App. Introduction to Self-Service BI Solutions Introduction to business intelligence Introduction to data analysis Introduction to data visualization Overview of self-service BI Considerations for self-service BI Microsoft tools for self-service BI Lab : Exploring an Enterprise BI solution Introducing Power BI Power BI The Power BI service Lab : Creating a Power BI dashboard Power BI Using Excel as a data source for Power BI The Power BI data model Using databases as a data source for Power BI The Power BI service Lab : Importing data into Power BI Shaping and Combining Data Power BI desktop queries Shaping data Combining data Lab : Shaping and combining data Modelling data Relationships DAX queries Calculations and measures Lab : Modelling Data Interactive Data Visualizations Creating Power BI reports Managing a Power BI solution Lab : Creating a Power BI report Direct Connectivity Cloud data Connecting to analysis services Lab : Direct Connectivity Developer API The developer API Custom visuals Lab : Using the developer API Power BI mobile app The Power BI mobile app Using the Power BI mobile app Power BI embedded