Duration 2 Days 12 CPD hours This course is intended for Enterprise Network System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completion of this course, you will be able to: Identify the various components and architecture of the Cisco SD-WAN solution. Deploy vEdge routers in a secure extensible network. Create templates to aide in the deployment and operation of the secure extensible network. Configure and verify overlay routing in the secure extensible network. Create simple policies to control traffic flow in the secure extensible network. The Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 course provides an overview of the Cisco SD-WAN solution and SD-WAN components. Students will learn how to create, manage, and operate a secure extensible network using Cisco SD-WAN products. The course covers how to configure, operate, and monitor overlay routing in a secure extensible network. Students will also learn about policies and quality of service (QoS) in the SD-WAN overlay network. SD-WAN Solution Components SD-WAN Solution Overview SD-WAN Components Managing SD-WAN Components Secure Extensible Network Deployment Secure Control Plane Operation Secure Control Plane Deployment Secure Data Plane Operation Cloud Deployments and Redundancy SD-WAN Template Deployment Templates Overview Feature Templates Device Templates Attaching Devices to Templates SD-WAN Overlay Routing Overlay Routing Overview OMP Route Advertisements OMP Route Redistribution and Network Segmentation Configuring and Verifying Overlay Routing SD-WAN Policies and QoS Policy Overview and Framework vSmart Policy Operation and Construction Forwarding and QoS Overview Configuring and Monitoring QoS Forwarding Additional course details: Nexus Humans ENSDW-Cisco SD-WAN Operation and Deployment training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ENSDW-Cisco SD-WAN Operation and Deployment course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized. The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies. Overview Understand Data Platform Modernization Choose the right tools for Data Migration Migrate SQL Workloads to Azure Virtual Machines Migrate SQL Workloads to Azure SQL Databases Migrate SQL Workloads to Azure SQL Database Managed Instance In this course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. Students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications, so that they can make best use of modern data platforms in Azure. Introducing Data Platform Modernization Understand Data Platform Modernization Understanding the stages of migration Data Migration Paths Choose the right tools for Data Migration Discover the Database Migration Guide Build your data estate inventory using Map Toolkit Identify Migration candidates using Data Migration Assistant Evaluate a Data workload using Database Experimentation Assistant Data Migration using Azure Database Migration Service Migrate non-SQL Server workloads to Azure using SQL Migration Assistant Migrating SQL Workloads to Azure Virtual Machines Considerations of SQL Server to Azure VM Migrations SQL Workloads to Azure VM Migration Options Implementing High Availability and Disaster Recovery Scenarios Migrate SQL Workloads to Azure SQL Databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL DB offline Migrate SQL Server to Azure SQL DB online Load and Move data to Azure SQL Database Migrate SQL Workloads to Azure SQL Database Managed Instance Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed instance Load and Move data to SQL Database Managed instance Application Configuration and Optimization
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, and Users. Overview Provide an overview of the fundamental concepts and procedures of production planning within SAP ERP.Gain an overview of the manufacturing methods supported by ERP. This course is designed to provide an overview of the fundamental concepts and procedures of production planning within SAP ERP. Introduction to Supply Chain Planning Drafting Supply Chain Planning Planning-Specific Master Data Reviewing Supply Chain Master Data Reviewing Production Master Data Sales and Operations Planning Drafting Flexible Planning Executing Standard Sales and Operations Planning Releasing a Standard Sales and Operations Plan Demand Management Setting Up a Demand Program Planning Make-to-Stock Production Planning Make-to-Order Production Checking Product Availability Material Requirements Planning Drafting MRP Procedures Planning Material Requirements Interpreting the Results of Material Requirements Planning Long-Term Planning Creating a Long-Term Planning Scenario Executing Long-Term Planning Introduction to Production Execution Distinguishing Production Types Production with Production Orders Drafting Production Orders Creating Production Orders Releasing Production Orders Executing Material Staging for Production Orders Executing Confirmation and Goods Receipt for Production Orders Evaluating Production Orders Production with Process Orders Drafting Process Orders Creating and Interpreting Process Orders Executing Process Orders Using Additional Functions with Process Orders Repetitive Manufacturing Drafting Repetitive Manufacturing Preparing Repetitive Manufacturing Planning Line Loading in Repetitive Manufacturing Using Material Staging and Confirmation Integrating Costing, Controlling, and Reporting The Kanban Principle Drafting Kanban Using Kanban in Production Additional course details: Nexus Humans SCM130 SAP ERP Planning and Manufacturing Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM130 SAP ERP Planning and Manufacturing Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, and Solution Architects. Overview Gain a detailed knowledge of using the functions and customizing settings in sales. This course is ideal for students requiring detailed knowledge about customizing of sales processes and basic functions. Introduction to the Sales and Distribution Process Processing Sales Documents Enterprise Structures in Sales and Distribution Setting Up Enterprise Structures Sales Order Processing Identifying Sources of Document Data Using Additional Functions During Sales Order Processing Sales Document Customizing Controlling Sales Processes Defining Sales Document Types Applying Item Categories Interpreting the Item Category Determination Using Bills of Material in Sales Documents Applying Schedule Line Categories Interpreting the Schedule Line Category Determination Data Flow Interpreting the Document Flow of Sales Processes Setting Up the Copying Control Special Business Processes Executing Special Business Processes Incomplete Documents Handling Incomplete Documents Setting Up an Incompletion Procedure Business Partners Using Partner Functions in Sales and Distribution Processes Setting Up Partner Determination Procedures Outline Agreements Using Different Types of Outline Agreements Interpreting the Set-Up of Value Contracts Setting Up Specific Contract Data Material Determination Setting Up Material Determination Material Listing and Exclusion Setting Up Master Data for Material Listing / Exclusion Free Goods Setting Up the Determination of Free Goods Sales Scenarios Setting Up a Cash Sales Scenario Controlling the Usage of Bills of Material in a Sales Order Setting Up a Material Determination Scenario Additional course details: Nexus Humans SCM605 SAP Sales Processing in SAP ERP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM605 SAP Sales Processing in SAP ERP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Application developers, Cloud Solutions Architects, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview At the end of the course, students will be able to: Understand container basics. Containerize an existing application. Understand Kubernetes concepts and principles. Deploy applications to Kubernetes using the CLI. Set up a continuous delivery pipeline using Jenkins Learn to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those workloads to handle increased traffic. Students will also learn how to continuously deploy new code in a Kubernetes cluster to provide application updates. Introduction to Containers and Docker Acquaint yourself with containers, Docker, and the Google Container Registry. Create a container. Package a container using Docker. Store a container image in Google Container Registry. Launch a Docker container. Kubernetes Basics Deploy an application with microservices in a Kubernetes cluster. Provision a complete Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl. Break an application into microservices using Kubernetes? Deployments and Services. Deploying to Kubernetes Create and manage Kubernetes deployments. Create a Kubernetes deployment. Trigger, pause, resume, and rollback updates. Understand and build canary deployments. Continuous Deployment with Jenkins Build a continuous delivery pipeline. Provision Jenkins in your Kubernetes cluster. Create a Jenkins pipeline. Implement a canary deployment using Jenkins. Additional course details: Nexus Humans Getting Started with Google Kubernetes Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with Google Kubernetes Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level course, designed for anyone wanting to learn Linux. Attendees should be comfortable working with computers and the command line, but no other specific skills are required to attend. Overview This skills-focused course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on labs that emphasize current techniques, best practices and standards. Working in a hands-on lab environment, guided by our expert practitioner, attendees will explore The Design of Linux Basic Operations File System Basics Wildcards File and Directory Permissions Working with files Executing Programs Using find Filters and other useful commands The vi editor Customizing the user environment Networking/Communications Backups and archiving This hands-on course provides you with an essentials-level foundation in core skills for using any version of Linux. This course focuses on essential skills that ordinary users might use daily when working with Linux. The Design of Linux A brief history of Linux The Linux design philosophy Linux architecture Basic Operations Logging in and out The general form of a Linux command Common commands Using man pages Essential commands File System Basics The Linux directory structure Standard directories Relative and absolute pathnames Legal file names Navigating the filesystem Wildcards Matching one character Matching many characters Shortcuts Wildcard gotchas Wildcards and ls File and Directory Permissions Viewing permissions File permissions Directory permissions Setting defaults Changing permissions Keeping data secure Working with files Viewing contents Identifying file contents Copying and moving Deleting Using symbolic links Executing Programs Redirecting STDOUT Redirecting STDERR Redirecting STDIN Creating pipelines Processes attributes Listing processes Killing processes Foreground & background processes Using find Syntax Finding by name, type, or size Combining tests Finding by size, owner, or timestamps Using xargs with find Other find options Filters and other useful commands What is a filter? cat: a generic filter head and tail grep sort wc other interesting filters The vi editor Why vi? Basic vi operations: navigating, adding, deleting Advanced operations: buffer management, search and replace, configuration options Customizing the user environment About shells Shell startup files Shell variables Search path Aliases Simple shell scripts Networking/Communications Reading and sending mail Remote login Remote file transfer Other network utilities (ping, finger, etc) Backups and archiving Checking space used or available Creating tar archives Viewing and extracting files from archives Compression utilities Working with windows
Duration 3 Days 18 CPD hours This course is intended for This is an intermediate course for architects, system integrators, security administrators, network administrators, software engineers, technical support individuals, and IBM Business Partners who implement LPARs on IBM Power Systems. Overview Describe important concepts associated with managing POWER7 processor-based systems, such as Logical partitioning (LPAR), dynamic partitioning, virtual devices, virtual processors, virtual consoles, virtual Local Area Network (VLAN), and shared processors Describe the features of the PowerVM Editions. Use the System Planning Tool to plan an LPAR configuration Describe the functions of the HMC Configure and manage the HMC, including users and permissions, software, startup and shutdown, remote access features, network configuration, security features, HMC backup and restore options, and the HMC reload procedure Describe the rules associated with allocating resources, including dedicated processors, processing units for Micro-Partitions, memory, physical I/O for AIX and Linux partitions Configure and manage LPARs using the HMC Graphical User Interface (GUI) and HMC commands Interpret physical and AIX location codes and relate to the key hardware components Power on and power off the POWER7 system Use the HMC to back up and restore partition data In this course, students will learn the skills needed to become an effective administrator on IBM's POWER7-based systems that support Logical Partitioning (LPAR). Day 1 Introduction to partitioning Hardware system overview Hardware Management Console Day 2 Hardware Management Console (cont.) System Planning Tool HMC and managed system maintenance System power management Planning and configuring logical partitions Day 3 Planning and configuring logical partitions (cont.) Partition operations Dynamic resource allocation Exercise 9 Additional course details: Nexus Humans AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN110 IBM Power Systems for AIX I - LPAR Configuration and Planning course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed for network administrators, system administrators, network architects, systems engineers, and technical support engineers who are involved with advanced installation, configuration, maintenance, and basic troubleshooting of Ruckus ICX products. Overview Upon successful completion of this course, the student will be able to: Describe Ruckus ICX hardware Configure and implement management protocols on Ruckus equipment Configure and implement monitoring and reporting features on Ruckus equipment including syslogs and sFlow Perform hardware troubleshooting and support functions Perform firmware upgrades Configure, implement, and maintain Layer 2 STP protocols (RSTP, MSTP, PVST) Configure and manage VLANs, Virtual Ethernet routed interfaces, topology groups, and Q-in-Q Configure, deploy and maintain Link Aggregation Groups (LAGS) Describe, configure, and maintain Multi-Chassis Trunking (MCT) Integrate MCT with VRRPe for redundancy Identify PoE-capable products Configure and manage Ruckus ICX switches in a PoE environment Configure, implement, and maintain the OSPF routing protocol Configure, implement, and maintain QoS This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. Additional course details: Nexus Humans Ruckus ICX 200 Administrator Training Course training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ruckus ICX 200 Administrator Training Course course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.