Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution
Duration 1 Days 6 CPD hours This course is intended for This class is intended for the following: Data analysts, Data scientists, Business analysts getting started with Google Cloud Platform. Individuals responsible for designing pipelines and architectures for data processing, creating and maintaining machine learning and statistical models, querying datasets, visualizing query results and creating reports. Executives and IT decision makers evaluating Google Cloud Platform for use by data scientists. Overview This course teaches students the following skills:Identify the purpose and value of the key Big Data and Machine Learning products in the Google Cloud Platform.Use Cloud SQL and Cloud Dataproc to migrate existing MySQL and Hadoop/Pig/Spark/Hive workloads to Google Cloud Platform.Employ BigQuery and Cloud Datalab to carry out interactive data analysis.Train and use a neural network using TensorFlow.Employ ML APIs.Choose between different data processing products on the Google Cloud Platform. This course introduces participants to the Big Data and Machine Learning capabilities of Google Cloud Platform (GCP). It provides a quick overview of the Google Cloud Platform and a deeper dive of the data processing capabilities. Introducing Google Cloud Platform Google Platform Fundamentals Overview. Google Cloud Platform Big Data Products. Compute and Storage Fundamentals CPUs on demand (Compute Engine). A global filesystem (Cloud Storage). CloudShell. Lab: Set up a Ingest-Transform-Publish data processing pipeline. Data Analytics on the Cloud Stepping-stones to the cloud. Cloud SQL: your SQL database on the cloud. Lab: Importing data into CloudSQL and running queries. Spark on Dataproc. Lab: Machine Learning Recommendations with Spark on Dataproc. Scaling Data Analysis Fast random access. Datalab. BigQuery. Lab: Build machine learning dataset. Machine Learning Machine Learning with TensorFlow. Lab: Carry out ML with TensorFlow Pre-built models for common needs. Lab: Employ ML APIs. Data Processing Architectures Message-oriented architectures with Pub/Sub. Creating pipelines with Dataflow. Reference architecture for real-time and batch data processing. Summary Why GCP? Where to go from here Additional Resources Additional course details: Nexus Humans Google Cloud Platform Big Data and Machine Learning Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Platform Big Data and Machine Learning Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 4 Days 24 CPD hours This course is intended for This course is best suited to developers, engineers, and architects who want to use use Hadoop and related tools to solve real-world problems. Overview Skills learned in this course include:Creating a data set with Kite SDKDeveloping custom Flume components for data ingestionManaging a multi-stage workflow with OozieAnalyzing data with CrunchWriting user-defined functions for Hive and ImpalaWriting user-defined functions for Hive and ImpalaIndexing data with Cloudera Search Cloudera University?s four-day course for designing and building Big Data applications prepares you to analyze and solve real-world problems using Apache Hadoop and associated tools in the enterprise data hub (EDH). IntroductionApplication Architecture Scenario Explanation Understanding the Development Environment Identifying and Collecting Input Data Selecting Tools for Data Processing and Analysis Presenting Results to the Use Defining & Using Datasets Metadata Management What is Apache Avro? Avro Schemas Avro Schema Evolution Selecting a File Format Performance Considerations Using the Kite SDK Data Module What is the Kite SDK? Fundamental Data Module Concepts Creating New Data Sets Using the Kite SDK Loading, Accessing, and Deleting a Data Set Importing Relational Data with Apache Sqoop What is Apache Sqoop? Basic Imports Limiting Results Improving Sqoop?s Performance Sqoop 2 Capturing Data with Apache Flume What is Apache Flume? Basic Flume Architecture Flume Sources Flume Sinks Flume Configuration Logging Application Events to Hadoop Developing Custom Flume Components Flume Data Flow and Common Extension Points Custom Flume Sources Developing a Flume Pollable Source Developing a Flume Event-Driven Source Custom Flume Interceptors Developing a Header-Modifying Flume Interceptor Developing a Filtering Flume Interceptor Writing Avro Objects with a Custom Flume Interceptor Managing Workflows with Apache Oozie The Need for Workflow Management What is Apache Oozie? Defining an Oozie Workflow Validation, Packaging, and Deployment Running and Tracking Workflows Using the CLI Hue UI for Oozie Processing Data Pipelines with Apache Crunch What is Apache Crunch? Understanding the Crunch Pipeline Comparing Crunch to Java MapReduce Working with Crunch Projects Reading and Writing Data in Crunch Data Collection API Functions Utility Classes in the Crunch API Working with Tables in Apache Hive What is Apache Hive? Accessing Hive Basic Query Syntax Creating and Populating Hive Tables How Hive Reads Data Using the RegexSerDe in Hive Developing User-Defined Functions What are User-Defined Functions? Implementing a User-Defined Function Deploying Custom Libraries in Hive Registering a User-Defined Function in Hive Executing Interactive Queries with Impala What is Impala? Comparing Hive to Impala Running Queries in Impala Support for User-Defined Functions Data and Metadata Management Understanding Cloudera Search What is Cloudera Search? Search Architecture Supported Document Formats Indexing Data with Cloudera Search Collection and Schema Management Morphlines Indexing Data in Batch Mode Indexing Data in Near Real Time Presenting Results to Users Solr Query Syntax Building a Search UI with Hue Accessing Impala through JDBC Powering a Custom Web Application with Impala and Search
Duration 3 Days 18 CPD hours This course is intended for Individuals involved in IT development, IT operations or IT service management; Those whose role is touched by DevOps and continuous delivery, such as the following IT roles: DevOps engineers, Product owners Integration specialists, Operations managers, Incident & change managers, System administrators, Network administrators, Business managers, Automation architects, Enterprise architects, Testers Overview Know the emergence of DevOps Know the core concepts and principles of DevOps Know what DevOps means for you as professional and for your organization Know the essence of a DevOps culture Understand the key elements of a DevOps culture Know the important aspects when creating a DevOps culture Know the Operational models of DevOps Understand the need for autonomous teams Understand the impact of DevOps on Architecture with respect to deployment Understand governance within DevOps teams Understand Agile, Scrum and Kanban and how these practices relate to one another Understand how ITSM processes relate to practices in a DevOps culture Understand how lean is used to optimise processes Know how to provide a Value Stream Map for a given process Understand the way to harvest new and innovative ideas Know the impact of automation on Software Delivery processes Understand the benefits and core principles of Continuous Delivery Describe the key cloud principles for DevOps organisations Know the relevance of monitoring and logging DevOps This course is designed to provide the core education necessary to build your DevOps vocabulary and to understand its principles and practices. With the help of key DevOps concepts and terminology, real-life case studies, examples and interactive group discussions and extensive exercises in each module you will acquire a fundamental understanding of DevOps. Introduction Let?s Get to Know Each Other Overview Course Objectives Mapping of the Competence Model with the Course Modules Course Agenda Type of Activities Exam Course Book Technical Glossary Group Activity Module Summary DevOps Introduction Module Objectives Module Topics Emergence of DevOps Core Concepts of DevOps DevOps Agile Skills Association (DASA) Module Summary Module End Questions Culture Module Objectives Module Topics Essence of a DevOps Culture Key Elements of DevOps Implementation of a DevOps Culture Module Summary Module End Questions Organization Module Objectives Module Topics Organizational Model Autonomous Teams Architecting for DevOps Governance Module Summary Module End Questions Processes Module Objectives Module Topics Process Basics DevOps in Relation to ITSM Agile and Scrum 12 Principles of the Agile Manifesto Optimizing Processes Using Lean Business Value Optimization and Business Analysis Using Story Mapping Module Summary Module End Questions Automation Module Objectives 6A Automation Concepts Automation for Delivery of Software Continuous Delivery Core Concepts Continuous Delivery Automation Concepts Continuous Delivery Automation Focus Topics 6B Data Center Automation Emergence of Cloud Technology and Principles Cloud Services Concepts in a DevOps Organization Automated Provisioning Concepts Platform Product Characteristics and Application Maturity Module Summary Module End Questions Measure and Improvement Module Objectives Module Topics Importance of Measurement Choosing the Right Metrics Monitoring and Logging Module Summary Module End Questions
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority
Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas Æ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice
Duration 5 Days 30 CPD hours This course is intended for Technology Consultants Overview Enables you to implement and maintain SAP BW powered by SAP HANA.Outlines advantages of the new SAP 'In-Memory' database foundation for SAP BW.Explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW.Introduces the new SAP architecture framework of LSA++ and provides guidelines on how to convert your existing EDW-architecture into this new concept.Explains native HANA modeling and how both, HANA information views as well as BW InfoProviders, can complement each other in so-called 'mixed scenarios'. In this course, students gain the knowledge to enable themselves to implement and maintain SAP BW powered by SAP HANA. The course explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW. Getting Started SAP HANA Basics SAP BW Basics SAP HANA BW Modeling Tools SAP HANA Native Modeling Migration to SAP BW on HANA Migration Strategies and Tools SAP BW Migration Cockpit BW on HANA Data Management Multi-Temperature Data Management Optimizing BW Data Management based on Dynamic Tiering and Non- Active Concept Optimizing BW Data Management based on Nearline-Storage Optimization Areas in BW on HANA HANA-Optimized Data Modeling: InfoCubes HANA-Optimized Data Modeling: Advanced DataStore-Objects HANA-Optimized Data Modeling: CompositeProviders HANA-Optimized Data Staging HANA-Optimized Analytic Manager HANA-Optimized Analysis Processes Modeling with SAPïs Reference Architecture LSA++ Review of Layered Scalable Architecture (LSA) From LSA to LSA++: Streamline Core Layers LSA++: Open Operational Data Store Layer (Open ODS Views) LSA++: Agile Data Mart & BW Workspace Layer Hybrid Modeling in Mixed Scenarios Generation of HANA-Views of BW InfoProviders Mixed Scenarios SAP HANA Live HANA-Optimized BI Content Data Provisioning into SAP HANA and SAP BW Overview of Data Provisioning Methods to SAP HANA SLT Replication into SAP HANA SLT Replication into SAP BW Operational Data Provisioning into SAP BW DB-Connect and Open Hub Destination Additional Enhancements of BW 7.40 InfoObject Enhancements Authorization Enhancements Process Chain Monitoring HANA-Optimized BW Search HANA-Optimized BW Planning Obsolete BW Object Types Mobile Enablement Enhancements SAP HANA vs. BW Accelerator Summary & Outlook New Transactions and BW on HANA Roadmap Additional course details: Nexus Humans BW362 SAP BW on SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW362 SAP BW on SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Programmers Application DevelopersSystem Architects Network ArchitectsNetwork Security Architects IT Professionals w/programming experience Overview Those who attend the Ethereum Development course and pass the exam certification will have a demonstrated knowledge of:An excellent overall understanding of the Ethereum architecture and Solidity language.All functional components (including smart contracts) required to develop an Ethereum Blockchain.The understanding of how to instantiate an Ethereum application on the network.An in-depth understanding of how transactions are created and implemented on an Ethereum network. This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum?s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development. The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. What is Blockchain and Smart Contracts? What is Blockchain and how does it work? Bitcoin vs Ethereum Smart Contract How you can use Smart Contracts? Advantages of Smart Contracts Solidity LAB TASK Types of Variables in Solidity Public and Private Code Public Variables and Functions Private Variables and Functions Internal Functions External Functions Smart Contract Constructors Constant Variables Setting Variables LAB CHALLENGE Smart Contracts With WEB3.JS LAB Installing & Running the Ethereum TestRPC Installing Web3.js Changing the Environment in Remix Creating the UI Using Web3.js to Connect & Interact with the Smart Contract SOLUTION LAB CHALLENGE Smart Contract Events With WEB3.JS AIM LAB The Current Contract Defining the Smart Contract Event Updating the UI LAB CHALLENGE Functions, Mappings and Structs THEORY Functions Mappings Structs LAB The Smart Contract Creating a Modifier Using the Modifier Web3 UI?s Modifier Handling LAB Creating a Struct Creating the Mapping Map Addition Get from the Mapping The Full Contract Count from Map LAB CHALLENGE Inheritance and Deployment THEORY Object-oriented programming Inheritance LAB Current Contract Creating a Base Contract Changing from Strings to bytes Continuing the Project Installing MetaMask Deploy Contract to the Ropsten Test Network LAB Update the HTML Form Update the JavaScript Using the App LAB CHALLENGE Embark Framework and It's Deployment Blockchain (Ethereum) Decentralized Storage (IPFS) Decentralized Communication Web Technologies LAB Installing Embark Framework Hello World with Embark Framework First Contract Deployment with Embark Framework Solidity Smart Contracts Testing THEORY What is Software Testing? LAB LAB CHALLENGE Contracts Management With Factories THEORY Factory LAB LAB CHALLENGE IPFS Files Hosting THEORY IPFS FILES HOSTING LAB 1. Get your hosting server 2. Install IPFS on the Server LAB CHALLENGE End to End Development of DAPP AIM LAB Setup the Project Program the Smart Contract Create the Front-end of the application Deploy the App with IPFS LAB CHALLENGE
Duration 5 Days 30 CPD hours This course is intended for Cloud architects, systems engineers, datacenter administrators, and cloud administrators with experience in managed services or managing a service provider environment. Overview By the end of the course, you should be able to meet the following objectives: Understanding NSX-T Data Center and VMware Cloud Director fundamentals List the various NSX-T Data Center components List the use cases and topologies of VMware Cloud Director networks Discuss the VMware Cloud Director provider networking configurations Discuss the VMware Cloud Director tenant networking configurations Discuss NSX Advanced Load Balancer and its components Discuss NSX Advanced Load Balancer configuration and integration with VMware Cloud Director Enable a layer 2 stretched network that spans across multiple VMware Cloud organization VDCs Showcase the importance of the VMware Cloud Director migration tool and its functionality Manage resources from the VMWare Cloud Director console and use VMware vRealize Operations Manager⢠In this five-day course, you focus on designing, integrating, configuring, and managing VMware Cloud Director? 10.x with VMware NSX-T© Data Center and VMware NSX© Advanced Load Balancer?. You learn about creating Network Pools and Edge Cluster management. You also learn about creating and managing an external network and creating and managing the organization of VDC, vApp, and data center group networks. Course Introduction Introductions and course logistics Course objectives VMware Cloud Director Data Center Fundamentals Explain NSX-T Data Center and its architecture Discuss various NSX-T Data Center components Describe NSX-T Data Center objects and their creation methods List the various requirement and maximum configuration details Explain NSX-T Data Center and its architecture Discuss various NSX-T Data Center components Describe NSX-T Data Center objects and their creation methods Explain VMware Cloud Director and its architecture List the various requirement and maximum configuration details Discuss VMware Cloud Director pre-requisites and deployment Discuss the use cases and features of VMware Cloud Director List the various requirement and maximum configuration details Discuss the design best practices Provider Configuration Discuss the integration of VMware vCenter Server© with VMware Cloud Director Discuss the integration of NSX-T Data Center with VMware Cloud Director Explain the provider side networking concepts and features Tenant Configuration Discuss the various types of organization VDC networks that can be created using NSX-T Data Center Explain the edge services available under each type of Organization VDC networks Explain what vApp network is Discuss various types of vApp networks Cross VDC networking with NSX-T Explain data center groups Configure cross-VDC networking and L2 stretched networks Configure a distributed firewall for a Data Center Group NSX Advanced Load Balancer Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Understand and apply a Global Server Load Balancing design framework VMware NSX Migration for VMware Cloud Director Understand the main usage and purpose of the NSX migration for VMware Cloud Director List the supported topology and compatibility matrix List the supported features Understand the environmental prerequisites and how to prepare the edge cluster for bridging Know the logs and error handling exceptions Monitoring VMware Cloud Director Networking Discuss the methods to manage and monitor networking objects from VMware Cloud Director portals Understand the vRealize Operations Manager and vRealize Operations Manager Tenant App overview Discuss how to monitor VMware Cloud Director networking objects using vRealize Operations Manager and vRealize Operations Manager Tenant App Create views and reports Describe the use of vCloud Usage Meter with VMware Cloud Director