Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. Basic shell conceptsFlow control in a shell ScriptFunctions and typesetShell features such as arithmetic and string handlingUsing regular expressionsUsing sed, awk and other AIX utilities
Duration 1 Days 6 CPD hours This course is intended for The audience for this course includes professionals who are new to Looker who are interested in leveraging Looker for data analysis, visualization, and reporting. The course is designed for individuals seeking to gain a comprehensive understanding of Looker's functionalities and apply these skills in their organizations to drive data-driven decision-making. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore and gain: Solid foundation in Looker's platform: Acquire a comprehensive understanding of Looker's key features, functionality, and interface, enabling you to effectively utilize the platform for your data analysis and visualization needs. Proficiency in LookML and data modeling: Develop essential skills in Looker's unique data modeling language, LookML, to create efficient and customized data models tailored to your organization's specific requirements. Expertise in creating Explores: Learn how to build, customize, and save Explores with dimensions, measures, filters, and calculated fields, empowering you to analyze your data and uncover valuable insights in a short amount of time. Mastery of dashboard design and visualization: Gain the skills to design visually appealing and informative dashboards, create various types of visualizations, and customize them to effectively communicate your data story. Improved content organization with folders and boards: Understand how to effectively use folders and boards in Looker to organize, manage, and discover content, making your data insights easily accessible for you and your team. Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker is a one day, hands-on course designed to equip professionals from a variety of backgrounds with the knowledge and skills needed to harness the full potential of their data using Looker's powerful platform. With the guidance of our expert trainers, you will gain a basic understanding of Looker's features, enabling you to create visually engaging, interactive, and insightful reports and dashboards to drive informed decision-making. Throughout this interactive workshop, you will explore Looker's key functionalities, including connecting to data sources, mastering LookML, building custom Explores, and designing captivating dashboards. With about 40% of the course dedicated to hands-on labs and a guided project, you will have ample opportunity to apply the skills you've learned in real world scenarios. Don't miss this opportunity to elevate your data analysis and visualization capabilities, enhance your professional skill set, and unlock the power of data-driven decision making. Getting Started with Looker Overview of Looker and its key features Navigating the Looker interface Connecting to Data Sources and LookML Basics Setting up and managing data connections Exploring database schemas Understanding LookML: Looker's data modeling language Creating and Customizing Explores Building and customizing Explores Adding dimensions, measures, and filters Creating calculated fields Data Visualization and Dashboard Design Creating visualizations using Looker's visualization library Customizing chart types, colors, and labels Displaying visualizations in dashboards Organizing Content with Folders and Boards Introduction to folders and boards in Looker Creating and managing folders for organizing content Setting up boards for easy content discovery Hands-on Workshop and Project Participants work on a guided project to apply the skills learned Wrap-up and Q&A Additional course details: Nexus Humans Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Looker Basics: Quick Start to Analyzing and Visualizing Data using Looker (TTDVLK01) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This lecture and exercise-based course is for individuals who want to understand how to install, configure, and manage an IBM Spectrum Scale storage cluster. Overview After completing this course, you should be able to: Summarize the key features of IBM Spectrum Scale Describe IBM ESS and Spectrum Scale RAID Install IBM Spectrum Scale and configure a cluster Manage a cluster Implement information lifecycle management (ILM) Configure IBM Spectrum Scale high availability features Back up critical cluster data This course is intended for IT professionals tasked with administering an IBM Spectrum Scale storage cluster in environments running Linux and AIX nodes. The course includes information on installing, configuring, and monitoring an IBM Spectrum Scale cluster. Many Spectrum Scale features are described in lecture materials and then implemented in lab exercises. These features include: Storage management, high availability options, cluster management, and information lifecycle management (ILM) tools. Note: Although the lab environment is running the Linux operating system, the differences in Spectrum Scale compared with an AIX environment are minor. Therefore, the skills acquired during the course can be applied in both Linux and AIX environments. Welcome and course overview Unit 1 - IBM Spectrum Scale overview Exercise 1 - Cluster node preparation Unit 2 - Installation and cluster configuration Exercise 2 - Installation and cluster configuration Unit 3 - Cluster management Exercise 3 - Cluster management and configuration Unit 4 - Information Lifecycle Management (ILM) Exercise 4 - Storage pools, filesets, and policies Unit 5 - High availability and cluster data backups Exercise 5 - Replication and snapshots Course wrap-up and evaluation
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 richtet sich an alle in der Datenverarbeitung tätigen Mitarbeiter. Das Modul eignet sich auch für kleine und mittelständische Unternehmer, die ein bestimmtes Grundwissen im Bereich der Informationssicherheit benötigen. Für Fachkräfte, die neu auf dem Gebiet der Informationssicherheit sind, ist dieses Modul ein guter Anfang. Overview Anwendungsbereich Mit einer Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 können Professionals ihr Wissen in folgenden Bereichen nachweisen: Information und Sicherheit: der Begriff, der Wert, die Bedeutung und die Informationssicherheit Bedrohungen und Risiken: die Begriffe Bedrohung und Risiko und wie diese mit der Zuverlässigkeit von Informationen in Beziehung stehen Verfahren und Organisation: Sicherheitsrichtlinie und Sicherheitsorganisation einschlieÃlich der Bestandteile der Sicherheitsorganisation sowie der Umgang mit (Sicherheits)vorfällen MaÃnahmen: die Bedeutung von SicherheitsmaÃnahmen wie zum Beispiel physischen, technischen und organisatorischen MaÃnahmen Gesetze und Vorschriften: die Bedeutung und Auswirkung von Gesetzen und Vorschriften ie EXIN-Module zum Thema Informationssicherheitsmanagement definieren Informationssicherheit wie folgt: Bei dem Informationssicherheitsmanagement geht es um die Definition, Umsetzung, Aufrechterhaltung, Einhaltung und Bewertung von kohârenten Kontrollen (Maánahmen), die die VerfÂgbarkeit, Integritât, und Vertraulichkeit der (manuellen und automatisierten) Informationsverarbeitung sichern. Das Modul EXIN Information Security Foundation based on ISO/IEC 27001 prÂft die Grundbegriffe der Informationssicherheit und ihre Beziehungen zueinander. Eine der Zielsetzungen des Moduls ist das Bewusstsein fÂr den Wert von Informationen zu wecken und ein Verstândnis fÂr die Schwachstellen der Informationsverarbeitung zu vermitteln, um zu verstehen, welche Maánahmen zum Schutz von Informationen notwendig sind. Information und Sicherheit Der Begriff Information Der Wert von Informationen Aspekte der Zuverlâssigkeit Bedrohungen und Risiken Bedrohungen und Risiken Verfahren und Organisation Sicherheitsrichtlinie und Sicherheitsorganisation Bestandteile Incident Management Maánahmen Bedeutung von Maánahmen Physische Maánahmen Technische Maánahmen Organisatorische Maánahmen Gesetzgbeung und Vorschriften Gesetzgebung und Vorschriften
Duration 2 Days 12 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network administrators Network operators Overview After taking this course, you should be able to: Explain the benefits of using Cisco DNA Center in a traditional, enterprise network Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco© Digital Network Architecture (Cisco DNA?) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. Course Outline Introducing Cisco DNA Center Assurance Monitoring Health and Performance with Cisco DNA Center Assurance Troubleshooting Issues, Observing Insights and Trends Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools Additional course details: Nexus Humans Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Channel partners and resellers Network administrators Network engineers Sales engineers System engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components. Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance. Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access. Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding. Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network. Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access. Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes. Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network. Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless. Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution Describe the use cases and migration scenarios for migrating users from traditional campus to SD The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco© SD-Access fits into Cisco Digital Network Architecture (Cisco DNA?). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended. Course Outline Introducing Cisco DNA Architecture Cisco DNA Center Design Cisco DNA Center Inventory Cisco DNA Center Automation Explore Cisco DNA Center and Automating Network Changes Introducing Cisco Software-Defined Access Deploying Cisco Software-Defined Access Deploy Wired Fabric Networks with Cisco DNA Center Cisco SD-Access for Wireless Cisco SD-Access Extension for IoT Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center Migrating to Cisco SD-Access Cisco SD-Access Multicast Integrating Cisco DNA Center Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications Understanding Programmable Network Infrastructure Operating and Managing Cisco DNA Infrastructure Test Drive Cisco DNA Center APIs
Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants, and for management personnel in charge of setting standards for baselining and tracking project data. Overview To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Execution phase of a normal project life cycle. To gain an understanding of Microsoft Project's baseline capabilities in preparation for analysis and reporting of project data. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.
Duration 5 Days 30 CPD hours This course is intended for This is a basic-level programming course designed for attendees with prior development experience in another language, such as COBOL, 4GL, Mainframe or other non-object oriented languages. This course is not geared for non-developers. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core OO coding and Java development skills, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand what OO programming is and what the advantages of OO are in today's world Work with objects, classes, and OO implementations Understand the basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction Understand not only the fundamentals of the Java language, but also its importance, uses, strengths and weaknesses Understand the basics of the Java language and how it relates to OO programming and the Object Model Work with the Modular system (Project Jigsaw) Understand and use classes, inheritance and polymorphism Understand and use collections, generics, autoboxing, and enumerations Process large amount of data using Lambda expressions and the Stream API Abstract, static and private methods in interfaces Take advantage of the Java tooling that is available with the programming environment being used in the class Java 11 features covered: Using the Local Variable Type in Lambda expressions; Updates made to the String API This course provides hands-on Java 11 training for developers who have little or no prior working knowledge of object-oriented programming languages such as C, COBOL, and 4GL. You will learn the best practices for writing great object-oriented programs in Java 11, using sound development techniques, new improved features for better performance, and new capabilities for addressing rapid application development. Special emphasis is placed on object oriented concepts and best practices. A First Look The Java Platform Using the JDK The Eclipse Paradigm Getting Started with Java Writing a Simple Class Adding Methods to the Class OO Concepts Object-Oriented Programming Inheritance, Abstraction, and Polymorphism Essential Java Programming Language Statements Using Strings Specializing in a Subclass Fields and Variables Using Arrays Local-Variable Type Inference Java Packages and Visibility Object Oriented Development Inheritance and Polymorphism Interfaces and Abstract Classes Introduction to Exception Handling Exceptions Java Developer's Toolboxÿ Utility Classes Java Date/Time Advanced Java Programming Introduction to Generics Lambda Expressions and Functional Interface Working with Collections Collections Using Collections Stream APIÿ Streams Collectors The Java Module System Introduction to the Module System Time Permitting Formatting Strings Introduction to Annotations Java 12 and beyond Additional course details: Nexus Humans Basic Java 11 and OO Programming for Developers New to OO (TT2120-J11) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Basic Java 11 and OO Programming for Developers New to OO (TT2120-J11) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This beginning DB2 basic course is for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database in a z/OS environment. Overview Describe several services provided in a z/OS environmentExplain workloads in the batch environmentExplain workloads in the online environmentDescribe job roles in a z/OS environmentLog On to TSO/ENavigate TSO/E and ISPFUse TSO commandsSetup and utilize JCL (Job Control Language)Utilize SDSFDescribe the different types of data sets in a z/OS environmentAllocate data sets and list data set information and contentCreate and modify data set contentGive an overview of the DB2 9 environmentDescribe and utilize DB2 ObjectsDescribe and utilize several DB2 UtilitiesDescribe the DB2I (DB2 Interactive Facility) environmentUse SPUFI (SQL Processing Using File Input) to compose and execute SQLSetup and execute DB2 CommandsUnderstand DB2 LoggingDescribe DB2 program preparation processUnderstand DB2 startup and shutdownUnderstand and utilize DB2 recovery strategies This course is intended for students looking to develop fundamental skills or recognition through lectures and hands-on exercises of TSO/E and ISPF, data sets, DB2 objects, Structured Query Language, DB2 commands, JCL and SDSF. Day 1 Welcome Unit 1: Introduction Unit 2: TSO/E and ISPF Exercise 1: TSO and ISPF Exercise 1 Review Unit 3: Data Sets (Data Sets and Sequential Data Sets) Exercise 2: Sequential Data Sets Exercise 2 Review Day 2 Unit 3: Data Sets (Partitioned Data Sets) Exercise 3: Partitioned Data Sets Exercise 3 Review Unit 3: Data Sets (VSAM Data Sets) Exercise 4: VSAM Data Sets Exercise 4 Review Unit 4: JCL and SDSF Exercise 5: JCL and SDSF Exercise 5 Review Day 3 Unit 5: DB2 Relational Database Concepts Unit 6: Structured Query Language (SQL) and SPUFI Exercise 6: SQL and SPUFI Exercise 6 Review Unit 7: DB2 Objects (Databases and Table Spaces) Exercise 7: Databases and Table Spaces Exercise 7 Review Unit 7: DB2 Objects (Tables, Indexes, and Views) Exercise 8: Tables, Indexes, and Views Exercise 8 Review Day 4 Unit 7: DB2 Objects (Qualified Names, Implicit Object Creation, and SQL Statements) Exercise 9: Qualified Names, Implicit Object Creation, and SQL Statements Exercise 9 Review Unit 8: The DB2 System Exercise 10: The DB2 System Exercise 10 Review Unit 9: DB2 Commands and Program Preparation Exercise 11: DB2 Commands Exercise 11 Review Day 5 Unit 10: DB2 Utilities Exercise 12: DB2 Utilities Exercise 12 Review Unit 11: DB2 Shutdown, Startup, and Recovery Exercise 13: DB2 Recovery Exercise 13 Review Unit 12: Course Summary Additional course details: Nexus Humans CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.