Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who want to learn how to program Android applications using the Java Programming Language. Overview Upon successful completion of this course, students will have an understanding of basic application Android development. This course will teach the basics of Android Development using the Java Programming Language and Android Studio. Introduction and Setup Android Studio Development Essentials Introduction Setting up an Android Studio Development Environment Creating an Example Android App in Android Studio A Tour of the Android Studio User Interface Creating an Android Virtual Device (AVD) in Android Studio Using and Configuring the Android Studio AVD Emulator Testing Android Studio Apps on a Physical Android Device The Basics of the Android Studio Code Editor Android Architecture and State Changes An Overview of the Android Architecture The Anatomy of an Android Application Understanding Android Application and Activity Lifecycles Handling Android Activity State Changes Android Activity State Changes by Example Saving and Restoring the State of an Android Activity Views and Layouts Understanding Android Views, View Groups and Layouts in Android Studio A Guide to the Android Studio Layout Editor Tool A Guide to the Android ConstraintLayout A Guide to using ConstraintLayout in Android Studio An Android Studio Layout Editor ConstraintLayout Tutorial Manual XML Layout Design in Android Studio Creating an Android User Interface in Java Code Event Handling An Overview and Example of Android Event Handling A Guide to using Instant Run in Android Studio Android Touch and Multi-touch Event Handling Detecting Common Gestures using Android Studio and the Gesture Detector Class Implementing Custom Gesture and Pinch Recognition on Android Advanced Layout and Transitions An Introduction Android Fragments Using Fragments in Android Studio - An Example Creating and Managing Overflow Menus on Android Animating User Interfaces with the Android Transitions Framework An Android Transition Tutorial using beginDelayedTransition Implementing Android Scene Transitions ? A Tutorial Working with the Floating Action Button and Snackbar Creating a Tabbed Interface using the TabLayout Component Working with the RecyclerView and CardView Widgets An Android RecyclerView and CardView Tutorial Working with the AppBar and Collapsing Toolbar Layouts Implementing an Android Navigation Drawer An Android Studio Master/Detail Flow Tutorial Intents, Threads, Services, and Notifications An Overview of Android Intents Android Explicit Intents ? A Worked Example Android Implicit Intents ? A Worked Example Android Broadcast Intents and Broadcast Receivers A Basic Overview of Threads and Thread Handlers An Overview of Android Started and Bound Services Implementing an Android Started Service - A Worked Example Android Local Bound Services - A Worked Example Android Remote Bound Services - A Worked Example An Android 7 Notifications Tutorial An Android 7 Direct Reply Notification Tutorial Data Access and Storage Integrating Firebase Support into an Android Studio Project An Android 7 Firebase Remote Notification Tutorial An Introduction to Android 7 Multi-Window Support An Android Studio Multi-Window Split-Screen and Freeform Tutorial An Overview of Android SQLite Databases in Android Studio An Android TableLayout and TableRow Tutorial An Android SQLite Database Tutorial Understanding Android Content Providers Implementing an Android Studio Content Provider in Android Studio Accessing Cloud Storage using the Android Storage Access Framework An Android Storage Access Framework Example Multimedia, Maps and Printing Video Playback on Android VideoView and MediaController Classes Video Recording and Image Capture using Camera Intents Making Runtime Permission Requests in Android Android Audio Recording and Playback using MediaPlayer and MediaRecorder Working with the Google Maps Android API in Android Studio Printing with the Android Printing Framework An Android HTML and Web Content Printing Example A Guide to Android Custom Document Printing Final Build An Android Fingerprint Authentication Tutorial Handling Different Android Devices and Displays Signing and Preparing an Android Application for Release Integrating Google Play In-app Billing into an Android Application An Overview of Gradle in Android Studio An Android Studio Gradle Build Variants Example Additional course details: Nexus Humans Android Studio Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Studio Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for New users of IBM SPSS Statistics Users who want to refresh their knowledge about IBM SPSS Statistics Anyone who is considering purchasing IBM SPSS Statistics Overview Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders Additional course details: Nexus Humans 0G53BG IBM SPSS Statistics Essentials (V26) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G53BG IBM SPSS Statistics Essentials (V26) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview - You will learn advanced Adobe Captivate concepts. - You will learn to create highly interactive software simulation and to control the text that appears in the recording?s text captions by editing Captivates text capture templates. - You will create responsive lessons (using Fluid Boxes and Breakpoints) that automatically reflow to fit just about any kind of display including desktops, laptops, tablets, and smart phones. - Learn new features that Captivate now supports; such as, Virtual Reality with 360-degree images and videos along with interactive videos. - Fine-tune your Captivate production skills by leveraging object styles, master slides, themes, and advanced actions. - Engage your learners by adding variables, widgets, and learner interactions (including drag and drop) to your eLearning. - Learn to create object styles, apply them globally, and import and export them. Knock large projects down to size by learning to create branch groups. - Create branching scenarios that allow learners to plot their own path through your course. - You will also learn to create templates. - Ensure your eLearning can be used by people with disabilities by adding such 508-compliant features as accessibility text, keyboard shortcuts, and closed captions. - Enable Captivates reporting features and, along the way, learn about Learning Management Systems, SCORM, SCOs, Manifests, and content packages. A course that teaches the higher-end, more advanced functionality of Adobe Captivate 2019. 1 - INTERACTIVE SOFTWARE SIMULATIONS AND CAPTION PRE-EDITING Rehearse a Script Set Recording Preferences Record a Simulation Edit a Text Capture Template 2 - OBJECT STYLES, PROJECT SHARING, AND BRANCHING Create a New Style Apply an Object Style Globally Export and Import an Object Style Name a Slide Copy/Paste Project Assets Use Buttons to Create a Branch Explore the Branching View Create a Branch Group 3 - VARIABLES AND WIDGETS Add Project Information Insert a System Variable Edit a System Variable Create a User Variable Use a Variable to Gather Learner Data Insert and Format a Widget 4 - INTERACTIVE VIDEOS AND VIRTUAL REALITY Insert an Interactive Video Add Bookmarks Add Slide Overlays Create a Virtual Reality Project Add a Text Hotspot Add an Audio Hotspot Add a Quiz to a Virtual Reality Project 5 - INTERACTIONS Insert a Process Circle Create a Basic Drag and Drop Interaction Manage Drag and Drop Buttons and Write Captions Create a ?Trick? Retry Slide Explore an Advanced Drag and Drop Project Create an Advanced Drag and Drop Interaction Change the States of a Smart Shape Use States to Swap Images 6 - ACCESSIBLE ELEARNING Set Document Information Enable Accessibility Add Accessibility Text to Slides Import Slide Audio Add Shortcut Keys Add Closed Captions Set a Tab Order 7 - ADVANCED ACTIONS Use a Completed Action Name Objects Create a Mask Control Object Visibility Create a Standard Advanced Action, Attach an Action to a Button Group Timeline Objects Create a Variable Create a Conditional Action Create Decision Blocks 8 - PROJECT TEMPLATES AND MASTER SLIDES Work with the Main Master Slide Work with Content Masters Apply a Master to Filmstrip Slides Edit a Master Apply a Theme Create a Custom Theme Review a Template Create a Project Based on a Template Create a Project Template 9 - RESPONSIVE PROJECTS Customize Breakpoints Save a Standard Project As Responsive Insert and Name Fluid Boxes Resize Fluid Boxes Add Content to Fluid Boxes Switch Modes Use the Position Inspector Modify a Single Breakpoint Exclude from View Add a New Breakpoint Position and Link Objects Edit Breakpoint Object Styles 10 - REPORTING RESULTS Set Quiz Reporting Options Create a Manifest File Report a Button Interaction Adjust Slide Object Interaction Preview in SCORM Cloud Publish a Content Package Create an Inquisiq LMS Account Create an LMS Course Attach a Lesson to a Course Test an eLearning Course Additional course details: Nexus Humans Adobe Captivate 2019 - Beyond The Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Captivate 2019 - Beyond The Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview This comprehensive course on Train the Trainer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Train the Trainer comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Train the Trainer. It is available to all students, of all academic backgrounds. Requirements Our Train the Trainer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 35 sections • 98 lectures • 18:47:00 total length •Introduction to Trainer Bootcamp: 00:13:00 •What Makes a Great Trainer?: 00:18:00 •Make Them Feel Safe Before Class Introduction: 00:05:00 •Make Comfortable Small Talk - Part 1: 00:17:00 •Make Comfortable Small Talk - Part 2: 00:20:00 •Make Comfortable Small Talk - Activity Feedback: 00:09:00 •Make an Impressive First Impression: 00:15:00 •Give Last Minute Reminders - Part 1: 00:19:00 •Give Last Minute Reminders - Part 2: 00:15:00 •Give Your Introduction - Part 1: 00:18:00 •Give Your Introduction - Part 2: 00:20:00 •Give Your Introduction - Part 3: 00:00:00 •Find Out About Them: 00:18:00 •Reveal the Takeaways: 00:13:00 •Set Boundaries and Expectations - Part 1: 00:18:00 •Set Boundaries and Expectations - Part 2: 00:06:00 •Give the Lesson Hook: 00:07:00 •Do an Oral Review - Part 1: 00:17:00 •Do an Oral Review - Part 2: 00:04:00 •Send Them to Break: 00:04:00 •Walk and Talk During Break: 00:11:00 •Bring Them Back From Break: 00:13:00 •Workbook - Train the Trainer - Part 1: 00:00:00 •Introduction: 00:11:00 •Build Pre-Activity Credibility and Rapport: 00:15:00 •Hook the Trainees on the Activity - Part 1: 00:15:00 •Hook the Trainees on the Activity - Part 2: 00:12:00 •Craig Czarnecki - 1-3 Get Buy-In for the Activity: 00:06:00 •Craig Czarnecki - 1-1 Part 1 Activity - Get Buy In for the Activity: 00:11:00 •Craig Czarnecki - 2-1 Find Trainees Who Need Help: 00:10:00 •Craig Czarnecki - 2-2 Find Trainees Who Need Help: 00:19:00 •Craig Czarnecki - 2-3 Activity Find Trainees Who Need Help: 00:18:00 •Craig Czarnecki - 3-1 Activity Tutor Effectively During Activities: 00:17:00 •Craig Czarnecki - 3-2 Tutor Effectively During Activities: 00:11:00 •Craig Czarnecki - 3-3 Tutor Effectively During Activities: 00:20:00 •Craig Czarnecki - 3-4 Activity Tutor Effectively During Activities: 00:19:00 •Craig Czarnecki - 3-5 Activity Tutor Effectively During Activities: 00:09:00 •Craig Czarnecki - 4-1 Manage the Activity Pace: 00:17:00 •Craig Czarnecki - 4-2 Activity Manage the Activity Pace: 00:14:00 •Craig Czarnecki - 5 Activity Prepare to Lead an Activity: 00:18:00 •Craig Czarnecki - Activity Highlight Video: 00:00:00 •Workbook - Training on Facilitating Classroom Activity: 00:00:00 •0.1 Craig Czarnecki - Coach Intro Part 1: 00:19:00 •0.2 Craig Czarnecki - Coach Intro Part 2: 00:07:00 •1.1 Craig Czarnecki - Coach Learn About the Trainer - Recognize the Trainers Strengths: 00:13:00 •1.2 Craig Czarnecki - Coach Learn About the Trainer - Gauge areas for improvement: 00:07:00 •1.3 Craig Czarnecki - Coach Learn About the Trainer - Identify what's Important to the trainer: 00:03:00 •1.4 Craig Czarnecki - Coach Identify the Trainers Style: 00:01:00 •2.1 Craig Czarnecki - Coach Create Initial Value for the Trainer - Create Deliverables for the kickoff meeting: 00:08:00 •2.2 Craig Czarnecki - Coach Create Initial Value for the Trainer - Create a hook for the kickoff meeting: 00:10:00 •2.3 Craig Czarnecki - Coach Create Initial Value for the Trainer - Prepare for the kickoff meeting: 00:07:00 •3.1.1 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 1: 00:10:00 •3.1.2 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 2: 00:14:00 •3.1.3 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 3: 00:16:00 •3.2.1 Craig Czarnecki - Make a Good First Impression - Discuss the Process for Trainer Growth Part 1: 00:12:00 •3.2.2 Craig Czarnecki - Make a Good First Impression - Discuss the Process for Trainer Growth part 2: 00:12:00 •4.1 Craig Czarnecki - Observe the Trainer in the Classroom - Prepare for the Classroom Observation: 00:15:00 •4.2.1 Craig Czarnecki - Observe the Trainer in the Classroom - Master 7 Keys to Effective Note-Taking Part 1: 00:14:00 •4.2.2 Craig Czarnecki - Observe the Trainer in the Classroom - Master 7 Keys to Effective Note-Taking Part 2: 00:14:00 •4.3 Craig Czarnecki - Observe the Trainer in the Classroom - Apply 4 Quick Steps to Classroom Oberserations: 00:09:00 •4.4.1 Craig Czarnecki - Observe trainer activity part 1: 00:19:00 •4.4.2 Craig Czarnecki - Observe trainer activity part 2: 00:18:00 •5.1.1 Craig Czarnecki - Write a Classroom Observation Summary - Identify Strengths and Areas for Improvement Part 1: 00:12:00 •5.1.2 Craig Czarnecki - Write a Classroom Observation Summary - Identify Strengths and Areas for Improvement part 2: 00:13:00 •5.2.1 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 1: 00:19:00 •5.2.2 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 2: 00:17:00 •5.2.3 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 3: 00:18:00 •5.3 Craig Czarnecki - Write a Classroom Observation - Record the Main Strength of the Trainer: 00:35:00 •Introduction and Welcome: 00:00:00 •Open Well: 00:27:00 •Communicate Effectively: 00:15:00 •Provide In Class Support: 00:17:00 •Workbook - Train the Trainer Coliseum: How to Train Very Large Classes: 00:00:00 •Introduction and Welcome: 00:19:00 •Take Good Care Of Yourself: 00:06:00 •Manage Your Stress: 00:09:00 •Anticipate Unexpected Issues: 00:08:00 •Get Help And Make It Helpful: 00:00:00 •Help Them Get It: 00:14:00 •Manage Large Classes: 00:09:00 •Have Fun Your Way: 00:13:00 •Control Tough Customers: 00:10:00 •Engage Adult Students With Ease: 00:02:00 •Interpret Your Feedback: 00:02:00 •Wrap Up Questions And Answers: 00:04:00 •Introduction and Welcome: 00:06:00 •Hog-Tie the Talk Hogs: 00:20:00 •Give the Experts the Spotlight: 00:12:00 •Simmer Down the Know-it-Alls: 00:11:00 •Placate Resenters - Part 1: 00:11:00 •Placate Resenters - Part 2: 00:14:00 •Handle the Fault-Finders: 00:11:00 •Shut Down the Hecklers: 00:10:00 •Stimulate Stubborn Passivists: 00:06:00 •Engage the Distracted Inefficient: 00:07:00 •Workbook - Train the Trainer Serenity Course: 00:00:00 •Assignment - Train the Trainer: 00:00:00 •Order Your Certificate: 00:00:00
Duration 4 Days 24 CPD hours This course is intended for Technical professionals with basic system administration skills and operators responsible for managing virtual machines using VMware ESXi⢠and VMware vCenter Server Overview By the end of the course, you should be able to meet the following objectives: Describe virtualization and virtual machines Describe vSphere components and the software-defined data center (SDDC) Explain the concepts of server, network, and storage virtualization Monitor network and datastore configurations in VMware vSphere Client⢠Deploy, configure, and clone virtual machines Migrate, monitor, and manage virtual machines Monitor tasks and events in VMware vSphere Client⢠Recognize how vSphere DRS and VMware vSphere High Availability improve performance and availability of a vSphere cluster This three-day, hands-on training course is an introduction to VMware vSphere©. In this course, you acquire the skills needed to perform Day 2 operational tasks that are typically assigned to the roles of operator or junior administrator in a vSphere environment. Course Introduction Introductions and course logistics Course objectives Virtualization and vSphere Concepts Describe how virtual machines (VMs) work Recognize the purpose of a hypervisor Describe how VMs share resources in a virtualized environment Recognize the components of an SDDC Describe the relationship between vSphere, the SDDC, and cloud computing Recognize the functions of the components in a vSphere environment Access and view vSphere graphical user interfaces Identify VMware solutions that integrate with vSphere in the SDDC Navigating the vSphere Client View and organize the inventory objects managed by vCenter Server Add and assign vSphere licenses Change the log level of vCenter Server Edit the startup policy of ESXi services Describe how vCenter Server roles and permissions work Add permissions to virtual machines Lifecycle of Virtual Machines Add and remove VM virtual hardware components Identify the purpose of different VM files Configure VM settings Create and delete virtual machines Recognize the benefits of installing VMware Tools? Install VMware Tools into a guest operating system Upgrade VMware Tools and VM hardware compatibility vSphere Networking Describe virtual networking Recognize ways that virtual switches connect VMs and ESXi hosts to the network View components and properties of a vSphere standard switch configuration View a vSphere distributed switch configuration in vSphere Client Recognize when and how to use the settings for the security networking policy Recognize when and how to use the settings for the traffic shaping networking policy Describe how the NIC teaming and failover policy helps maintain network connectivity Perform basic checks to diagnose VM connectivity issues vSphere Storage Describe the function of a datastore Recognize types of vSphere datastores View datastore information in vSphere Client Monitor datastore usage in vSphere Client Virtual Machine Management Recognize the benefits of using VM templates Create and update a VM template Deploy a VM from an existing template Clone a virtual machine Recognize how to use guest OS customization specifications Deploy VMs from a content library Deploy a virtual appliance from an OVF template Perform a hot and cold migrations of VMs Identify requirements for using VMware vSphere© Storage vMotion© Perform a vSphere Storage vMotion migration Identify use cases for VM snapshots Create and manage snapshots of a virtual machine Resource Monitoring Recognize the purpose of each type of VM resource control Configure the resource allocation settings of a VM Observe the behavior of virtual machines with different share values Manage and acknowledge vSphere alarms Use performance charts to monitor VM CPU and memory usage Monitor tasks and events in vSphere Client vSphere Clusters View information about the services that a vSphere cluster offers Recognize how vSphere HA responds to different types of failures Monitor vSphere HA during a host failure Describe how vSphere DRS works Interpret DRS scores given to VMs Recognize how to apply the appropriate vSphere DRS automation and migration threshold levels Describe how vSphere Fault Tolerance works Recognize how Enhanced vMotion Compatibility works Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Data Center Virtualization: Core Technical Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Data Center Virtualization: Core Technical Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Storage and virtual infrastructure administrators who are responsible for production support and administration of VMware vSAN 7. Overview By the end of the course, you should be able to meet the following objectives: Define the tasks involved in vSAN node management Updating and upgrading vSAN using VMware vSphere Lifecycle Manager⢠Explain vSAN resilience and data availability features Reconfigure vSAN storage policies and observe the cluster-wide impact Perform vSAN cluster scale-out and scale-up operations Describe common vSAN cluster maintenance operations Control vSAN resync operations Configure vSAN storage efficiency and reclamation features Use VMware Skyline⢠Health to monitor cluster health, performance, and storage capacity Describe vSAN security operations Configure vSAN Direct for cloud native applications Configure remote vSAN datastore and vSAN native file services Manage two-node cluster and stretched cluster advance operations In this three-day course, you learn about managing and operating VMware vSAN? 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as, vSAN node management, cluster maintenance, security operations and advanced vSAN cluster operations. You also gain practical experience through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Node Management Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades vSAN Resilience and Data Availability Operations Describe vSAN storage policies Recognize the impact of a vSAN storage policy change Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configure the vSAN fault domains vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Cluster Performance Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server (KMS) vSAN Direct Discuss the use cases for vSAN Direct Understand the overall architecture of vSAN Direct Describe the workflow of vSAN Direct datastore creation Explore how vSAN Direct works with storage policy tagging Remote vSAN Discuss the use cases for remote vSAN Understand the high-level architecture Describe remote datastore operations Discuss the network requirement Interoperability between remote vSAN and VMware vSphere© High Availability vSAN Native File Service Discuss the use cases for vSAN file service Understand the high-level architecture of vSAN file service Discuss the authentication model Configure file shares Monitor file share health and capacity utilization Manage Advanced vSAN Cluster Operations Describe the architecture for stretched clusters and two-node clusters Understand the importance of witness node Describe how stretched cluster storage policies affect vSAN objects Create and apply a vSAN stretched cluster policy to meet specific needs Discuss stretched cluster failure scenarios and responses Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Management and Operations [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Management and Operations [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.1 course helps you prepare for the Cisco© CCNP© Data Center and CCIE© Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System? (Cisco UCS©) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. Implementing Data Center Switching Protocols Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies (Self-study) Power On Auto Provisioning Cisco Data Center Network Manager Overview Additional course details: Nexus Humans Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.