Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Developers and architects who will be developing applications for iOS devices. In this course you'll be shown a complete introduction to iPhone and iPad development, emphasizing the newest technologies and best practices for iOS. Introduction & Setup Start Here Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement An Overview of Swift Functions The Basics of Object Oriented Programming in Swift An Introduction to Swift Subclassing and Extensions Working with Array and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, & Storyboards iOS Application and Development Architecture Creating an Interactive iOS App Understanding Views, Windows and the View Hierarchy An Introduction to Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Trait Variations to Design Adaptive User Interfaces Using Storyboards in Xcode An Overview of iOS Table Views Using Xcode Storyboards to Build Dynamic TableViews Implementing TableView Navigation Working with the iOS Stack View Class A Guide to Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController Data Storage with Files, iCloud, & Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite Working with iOS Databases using Core Data CloudKit Data Storage on iOS Touch, Taps, & Gestures An Overview of iOS Multitouch, Taps and Gestures An Example iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS 3D Touch Implementing TouchID Authentication in iOS Apps Advanced View Options Drawing iOS 2D Graphics with Core Graphics Interface Builder Live Views and iOS Embedded Frameworks Using Core Graphics and Core Image iOS Animation using UIViewPropertyAnimator iOS UIKit Dynamics iOS Sprite Kit Programming iOS Multitasking, Background Transfer Service and Fetching iOS Application State Preservation and Restoration Integrating Maps into iOS Applications Getting Location Information using the iOS Core Location Framework Extensions An Introduction to Extensions in iOS An iOS Today Extension Widget Tutorial Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Building iOS Message Apps Using Event Kit to Create Date and Location Based Reminders Multimedia and Social Media Accessing the iOS Camera and Photo Library iOS Video Playback using AVPlayer and AVPlayerViewController An iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder iOS Speech Recognition Introduction to SiriKit Integrating Twitter and Facebook into iOS Applications The App Store Making Store Purchases with SKStoreProductViewController Class Building In-App Purchasing into iOS Applications Configuring and Creating App Store Hosted Content for iOS In-App Purchases Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iOS App Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iOS App Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence⢠and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience
Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager⢠and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.
Duration 3 Days 18 CPD hours There are good reasons Adobe Premiere Pro is such a popular post-production video editing software application. It excels for a wide variety of uses; tapeless and DSLR footage; cross-platforms, open workflows for easy collaboration, powerful metadata features for greater editing and production efficiency, plus real-time 3D editing and Virtual Reality. This four-day course is ideal for beginners, as well as Final Cut Pro and Avid editors - or for anyone who is involved in a content creation environment. Adobe Premiere Interface Performing Nonlinear Editing in Premiere Pro Looking at the Standard Digital Video Workflow Enhancing the Workflow with Premiere Pro Expanding the Workflow Incorporating other Components into the Editing Workflow Adobe Creative Cloud Video Workflow Touring the Premiere Pro Workspace Looking at the Workspace Layout Customizing the Workspace Introducing Preferences Keyboard Shortcuts Moving, Backing up, and Syncing User Settings Setting up a Project Setting up a Sequence Setting up the Timeline Importing Media Importing Assets Working with ingest Options and Proxy Media Working with the Media Browser Importing Images Using Adobe Stock Customizing the Media Cache Recording a Voice-over Organizing Media Project Panel Working with Bins Monitoring Footage Modifying Clips Mastering the Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential Editing Commands Working with Clips and Markers Using Program Monitor Controls Setting the Playback Resolution Playing back VR Video Using Markers Using Sync Lock and Track Lock Finding Gaps in the Timeline Selecting Clips Moving Clips Extracting and Deleting Segments Adding Transitions Understanding Transitions Edit points and Handles Adding Video Transitions Using A/B mode to Fine-tune a Transition Adding Audio Transitions Performing Advanced Editing Techniques Performing Three or Four-point Editing Changing Playback Speed Replacing Clips and Footage Nesting Sequences Performing Regular Trimming Performing Advanced Trimming Trimming in the Program Monitor Putting Clips in Motion Adjusting the Motion Effect Changing Clip Position, Size, and Rotation Working with Keyframe Interpolation Using other Motion-related Effects Multi-camera Editing Following the Multi-camera Process Creating a Multi-camera Sequence Switching Multiple Cameras Finalizing Multi-camera Editing Editing and Mixing Audio Setting up the Interface to Work with Audio Examining Audio Characteristics Creating a Voice-over Scratch Track Adjusting Audio Volume Normalizing Audio Creating a Split Edit Adjusting Audio Levels for a Clip Sweetening Sound Sweetening Sound with Audio Effects Adjusting EQ Cleaning up Noisy Audio Fading Audio with Essential Sounds Adding Video Effects Working with Effects Master Clip Effects Masking and Tracking Visual Effects Keyframing Effects Effect Presets Frequently Used Effects Improving Clips with Color Correction and Grading Following a Color-oriented Workflow An overview of Color-oriented Effects Fixing Exposure Problems Fixing Color Balance Using Special Color Effects Creating a Look Exploring Compositing Techniques Understanding an Alpha Channel Making Compositing Part of Your Projects Working with the Opacity Effect Working with Alpha-channel Transparencies Color Keying a Green Screen Shot Using Mattes Creating Titles An Overview of Shapes & Type Loading in Graphics Using the Essentials Graphic Panel Browsing Templates Saving Templates Mastering Video Typography Essentials Creating Titles Stylizing Text Making Text Roll and Crawl Introducing Captions Managing Your Projects Using the File menu Using the Project Manager Performing the Final Project Management Steps Importing Projects or Sequences Managing Collaboration Using the Libraries Panel Managing Your Hard Drives Exporting Frames, Clips, and Sequences Overview of Export Options Exporting Single Frames Exporting a Master Copy Working with Adobe Media Encoder Uploading to Social Media Exchanging with Other Editing Applications Additional course details: Nexus Humans Adobe Premiere Pro training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Premiere Pro course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.