Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview - You will learn advanced Adobe Captivate concepts. - You will learn to create highly interactive software simulation and to control the text that appears in the recording?s text captions by editing Captivates text capture templates. - You will create responsive lessons (using Fluid Boxes and Breakpoints) that automatically reflow to fit just about any kind of display including desktops, laptops, tablets, and smart phones. - Learn new features that Captivate now supports; such as, Virtual Reality with 360-degree images and videos along with interactive videos. - Fine-tune your Captivate production skills by leveraging object styles, master slides, themes, and advanced actions. - Engage your learners by adding variables, widgets, and learner interactions (including drag and drop) to your eLearning. - Learn to create object styles, apply them globally, and import and export them. Knock large projects down to size by learning to create branch groups. - Create branching scenarios that allow learners to plot their own path through your course. - You will also learn to create templates. - Ensure your eLearning can be used by people with disabilities by adding such 508-compliant features as accessibility text, keyboard shortcuts, and closed captions. - Enable Captivates reporting features and, along the way, learn about Learning Management Systems, SCORM, SCOs, Manifests, and content packages. A course that teaches the higher-end, more advanced functionality of Adobe Captivate 2019. 1 - INTERACTIVE SOFTWARE SIMULATIONS AND CAPTION PRE-EDITING Rehearse a Script Set Recording Preferences Record a Simulation Edit a Text Capture Template 2 - OBJECT STYLES, PROJECT SHARING, AND BRANCHING Create a New Style Apply an Object Style Globally Export and Import an Object Style Name a Slide Copy/Paste Project Assets Use Buttons to Create a Branch Explore the Branching View Create a Branch Group 3 - VARIABLES AND WIDGETS Add Project Information Insert a System Variable Edit a System Variable Create a User Variable Use a Variable to Gather Learner Data Insert and Format a Widget 4 - INTERACTIVE VIDEOS AND VIRTUAL REALITY Insert an Interactive Video Add Bookmarks Add Slide Overlays Create a Virtual Reality Project Add a Text Hotspot Add an Audio Hotspot Add a Quiz to a Virtual Reality Project 5 - INTERACTIONS Insert a Process Circle Create a Basic Drag and Drop Interaction Manage Drag and Drop Buttons and Write Captions Create a ?Trick? Retry Slide Explore an Advanced Drag and Drop Project Create an Advanced Drag and Drop Interaction Change the States of a Smart Shape Use States to Swap Images 6 - ACCESSIBLE ELEARNING Set Document Information Enable Accessibility Add Accessibility Text to Slides Import Slide Audio Add Shortcut Keys Add Closed Captions Set a Tab Order 7 - ADVANCED ACTIONS Use a Completed Action Name Objects Create a Mask Control Object Visibility Create a Standard Advanced Action, Attach an Action to a Button Group Timeline Objects Create a Variable Create a Conditional Action Create Decision Blocks 8 - PROJECT TEMPLATES AND MASTER SLIDES Work with the Main Master Slide Work with Content Masters Apply a Master to Filmstrip Slides Edit a Master Apply a Theme Create a Custom Theme Review a Template Create a Project Based on a Template Create a Project Template 9 - RESPONSIVE PROJECTS Customize Breakpoints Save a Standard Project As Responsive Insert and Name Fluid Boxes Resize Fluid Boxes Add Content to Fluid Boxes Switch Modes Use the Position Inspector Modify a Single Breakpoint Exclude from View Add a New Breakpoint Position and Link Objects Edit Breakpoint Object Styles 10 - REPORTING RESULTS Set Quiz Reporting Options Create a Manifest File Report a Button Interaction Adjust Slide Object Interaction Preview in SCORM Cloud Publish a Content Package Create an Inquisiq LMS Account Create an LMS Course Attach a Lesson to a Course Test an eLearning Course Additional course details: Nexus Humans Adobe Captivate 2019 - Beyond The Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Captivate 2019 - Beyond The Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who want to learn how to program Android applications using the Java Programming Language. Overview Upon successful completion of this course, students will have an understanding of basic application Android development. This course will teach the basics of Android Development using the Java Programming Language and Android Studio. Introduction and Setup Android Studio Development Essentials Introduction Setting up an Android Studio Development Environment Creating an Example Android App in Android Studio A Tour of the Android Studio User Interface Creating an Android Virtual Device (AVD) in Android Studio Using and Configuring the Android Studio AVD Emulator Testing Android Studio Apps on a Physical Android Device The Basics of the Android Studio Code Editor Android Architecture and State Changes An Overview of the Android Architecture The Anatomy of an Android Application Understanding Android Application and Activity Lifecycles Handling Android Activity State Changes Android Activity State Changes by Example Saving and Restoring the State of an Android Activity Views and Layouts Understanding Android Views, View Groups and Layouts in Android Studio A Guide to the Android Studio Layout Editor Tool A Guide to the Android ConstraintLayout A Guide to using ConstraintLayout in Android Studio An Android Studio Layout Editor ConstraintLayout Tutorial Manual XML Layout Design in Android Studio Creating an Android User Interface in Java Code Event Handling An Overview and Example of Android Event Handling A Guide to using Instant Run in Android Studio Android Touch and Multi-touch Event Handling Detecting Common Gestures using Android Studio and the Gesture Detector Class Implementing Custom Gesture and Pinch Recognition on Android Advanced Layout and Transitions An Introduction Android Fragments Using Fragments in Android Studio - An Example Creating and Managing Overflow Menus on Android Animating User Interfaces with the Android Transitions Framework An Android Transition Tutorial using beginDelayedTransition Implementing Android Scene Transitions ? A Tutorial Working with the Floating Action Button and Snackbar Creating a Tabbed Interface using the TabLayout Component Working with the RecyclerView and CardView Widgets An Android RecyclerView and CardView Tutorial Working with the AppBar and Collapsing Toolbar Layouts Implementing an Android Navigation Drawer An Android Studio Master/Detail Flow Tutorial Intents, Threads, Services, and Notifications An Overview of Android Intents Android Explicit Intents ? A Worked Example Android Implicit Intents ? A Worked Example Android Broadcast Intents and Broadcast Receivers A Basic Overview of Threads and Thread Handlers An Overview of Android Started and Bound Services Implementing an Android Started Service - A Worked Example Android Local Bound Services - A Worked Example Android Remote Bound Services - A Worked Example An Android 7 Notifications Tutorial An Android 7 Direct Reply Notification Tutorial Data Access and Storage Integrating Firebase Support into an Android Studio Project An Android 7 Firebase Remote Notification Tutorial An Introduction to Android 7 Multi-Window Support An Android Studio Multi-Window Split-Screen and Freeform Tutorial An Overview of Android SQLite Databases in Android Studio An Android TableLayout and TableRow Tutorial An Android SQLite Database Tutorial Understanding Android Content Providers Implementing an Android Studio Content Provider in Android Studio Accessing Cloud Storage using the Android Storage Access Framework An Android Storage Access Framework Example Multimedia, Maps and Printing Video Playback on Android VideoView and MediaController Classes Video Recording and Image Capture using Camera Intents Making Runtime Permission Requests in Android Android Audio Recording and Playback using MediaPlayer and MediaRecorder Working with the Google Maps Android API in Android Studio Printing with the Android Printing Framework An Android HTML and Web Content Printing Example A Guide to Android Custom Document Printing Final Build An Android Fingerprint Authentication Tutorial Handling Different Android Devices and Displays Signing and Preparing an Android Application for Release Integrating Google Play In-app Billing into an Android Application An Overview of Gradle in Android Studio An Android Studio Gradle Build Variants Example Additional course details: Nexus Humans Android Studio Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Studio Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of C++ and object-oriented programming concepts. This course is for Non-Developers, or anyone who wants to have a basic understanding of and learn how to code C++ applications and syntax Overview Companies are constantly challenged to keep their applications, development projects, products, services (and programmers!) up to speed with the latest industry tools, skills, technologies and practices to stay ahead in the ever-shifting markets that make up today's fiercely competitive business landscape. The need for application, web and mobile developers and coders is seemingly endless as technologies regularly change and grow to meet the modern needs of demanding industries and clients. C++ and Programming Basics for Non-Programmers is a five-day, basic-level training course geared for IT candidates who have little or no prior experience in computer programming. Throughout this gentle introduction to programming and C++, students will learn to create applications and libraries using C++ using best practices and sound OO development techniques for writing object-oriented programs in C++. Special emphasis is placed on object-oriented concepts and best practices throughout the training. Fundamentals of the Program Development Cycle Computer Architecture The Notion of Algorithms Source Code vs. Machine Code Compile-Time vs. Run-Time Software Program Architecture Standalone Client/Server Distributed Web-Enabled IDE (Interactive Development Environment) Concepts Looping Constructs Counter-Controlled Repetition Sentinel-Controlled Repetition Nested Control Constructs break and continue Statements Structured Programming Best Practices Writing Methods (Functions) Static vs. Dynamic Allocation Declaring Methods Declaring Methods with Multiple Parameters Method-Call Stack Scope of Declarations Argument Promotion and Casting Designing Methods for Reusability Method Overloading Arrays Purpose of Arrays Declaring and Instantiating Arrays Passing Arrays to Methods Multidimensional Arrays Variable-Length Argument Lists Using Command-Line Arguments Using Environment Variables Deeper Into Classes and Objects Controlling Access to Class Members Referencing the Current Object Using this Overloading Constructors Default and No-Argument Constructors Composition of Classes Garbage Collection and Destructors The finalize Method Static Class Members Defining Classes Using Inheritance Application Development Fundamentals Structure of a C++ Program Memory Concepts Fundamental Data Type Declarations Fundamental I/O Concepts Fundamental Operators Arithmetic Operators Logical Operators Precedence and Associativity Building and Deploying a C++ Program Superclasses and Subclasses Advantages of Using Inheritance protected Class Members Constructors in Subclasses Increasing Convenience by Using Polymorphism Purpose of Polymorphic Behavior The Concept of a Signature Abstract Classes and Methods final Methods and Classes Purpose of Interfaces Using and Creating Interfaces Common Interfaces of the C++ API Files and Streams Concept of a Stream Class File Sequential Access Object Serialization to/from Sequential Access Files Fundamental Searching and Sorting Introduction to Searching Algorithms Linear Search Binary Search Introduction to Sorting Algorithms Selection Sort Insertion Sort Merge Sort Fundamental Data Structures Dynamic Memory Allocation Linked Lists Stacks Queues Trees Exception Handling Types of Exceptions Exception Handling Overview Introduction to Classes and Objects Classes, Objects and Methods Object Instances Declaring and Instantiating a C++ Object Declaring Methods set and get Methods Initiating Objects with Constructors Primitive Types vs. Reference Types Flow Control Conditional Constructs Exception Class Hierarchy Extending Exception Classes When to Throw or Assert Exceptions Formatted Output printf Syntax Conversion Characters Specifying Field Width and Precision Using Flags to Alter Appearance Printing Literals and Escape Sequences Formatting Output with Class Formatter Strings, Characters and Regular Expressions Fundamentals of Characters and Strings String Class String Operations StringBuilder Class Character Class StringTokenizer Class Regular Expressions Regular Expression Syntax Pattern Class Matcher Class Fundamental GUI Programming Concepts Overview of Swing Components Displaying Text and Graphics in a Window Event Handling with Nested Classes GUI Event Types and Listener Interfaces Mouse Event Handling Layout Managers Additional course details: Nexus Humans C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This section specifies the primary and secondary target audiences of this course by job roles and notes the relevance to each job role. Collaboration Engineers and Administration Primary audiences: Collaboration engineers involved in the design, implementation, and troubleshooting of Cisco collaboration core technologies. Secondary audiences: Administration involved in support and troubleshooting of Cisco collaboration technologies. Overview Upon completing this course, you will be able to meet these objectives: Describe the Cisco Expressway - C features and functionality within the collaboration architecture Configure and troubleshoot Cisco Unified Communications Manager and Cisco expressway Series integration Describe the Cisco Expressway - C additional features Configure and troubleshoot Cisco Collaboration solutions for B2B calls Describe how to secure B2B communication with Cisco Expressway Series Describe the MRA feature Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco IM&P Configure Cisco Webex Hybrid Services This course provides students knowledge about Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Configuring and Troubleshooting the Cisco Expressway Series Cisco Expressway Series Architecture Discovery 1: Deploy virtualized Cisco Expressway Discovery 2: Perform the initial Cisco Expressway series configuration Describe SIP and H.323 in the Cisco Expressway series Describe interworking in the Cisco Expressway series Discovery 3: Register endpoints on Cisco Expressway series Zones Digital string manipulation Search rules Transforms Discovery 4: Call search history and registrations Troubleshoot call processing on Cisco Expressway series Discovery 5: Troubleshooting tools Backup and restore Rerference Configuring Cisco Expressway Additional Freatures Describe bandwidth management Hardening local endpoint registrations Discovery 6: Configure Cisco Expressway series bandwidth management and registration restrictions Discovery 7: Troubleshoot Cisco Expressway series endpoint registration and local dial plan Describe Cisco Expressway security and clustering features Discovery 8: Configure Cisco Expressway series security features Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series Cisco unified communications manager and Cisco Expressway-C integration overview Dian plan overview Call policy Discovery 9: Configure Cisco unified communications manager to connect with Cisco Expressway-C Troubleshooting options for Cisco unified communications manager and Cisco Expressway-C intergration Discovery 10: Troubleshoot Cisco unified communications manager and Cisco Expressway series integration Discovery 11: Configure and troubleshoot Cisco unified communications manager and Cisco Expressway series integration (practice activity) References Configuring and Troubleshooting Cisco Collaboration Solutions for Bussiness-to-Bussiness Describe supported services for B2B collaboration Describe prerequisites for business to business collaboration Call flow including Cisco unified communications manager endpoints Network address translation in a collaboration environment Discovery 12: Implement a B2B Cisco collaboration solution Cisco Expressway series B2B call troubleshooting Discovery 13: Troubleshoot B2B calls on the Cisco Expressway series References Discovery 14: Troubleshoot B2B calls on the Cisco Expressway series (practice activity) Securing Business-Business Communication Firewall Traversal Secure media Secure media between Cisco unified communications manager and Cisco Expressway series Toll fraud prevention Discovery 15: Secure a B2B Cisco collaboration communication Refrences Configuring and Troubleshooting Mobile and Remote Access Describe prerequisites for mobile and remote access Describe service discovery Explore Expressway settings for MRA Certificates HTTP proxy Cisco jabber registration procedure Cisco jabber registration procedure in Hybrid deployment Cisco jabber configuration file Discovery 16: Configure MRA on the Cisco Expressway series MRA troubleshooting Discovery 17: Troubleshoot MRA on the Cisco Expressway series Integrating and Securing Mobile and Remote Access Secure Cisco unified communications integration Cisco unity connection integration Cisco MRA access control options Additional Cisco MRA features Discovery 18: Configure MRA with additional application integrations References Configuring Cisco Webex Hybrid Services Cisco Webex teams Describe Cisco Webex control hub Describe Cisco Webhex hybrid media services Describe Cisco Expressway requirements for using hybrid call service connect Explore Cisco Expressway requirements for using hybrid call service connect Describe Cisco Webex video mesh Discovery 19: Prepare for Cisco Webex teams integration Discovery 20: Configure Cisco Webex hybrid services Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot with hands-on experience and a focus on fundamentals Overview By the end of the course, you should be able to meet the following objectives: Spring configuration using Java Configuration and Annotations Aspect oriented programming with Spring Testing Spring applications using JUnit 5 Spring Data Access - JDBC, JPA and Spring Data Spring Transaction Management Simplifying application development with Spring Boot Spring Boot auto-configuration, starters and properties Build a simple REST application using Spring Boot, embedded Web Server and fat JARs or classic WARs Implementing REST client applications using RestTemplate and WebClient Spring Security Enable and extend metrics and monitoring capabilities using Spring Boot actuator Utilize Spring Boot enhancements to testing This course offers hands-on experience with the major features of Spring and Spring Boot, which includes configuration, data access, REST, AOP, auto-configuration, actuator, security, and Spring testing framework to build enterprise and microservices applications. On completion, participants will have a foundation for creating enterprise and cloud-ready applications. Introduction to Spring Java configuration and the Spring application context @Configuration and @Bean annotations @Import: working with multiple configuration files Defining bean scopes Launching a Spring Application and obtaining Beans Spring JAVA Configuration: A Deeper Look External properties & Property sources Environment abstraction Using bean profiles Spring Expression Language (SpEL) Annotation-based Dependency Injection Component scanning Autowiring using @Autowired Java configuration versus annotations, mixing. Lifecycle annotations: @PostConstruct and @PreDestroy Stereotypes and meta-annotations Factory Pattern in Spring Using Spring FactoryBeans Advanced Spring: How Does Spring Work Internally? The Spring Bean Lifecycle The BeanFactoryPostProcessor interception point The BeanPostProcessor interception point Spring Bean Proxies @Bean method return types Aspect-oriented programming What problems does AOP solve? Defining pointcut expressions Implementing various types of advice Testing a Spring-based Application Spring and Test-Driven Development Spring 5 integration testing with JUnit 5 Application context caching and the @Dirties Context annotation Profile selection with @Active Profiles Easy test data setup with @Sql Data Accss and JDBC with Spring How Spring integrates with existing data access technologies Data Access Exception hierarchy Spring?s Jdbc Template Database Transactions with Spring Transactions overview Transaction management with Spring Transaction propagation and rollback rules Transactions and integration testing Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using Command Line Runner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application Spring Security Oauth (Optional Topic) OAuth 2 Overview Implementing OAuth 2 using Spring Security OAuth Reactive Applications with Spring (Optional Topic) Overview of Reactive Programming concepts Reactive Programming support in Spring Using Spring?s reactive WebClient Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring: Core Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring: Core Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.1 course helps you prepare for the Cisco© CCNP© Data Center and CCIE© Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System? (Cisco UCS©) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. Implementing Data Center Switching Protocols Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies (Self-study) Power On Auto Provisioning Cisco Data Center Network Manager Overview Additional course details: Nexus Humans Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.