Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text
Master Emotional Intelligence for Crucial Moments Course Overview: "Master Emotional Intelligence for Crucial Moments" is an in-depth course designed to enhance your emotional intelligence (EQ) to handle critical situations with clarity and confidence. Throughout this course, you will develop the skills to manage your emotions effectively, understand others’ emotions, and use these insights to navigate complex interactions. Learners will explore key emotional intelligence concepts, gaining the ability to apply them during high-pressure moments. This course equips you with the tools to improve decision-making, strengthen leadership qualities, and handle crises with emotional composure. By the end, you’ll be able to influence outcomes positively in both personal and professional settings, enhancing your overall interpersonal effectiveness. Course Description: This course offers comprehensive insights into mastering emotional intelligence, focusing on its application during crucial moments. You will explore how EQ can be used to pause and reflect, understand emotional triggers, and manage stress in critical situations. Topics such as taming emotional responses, using EQ in leadership, and emotional regulation in times of crisis are central to the course. Learners will engage with various tools and strategies that support emotional self-awareness, empathy, and leadership. By developing these skills, learners will gain an enhanced ability to maintain composure, inspire others, and lead with emotional intelligence in high-stakes environments. This course provides essential skills for those aiming to excel in leadership, communication, and conflict resolution, ensuring they remain calm and focused in the most challenging moments. Master Emotional Intelligence for Crucial Moments Curriculum: Module 01: The Crucial EQ Moment - It's In The Pause Module 02: Use Emotional Intelligence To Tame Your Brain And Cope During Crises Module 03: Emotionally Intelligent Leadership In Action (See full curriculum) Who is this course for? Individuals seeking to enhance their emotional intelligence for career growth. Professionals aiming to improve leadership and crisis management skills. Beginners with an interest in emotional intelligence and personal development. Anyone looking to strengthen their interpersonal skills in high-pressure situations. Career Path: Leadership Roles Conflict Resolution Specialist Human Resources Manager Executive Coach Organisational Development Consultant Crisis Management Advisor
Proofreading & Copyediting Level 5 Course Overview This Proofreading & Copyediting Level 5 course offers an in-depth understanding of the essential skills required for proofreading and copyediting. Learners will explore key techniques for enhancing text accuracy, consistency, and clarity. Through detailed lessons, this course covers proofreading basics, the application of style guides, grammatical rules, and the intricacies of copyediting. Learners will also gain knowledge in legal checks and how to develop a successful career in this field. By the end of the course, participants will have a solid foundation in proofreading and editing, enabling them to produce high-quality written content that meets industry standards. Course Description This comprehensive course dives into the world of proofreading and copyediting, focusing on fundamental skills and advanced techniques. Learners will examine key concepts like applying style guides, understanding grammar rules, and maintaining text accuracy. Modules cover proofreading both on paper and on-screen, copyediting for language use, accuracy, and legal checks. A significant part of the course involves developing an understanding of professional editing practices, which will enable learners to work in various industries such as publishing, marketing, and legal sectors. The course structure is designed to offer a gradual progression, helping learners to refine their skills and gain confidence in producing error-free and well-polished content. Proofreading & Copyediting Level 5 Curriculum Module 01: Proofreading Basics Module 02: Applying the Style Guide Module 03: Spelling and Grammar Module 04: Proofreading on Paper Module 05: Proofreading On-Screen Module 06: Copy-Editing Basics Module 07: Copy-Editing – The Use of Language Module 08: Copy-Editing – Checking Accuracy and Facts Module 09: Copy-Editing – The Beginning and The End Module 10: Copy-Editing – Legal Checks Module 11: Finding Work and Developing Your Career (See full curriculum) Who is this course for? Individuals seeking to improve their proofreading and editing skills. Professionals aiming to advance in editing and publishing careers. Beginners with an interest in editing and writing industries. Anyone seeking to refine their written communication. Career Path Proofreader Copyeditor Content Editor Publishing Assistant Editorial Assistant Freelance Proofreader/Copyeditor Legal Proofreader Publishing Manager
Report Writing Course Overview This comprehensive course in report writing is designed to equip learners with the skills needed to write clear, structured, and effective reports in any professional setting. Covering essential topics such as planning, research, writing, and presentation, the course provides a solid foundation for producing high-quality reports. Learners will develop an understanding of grammar, punctuation, and the use of visual aids, such as tables and graphs, to enhance their reports. By the end of the course, participants will have the ability to create well-structured, concise, and informative reports suited to various industries. Course Description The course delves into the core principles of report writing, beginning with an introduction to the basics and progressing through the stages of planning, preparation, and writing. Learners will explore research techniques and how to collect relevant information effectively. Emphasis is placed on developing an organised structure for reports and revising for clarity and accuracy. The course also covers the technical aspects of grammar and punctuation, the inclusion of visual data, and proposal writing, enabling learners to present their findings professionally. With guidance on creative thinking, learners will refine their ability to approach report writing with a strategic mindset, ensuring their work is impactful and relevant in any workplace. Report Writing Curriculum Module 01: The Basics of Report Writing Module 02: Planning for Report Writing Module 03: Preparation for Report Writing Module 04: Research and Information Collection Module 05: Writing and Revising the Report Module 06: English Grammar and Punctuation Guide for Report Writing Module 07: Using Tables, Charts and Graphs in a Report Module 08: Proposal Writing Module 09: Presentation of the Report Module 10: Developing Creative Thinking and Creativity Module 11: Quick Check While Writing a Report (See full curriculum) Who is this course for? Individuals seeking to improve their report writing skills. Professionals aiming to enhance their report presentation abilities. Beginners with an interest in learning effective report writing. Those wishing to develop the skills necessary for clear communication in the workplace. Career Path Report Writer Business Analyst Technical Writer Project Manager Administrative Support Research Assistant
Customer Service - Representative Course Overview This course provides a comprehensive exploration of the vital role customer service plays in business success. Learners will discover why exceptional service is essential in building loyalty, enhancing satisfaction, and driving revenue growth. Covering key principles such as Total Quality Management, customer retention strategies, and managing challenging interactions, this course equips participants with the knowledge to deliver outstanding service consistently. By the end, learners will understand how to elevate their customer engagement and contribute meaningfully to their organisation’s reputation and profitability. Course Description The course delves into a wide range of customer service topics designed to sharpen communication, problem-solving, and relationship-building skills. Participants will examine the critical factors influencing customer satisfaction, including understanding customer behaviour, avoiding common service pitfalls, and mastering phone etiquette. The curriculum also highlights strategies for handling difficult customers and implementing a “concierge” level of service. Through focused study, learners will develop the ability to increase customer retention and recognise the financial value of loyal clients. This professional course is ideal for those seeking to enhance their service delivery and advance their careers in customer-facing roles. Customer Service - Representative Curriculum: Module 01: WHY Customer Service Is CRITICAL To Your Business! Module 02: Good Isn’t Good Enough! Module 03: We Are ALL in the “Helping Field” Module 04: Providing “Concierge” Level Of Service Module 05: The 5 Tenets Of TQM Module 06: How To Boost Customer Satisfaction Module 07: How To Avoid The 10 Deadly Sins Of Customer Service! Module 08: More Money $$$ – Through Customer Retention Module 09: How Much Is A Customer Worth? $$$ Module 10: Do You Understand Your Customer? Module 11: Dealing With Difficult Customers Module 12: “LEAP” Into Customer Service! Module 13: Exceptional Phone Service Module 14: WHY Customers Buy From YOU! $$$ Module 15: BONUS LECTURE!!! FINAL TIPS!!! (See full curriculum) Who is this course for? Individuals seeking to improve customer interaction skills. Professionals aiming to enhance career prospects in customer service. Beginners with an interest in customer service principles. Employees in client-facing roles wanting to boost service quality. Career Path Customer Service Representative Client Relations Officer Customer Support Specialist Call Centre Agent Retail Customer Advisor Hospitality Frontline Staff
Ensuring an efficient flow of goods and services between manufacturers and their skilled trade customer base.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
Write to Impress: Creative Writing Course Overview This comprehensive course on creative writing is designed to unlock your storytelling potential and refine your writing skills across multiple genres. Learners will explore the foundations of creative writing, from constructing compelling narratives to developing vivid characters and authentic dialogue. The course also delves into specialised areas such as poetry, thriller writing, and business communication, offering a broad and versatile skill set. By the end of the course, participants will be equipped with the ability to craft engaging fiction and non-fiction pieces, prepare polished proposals, and confidently approach the publishing process. Ideal for aspiring writers, professionals seeking to enhance their writing abilities, and those passionate about storytelling, this course emphasises clarity, creativity, and critical thinking, enabling learners to write with confidence and impact. Course Description This course covers a wide range of creative writing topics to provide a thorough understanding of narrative techniques and writing styles. Starting with the history and evolution of creative writing, learners will progress through novel writing, non-fiction, and the art of character creation. Emphasis is placed on writing believable dialogue and exploring genre-specific approaches such as horror and children’s literature. Additional modules address poetry, proposal development, and the importance of critical thinking in writing. The course also includes business writing essentials and guidance on editing, evaluating work, and navigating the publishing industry. Throughout the learning journey, students will enhance their analytical skills and learn to express ideas clearly and persuasively. The structured curriculum is ideal for anyone wishing to broaden their writing expertise in a supportive and well-rounded learning environment. Write to Impress: Creative Writing Curriculum: Module 01: Introduction to Creative Writing Module 02: The Development of Creative Writing Module 03: Novel Writing Module 04: Writing Non-Fiction Module 05: Creating Fictional Characters Module 06: Writing Realistic Dialogue Module 07: Writing Horrors, Thriller and Murder Stories Module 08: Writing for Children Module 09: Writing Poetry Module 10: Proposal Writing Module 11: Critical Thinking Module 12: Business Writing Module 13: Other Writings Module 14: Editing, Evaluating and Getting Published (See full curriculum) Who is this course for? Individuals seeking to develop creative writing skills. Professionals aiming to improve their writing for career advancement. Beginners with an interest in storytelling and literary arts. Writers looking to explore various writing styles and genres. Career Path Author or Novelist Content Writer or Copywriter Editor or Publisher Scriptwriter or Screenwriter Communications Specialist Marketing and Proposal Writer