Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode.
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB. Overview Building Globally Distributed Applications with Cosmos DB Migrate MongoDB Workloads to Cosmos DB Migrate Cassandra DB Workloads to Cosmos DB This course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB. Building Globally Distributed Applications with Cosmos DB Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Migrate MongoDB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Migrate Cassandra DB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Additional course details: Nexus Humans DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators , Cloud solution architects , Customer sales engineers , DevOps engineers , Sales engineers , Systems engineers, Technical solutions architects. Overview After taking this course, you should be able to: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multi-tenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud The course, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) v1.0 teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes. Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate level course for students that will perform Database Administration tasks, who plan, implement, and maintain D22 11.1 databases. Overview These skills can be developed by taking: DB2 SQL Workshop DB2 Fundamentals This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database. Overview of Db2 11.1Db2 Command Line Processor (CLP) and GUI toolsThe Db2 database manager instanceCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryDatabase Maintenance, Monitoring and Problem DeterminationLocking and concurrencySecurity
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers and engineers including: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After completing the course, you should be able to: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multitenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud The course, Mulitcloud Management with Cisco© CloudCenter Suite (CLDCCS) v1.0 is an intensive training course that teaches you to securely design, automate, and deploy applications across multiple clouds while optimizing cost and compliance with comprehensive reporting, visibility, and policy-enforcement. Through a combination of lessons with hands-on lab exercises, you will learn to simplify the lifecycle management of multicloud applications, workflows, and their infrastructure Understanding Cloud Transitions Overview of Traditional IT Introducing Cisco CloudCenter Suite Cisco CloudCenter Suite Definition Setting Up Cisco CloudCenter Workload Manager Artifact Repository Overview and Configuration Understanding User Administration and Multitenancy in Cisco CloudCenter Suite Cisco CloudCenter Suite User Roles Grasping Application Modeling in Cisco CloudCenter Workload Manager Model an Application Identifying Resource Placement Callouts and Lifecycle Actions in Cisco CloudCenter Workload Manager Resource Placement and Validation Callout Understanding Application Deployment Framework in Cisco CloudCenter Workload Manager Workload Manager Application Parameters Exploring Application Services in Cisco CloudCenter Workload Manager Application Services Framework Integrating Cisco CloudCenter Workload Manager with Cisco Application-Centric Infrastructure Configure CloudCenter Workload Manager for Cisco ACI Introducing Application Management in Cisco CloudCenter Workload Manager Cisco CloudCenter Workload Manager Actions Library Exploring Advanced Features in CloudCenter Workload Manager Scheduling an Application in Cisco CloudCenter Workload Manager Comprehending Policies and Tagless Governance in CloudCenter Workload Manager Cisco CloudCenter Workload Manager Policies Introducing Action Orchestrator and Cost Optimizer in Cisco CloudCenter Suite Action Orchestrator in Cisco CloudCenter Suite Lab outline Explore Cisco CloudCenter Suite Admin GUI Discover Cisco CloudCenter Workload Manager GUI Create Cisco CloudCenter Workload Manager Repository Design Deployment Environments in Cisco CloudCenter Workload Manager Create Images in Cisco CloudCenter Workload Manager Form Cost Bundles and Usage Plans in Cisco CloudCenter Workload Manager Explore Multitenancy in Cisco CloudCenter Suite Model and Deploy Two-Tier Application Model and Deploy Multitier Application Perfect and Arrange Multitier Application on Docker Model and Deploy Application on Kubernetes Cloud Deploy Application in Hybrid Cloud Arrange Application Using Automated Resource Placement Perform Lifecycle Actions on Deployed Applications Create User-Defined Parameters and Explore Macros Understand Application Services in Cisco CloudCenter Workload Manage Benchmark, Schedule, and Share Applications in Cisco CloudCenter Workload Manager Continuous Integration/Continuous Delivery (CI/CD) Project Board Manage Policies in Cisco CloudCenter Workload Manager Manage System Tags and Governance in Cisco CloudCenter Workload Manager Explore Action Orchestrator Explore Cost Optimizer Additional course details: Nexus Humans Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ⢠(Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.