Duration 1 Days 6 CPD hours Apple?s Keynote is the equivalent of Microsoft?s PowerPoint. With it?s powerful set of tools and effects, Keynote makes it easy to create stunning presentations. In this one-day class you will learn how to design and customize slides, add media and music, animate text and images, record voice over narration and the best tips and tricks for presenting the final presentation. Course covers working with a Mac, iPhone and/or iPad and demonstrates how to collaborate in real time with other users Creating a Presentation Opening Keynote Choosing a Theme and Slide Size Selecting a Master Slide Outlining a Presentation Using the Inspector Working with the Format Bar Pasting Text into an Outline Formatting Text Customizing a Slide Layout Copying Styles Between Slides Fixing Spelling Errors Working in Outline View Reordering Slides Creating Object Effects Dragging Files to Create New Slides Using the Light Table Creating a Custom Theme Creating an Empty Theme Creating Backgrounds and Formatting Text Creating a Title Slide Creating a Master Slide Saving and Sharing Themes Applying a Custom Theme Dragging Files to Create New Slides Using the Light Table Working with Tables and Charts Tables and Charts Working with Tables and Charts Chart and Table options Understanding Axis and Series 2D and 3D Charts Animating Tables and Charts Adding content from Microsoft Office or PDF Files Adding Media to Your Presentation Adding Photos and Graphics Enhancing Photos in Keynote Customizing Photo or Graphic Layouts Making Part of a Photo or Graphic Transparent Masking Photos and Shapes Instant Alpha Adding Hyperlinks and Navigation Adding a Chart or Table Adding Audio or Soundtrack Adding a Global Transition Adding Video and Animation Creating Builds to Reveal Text Creating a Sequence Build to Reveal a Table Creating a Smart Build Creating Custom Animation Animating Charts Animating Your Presentation Previewing the Presentation 2D and 3D Transitions Between Slides Creating Object Effects Running and Pausing your Presentation Animating a Title Slide Adding HyperLinks to your Presentation Using Magic Move Recording a Narrated, Self Playing Presentation Rehearsing and Delivering Your Presentation Reviewing your Presentation Adding Comments to your Presentation Adding and Printing Presenter Notes Rehearsing your Presentation Creating a Self-running Slideshow Troubleshooting your Presentation Indexing with Spotlight Importing from PowerPoint Animating a Title Slide Cleaning Up a Presentation Enhancing a Presentation Using an iOS Device as a Remote Control - Sharing Your Presentation Printing handouts Export for Email Exporting to PDFs Exporting to PowerPoint Exporting to Quicktime Sending to YouTube or the web Exporting Export For Email, PDFs Uploading to iCloud or Moving between Computer and iCloud Exporting to PowerPoint Exporting to QuickTime Sending to YouTube Troubleshooting & Cleaning Up Your PresentationTips and Tricks Working with Keynote on an iOS mobile device Additional course details: Nexus Humans Apple Keynote training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple Keynote course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW Cisco SD-WAN Overview Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN Advanced Settings Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN High Availability Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN Templates Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates Bridging Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging Routing Protocols Static Routes Dynamic Routing Protocols Multicast Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP Network Optimization Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS Direct Internet Access (DIA) Overview SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring Unified Communications Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN Security Policy Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN Local Policy Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN Central Policy Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN Migration Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration Additional course details: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is geared for Python experienced developers, analysts or others who are intending to learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web. Overview This skills-focused combines engaging lecture, demos, group activities and discussions with machine-based student labs and exercises.. Our engaging instructors and mentors are highly-experienced practitioners who bring years of current, modern 'on-the-job' modern applied datascience, AI and machine learning experience into every classroom and hands-on project. Working in a hands-on lab environment led by our expert instructor, attendees will Understand the different kinds of recommender systems Master data-wrangling techniques using the pandas library Building an IMDB Top 250 Clone Build a content-based engine to recommend movies based on real movie metadata Employ data-mining techniques used in building recommenders Build industry-standard collaborative filters using powerful algorithms Building Hybrid Recommenders that incorporate content based and collaborative filtering Recommendation systems are at the heart of almost every internet business today; from Facebook to Net?ix to Amazon. Providing good recommendations, whether its friends, movies, or groceries, goes a long way in defining user experience and enticing your customers to use your platform.This course shows you how to do just that. You will learn about the different kinds of recommenders used in the industry and see how to build them from scratch using Python. No need to wade through tons of machine learning theory?you will get started with building and learning about recommenders as quickly as possible. In this course, you will build an IMDB Top 250 clone, a content-based engine that works on movie metadata. You will also use collaborative filters to make use of customer behavior data, and a Hybrid Recommender that incorporates content based and collaborative filtering techniques. Students will learn to build industry-standard recommender systems, leveraging basic Python syntax skills. This is an applied course, so machine learning theory is only used to highlight how to build recommenders in this course. Getting Started with Recommender Systems Technical requirements What is a recommender system? Types of recommender systems Manipulating Data with the Pandas Library Technical requirements Setting up the environment The Pandas library The Pandas DataFrame The Pandas Series Building an IMDB Top 250 Clone with Pandas Technical requirements The simple recommender The knowledge-based recommender Building Content-Based Recommenders Technical requirements Exporting the clean DataFrame Document vectors The cosine similarity score Plot description-based recommender Metadata-based recommender Suggestions for improvements Getting Started with Data Mining Techniques Problem statement Similarity measures Clustering Dimensionality reduction Supervised learning Evaluation metrics Building Collaborative Filters Technical requirements The framework User-based collaborative filtering Item-based collaborative filtering Model-based approaches Hybrid Recommenders Technical requirements Introduction Case study and final project ? Building a hybrid model Additional course details: Nexus Humans Building Recommendation Systems with Python (TTAI2360) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Recommendation Systems with Python (TTAI2360) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP Process Integration Architecture Describing SAP Process Integration Architecture Explaining the Functionality and Utilization of SAP Process Integration The System Landscape Directory (SLD) Maintaining Products and Software Components in the System Landscape Directory (SLD) Implementing Technical Systems in the System Landscape Directory Maintaining Business Systems for Use in the Integration Directory Interface Objects in the Enterprise Service Repository (ESR) Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository (ESR) Maintaining Interface Objects Defining Message Processing Types and Quality of Services Object Mapping in the Enterprise Service Repository (ESR) Creating Message Mapping Objects Mapping Between Service Interfaces Analyzing Asynchronous Integration Scenarios Configuration of Integration Directory Communication Objects Using Configuration Views Creating Communication Channels in the Integration Directory (ID) Configuration of Integration Directory Objects for ABAP Processing Analyzing Objects Used in the Configuration of Integration Engine (IE) Communication Analyzing Routing Objects Used in Integration Engine (IE) Communication Analyzing Multiple Receiver Objects Used in Integration Engine (IE) Communication Configuration of Integration Directory Objects for Java Processing Maintaining Objects for Advanced Adapter Engine (AAE)-Only Processing Maintaining Objects for Advanced Adapter Engine Extended (AEX) Message Processing Creating and Deploying Integration Flows to the Advanced Adapter Engine Extended (AEX) Operations of SAP Process Integration Using the Runtime Workbench Using the Process Integration Monitoring (PIMon) Home Using the SAP NetWeaver Administrator Connectivity Options for SAP Process Integration Analyzing Connectivity Options between Back-End Systems with SAP Process Integration HTTP Connectivity Options Configuring the Simple Object Access Protocol (SOAP) Adapter Using Proxy Technology Checking the HTTP ABAP Adapter Using the HTTP_AAE (Java) Adapter File Adapter Configuration Configuring the Receiver File Adapter Configuring a Sender File Adapter Intermediate Document (IDoc) Connectivity Options Using the Intermediate Document (IDoc) Adapter with the Receiver Intermediate Document Adapter for the ABAP Stack Using the Sender Intermediate Document (IDoc) Adapter Using the Intermediate Document (IDoc) Adapter in the Advanced Adapter Engine (AAE) Configuring a Complete Intermediate Document (IDoc) Scenario Configuration of SAP Business Application Programming Interfaces (BAPIs) Connectivity Configuring the Receiver Remote Function Call (RFC) Adapter Configuring the Sender Remote Function Call (RFC) Scenario Enterprise Services and B2B Connectivity Analyzing Enterprise Services Configuring Business-to-Business (B2B) Connectivity Cross-Component Business Process Management (ccBPM) Integration Processes Analyzing the Runtime of the Cross-Component Business Process Management (ccBPM) Identifying the Steps to Create and Use an Integration Process Additional course details: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership
Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Those new to Citrix or considering a move to Citrix Cloud Overview Gain foundational knowledge of Citrix Virtual Apps and Desktops 7Learn how to install, configure, and manage a Citrix Virtual Apps and Desktops 7 site and Cloud connectorsIdentify the considerations between Citrix Virtual Apps and Desktops on-premises and the Citrix Virtual Apps and Desktops ServiceDiscover how to deliver app and desktop resources This course will teach students how to deploy, install, configure, setup profile management, configure policies, printing and basic security features for on-premises Virtual Apps and Desktop solution building, and then migrating to Citrix Cloud.This course includes a voucher to take the related exam and earn your Citrix Certified Associate - Virtualization (CCA-V) certification. Architecture Overview Introduction to Citrix Virtual Apps and Desktops Architecture Overview Features Hosting Platform Considerations Citrix Virtual Apps and Desktops Service Connection Flow Process Introduction Deploy the Site Pre-Deployment Considerations Citrix Licensing Setup Delivery Controller Setup Site Setup And Management Redundancy Considerations The Apps and Desktops Images Consider Master Image Creation Methods Master Image Requirements Provision and Deliver App and Desktop Resources Machine Catalogs and Delivery Groups Provisioning Methods and Considerations Machine Creation Services (MCS) Deep Dive MCS Environment Considerations Resource Locations Provide Access to App and Desktop Resources Consider Workspace Experience versus StoreFront Workspace Experience User Authentication Workspace App Communication Flow Manage the User Experience Methods to Manage the User Experience Common User Experience Settings Published App and Desktop Presentation and Management Published App Properties Server OS Published App Optimizations Published App Presentation Application Groups Apps and Desktops Presentation Manage Printing for User Sessions Map Printers to the User Session Printer Drivers Print Environment Considerations Citrix Profile Management Introduction and Considerations Configure Citrix Profile Management Manage the Site Delegated Administration Use PowerShell with Citrix Virtual Apps and Desktops Power Management Considerations Citrix Virtual Apps and Desktops Basic Security Considerations Citrix Admin Security Considerations XML Service Security Considerations Secure HDX External Traffic Monitor the Site Citrix Director Introduction Monitor and Interact with User Sessions Published Apps Analysis Monitor the Machines Running the VDA Site Specific Common Monitoring Alerts and Notifications Optimize Citrix Director Monitoring with Citrix ADM Introduction to Supporting and Troubleshooting Citrix Virtual Apps and Desktops Introduction to Supporting a Citrix Virtual Apps and Desktops Site Tools Proactive Administration Common Tasks Migrate To Citrix Cloud Migration Considerations Citrix Cloud Connector Deployment Citrix Virtual Apps and Desktops with an On-Premises Resource Location The Migration Process Citrix Analytics Citrix Analytics Introduction Prepare to Use Citrix Analytics Types of Analytics Additional course details: Nexus Humans CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface. Overview After completing this course, students will be able to: Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Use intersite connectivity features including VNet Peering and VNet-to-VNet connections Work with Azure Active Directory (AAD) and Azure AD Connect As an IT Professionals experienced in SAP solutions, you will discover how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. You will also be introduced to concepts, scenarios, procedures, and hands-on labs that will empower you to best plan and implement migration and operation of an SAP solution on Azure. You will also receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. Introduction Contains an overview of the SAP and Microsoft partnership. Foundations of SAP on Azure Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services. SAP Certified Offerings on Azure Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP. Lab : Online Lab: Implementing Linux clustering on Azure VMs Lab : Online Lab: Implementing Windows clustering on Azure VMs SAP on Azure Reference Architecture Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs. Planning for Implementing SAP Solutions on Azure Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations. Planning for Migrating SAP Workloads to Azure Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist. Implementing Azure VM-based SAP Solutions Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication. Module 8-Deploying HANA Large Instances (HLI) Contains a lesson on implementing HANA Large Instances (HLI). Migrating SAP Workloads to Azure Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure. Lab : Online Lab-Implement SAP architecture on Azure VMs running Linux Lab : Online Lab-Implement SAP architecture on Azure VMs running Windows Maintaining SAP on Azure Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR). Monitoring and Troubleshooting SAP on Azure Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who are currently using desktop or web-based data management tools such as Microsoft Excel or SQL Server reporting services to perform numerical or general data analysis. They are responsible for connecting to cloud-based data sources, as well as shaping and combining data for the purpose of analysis. They are also looking for alternative ways to analyze business data, visualize insights, and share those insights with peers across the enterprise. This includes capturing and reporting on data to peers, executives, and clients. Overview In this course, you will analyze data with Microsoft Power BI. You will: Analyze data with self-service BI. Connect to data sources. Perform data cleaning, profiling, and shaping. Visualize data with Power BI. Enhance data analysis by adding and customizing visual elements. Model data with calculations. Create interactive visualizations. As technology progresses and becomes more interwoven with our businesses and lives, more data is collected about business and personal activities. This era of 'big data' is a direct result of the popularity and growth of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantages. Creating data-backed visualizations is key for data scientists, or any professional, to explore, analyze, and report insights and trends from data. Microsoft© Power BI© software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and it enables users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, enabling users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action. Analyzing Data with Self-Service BI Topic A: Data Analysis and Visualization for Business Intelligence Topic B: Self-Service BI with Microsoft Power BI Connecting to Data Sources Topic A: Create Data Connections Topic B: Configure and Manage Data Relationships Topic C: Save Files in Power BI Performing Data Cleaning, Profiling, and Shaping Topic A: Clean, Transform, and Load Data with the Query Editor Topic B: Profile Data with the Query Editor Topic C: Shape Data with the Query Editor Topic D: Combine and Manage Data Rows Visualizing Data with Power BI Topic A: Create Visualizations in Power BI Topic B: Chart Data in Power BI Enhancing Data Analysis Topic A: Customize Visuals and Pages Topic B: Incorporate Tooltips Modeling Data with Calculations Topic A: Create Calculations with Data Analysis Expressions (DAX) Topic B: Create Calculated Measures and Conditional Columns Creating Interactive Visualizations Topic A: Create and Manage Data Hierarchies Topic B: Filter and Slice Reports Topic C: Create Dashboards Additional course details: Nexus Humans Microsoft Power BI: Data Analysis Practitioner (Second Edition) (v1.3) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Power BI: Data Analysis Practitioner (Second Edition) (v1.3) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.