Duration 4 Days 24 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators Engineers requiring advanced configuration skills Cisco integrators and partners Overview After taking this course, you should understand: Data center challenges and cloud solutions Cisco UCS Director architecture Cisco UCS Director setup and configuration Cisco ACI Multitenancy in FlexPod Cisco ACI infrastructure Resource groups and service offerings Tenant onboarding Self-service provisioning Application containers The Designing and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course shows you how to use Cisco UCS© Director software to manage physical and virtual infrastructure elements, including Cisco Application Centric Infrastructure (Cisco ACI?). You will learn to use orchestration and automation functions of Cisco UCS Director to effectively manage infrastructure and automate IT processes. The course offers hands-on experience installing and configuring Cisco UCS Director software. You will also learn about features such as bare-metal provisioning; compute, network, and storage management; orchestration, including Application Policy Infrastructure Controller (APIC); Cisco UCS Director custom tasks, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Introducing Cisco Application Centric Infrastructure Understanding Cisco ACI Overview Understanding Cisco ACI Terms and Constructs Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Introducing Role-Based Access Control Explaining User Groups/Roles/Users Introducing Orchestration Understanding Orchestration Introducing Cisco UCS Director ACI Explaining Cisco UCS Director with ACI So Understanding Multitenancy with Cisco UCS Director ACI Explaining Multitenancy with Cisco UCS Director ACI Understanding Resource Groups and Service Offerings Introducing Advanced Tenant Onboarding Onboarding a Tenant Tagging Resources Introducing Application Containers Understanding Application Profiles Understanding Service Container Catalog Understanding Deployment Through Self-Service Portal Understanding Self-Service Provisioning Portal Understanding Service Request Understanding Virtual Data Center Understanding Policies Understanding vDC and Groups Use Case Additional course details: Nexus Humans CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators System engineers who work in data center solutions and manage data center management policies Cisco integrators and partners Overview After taking this course, you should be able to: Understand Cisco UCS Director architecture Understand deployment models of Cisco UCS Director Configure virtual data centers, policies, and catalogs Understand the unified infrastructure management capabilities of Cisco UCS Director Understand orchestration and build advanced workflows Understand application containers The Cisco UCS Director Foundation (UCSDF) v6.6 course helps you understand concepts, architecture, and deployment use cases for Cisco UCS© Director. You will gain hands-on experience in deploying basic Cisco UCS Director solutions. You will also practice using core features that most implementations require, such as services design, using the self-service portal for provisioning services, creating workflows that enable cloud automation and standardize IT services, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Understanding Cisco UCS Director Deployment Explaining Cisco UCS Director Deployment Explaining Global System Settings Understanding Site and Pod Management Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Understanding the Design Phase Understanding Policies Understanding vDC and Groups Use Case Understanding Deployment Through the Self-Service Portal Understanding the Self-Service Provisioning Portal Understanding Service Request Introducing Orchestration Understanding Orchestration Reporting and Monitoring in Cisco UCS Director Understanding Chargeback in Cisco UCS Director Understanding Reports in Cisco UCS Director Introducing Application Containers Understanding Application Containers
Duration 3 Days 18 CPD hours This course is intended for Anyone starting to write SAS programs Overview Use SAS Studio and SAS Enterprise Guide to write and submit SAS programs. Access SAS, Microsoft Excel, and text data. Explore and validate data. Prepare data by subsetting rows and computing new columns. Analyze and report on data. Export data and results to Excel, PDF, and other formats. Use SQL in SAS to query and join tables. This course is for users who want to learn how to write SAS programs to access, explore, prepare, and analyze data. It is the entry point to learning SAS programming for data science, machine learning, and artificial intelligence. Essentials The SAS programming process. Using SAS programming tools. Understanding SAS syntax. Accessing Data Understanding SAS data. Accessing data through libraries. Importing data into SAS. Exploring and Validating Data Exploring data. Filtering rows. Formatting columns. Sorting data and removing duplicates. Preparing Data Reading and filtering data. Computing new columns. Conditional processing. Analyzing and Reporting on Data Enhancing reports with titles, footnotes, and labels. Creating frequency reports. Creating summary statistics reports. Exporting Results Exporting data. Exporting reports. Using SQL in SAS Using Structured Query Language in SAS. Joining tables using SQL in SAS. Additional course details: Nexus Humans SAS Programming 1 - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAS Programming 1 - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers System engineers Customers deploying and maintaining Cisco Unified Contact Center Express products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of the Cisco Unified Contact Center Express product suite. This overview will cover descriptions of the product, compatibility, and hardware and software options, architecture, and sizing and ordering tools. Provide a complete description of the Cisco Unified CCX installation process, the configuration required with an overview of most common configuration web pages, and describe the call flow processes needed to establish a call on Cisco Unified CCX. Describe the Cisco Unified CCX script editor, how it is installed and how to implement common IVR scripting techniques. Provide a comprehensive view of Cisco Unified CCX ACD operations to include basic contact center build-up, scripting, agent and supervisor desktop configurations, advanced scripting topics, and reporting. Describe how to install, configure and use features found in Cisco Unified CCX Premium such as, Remote Monitoring, Outbound Dialer, Agent Email, Agent Web Chat, and Automatic Speech Recognition (ASR) and Text-to-Speech (TTS). Understand how to maintain and monitor a Cisco Unified CCX system This course, Deploying Cisco© Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. Cisco Unified CCX Product Overview Cisco Unified CCX Product Packages Cisco Unified CCX Architecture Designing Cisco Unified CCX Cisco Unified CCX Installation and Configuration Installing Cisco Unified CCX Managing Cisco Unified CCX Configuring Basic Properties of Cisco Unified CCX Cisco Unified CCX Scripting Understanding Script Editor Basics Creating a Basic IVR Script Prompting and Collecting Information Accessing an External Database Making Decisions Confirming Caller Input Cisco Unified CCX ACD Operations Implementing Cisco Unified CCX
Duration 2 Days 12 CPD hours This course is intended for Customers and systems operators that want to learn fundamental AOS concepts and navigate Prism on AHV. Junior IT administrators and business leaders who manage Nutanix clusters in the datacenter and want a formal, hands-on, detailed introduction to Nutanix datacenter administration. The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix?s Hybrid Cloud solution.Begin by exploring the history of this technology space, including different types of clouds, and how on-prem and public infrastructures came together to create hybrid operating models. Then, delve deeper into essential Nutanix products ? AOS, AHV, and Prism ? while discussing how these products were designed to solve business challenges.And conclude by discussing certain fundamental aspects involved in operating the Nutanix Hybrid Cloud, such as cluster updates, managing virtual machines, reporting and performance metrics, and more Module 1: Introduction Describe course terminology, such as three-tier architecture, hyperconverged architecture, and public, private, and hybrid clouds. Module 2: Understanding AOS Concepts Describe self-healing architecture Describe replication factor Describe Nutanix multicloud solutions Module 3: Understanding Cluster Management Concepts Explain Prism Element features and benefits Explain Prism Central features and benefits Manage the Image Repository Upgrade the hypervisor and AOS on a cluster Describe Life Cycle Manager. Module 4: Understanding Storage Concepts Define a storage pool and storage container Identify components of AOS Distributed Storage Identify space-saving technologies Module 5: Managing VMs Create and manage virtual machines (VMs) Add a VM to a category Describe Acropolis Dynamic Scheduler (ADS) Describe data locality Module 6: Monitoring VMs and Cluster Health Use metrics to identify performance issues Measure VM performance using Nutanix tools: Health dashboard, Analysis dashboard, Alerts dashboard Use the Support Portal and Insights Module 7:Understanding Data Protection Concepts Describe how to enable data protection on a VM Define a retention policy Define Nutanix Mine Identify the different types of replication targets
Duration 3 Days 18 CPD hours In this 3 day customized Intermediate SQL course students will learn additional commands and functions using labs/activities/content that correlates with this content. By understanding SQL, you get the knowledge of fundamental queries associated with data management so that you can verify, monitor, and control all the activities operating in the database. Lesson 1 Substring Instr / CharIndex Convert (data types and with Formatting) Replace RowCount / RowNum / Top )n) ÿ(Oracle/SQL Server functions) Case / If Then Else statements Exists Clause Find Duplicates using Group by and have clause (and other tips for analyzing data) Lesson 2 Set operations (UNION, UNION ALL, INTERSECT, MINUS) GROUP BY extensions (ROLLUP, CUBE, and GROUPING SETS) Loops / Cursors Common Table Expressions (CTEs) Lesson 3 Temp Tables / Views Advanced Subqueries Regular Expressions (RegEx) Linked Server Queries Qualified subquery predicates Aggregate functions Optimizing queries SQL Injection Lesson 4 JSON Parsing With Partition By With Over Fuzzy Logic - MDS.mdq.[Similarity]ÿ Additional course details: Nexus Humans Intermediate SQL Custom 3-Day Private Class Outline training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate SQL Custom 3-Day Private Class Outline course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for anyone who wants to develop a toolbox of personal stress management skills. Overview Upon successful completion of this course, students will be able to identify the best approach to handle a stressful situation; understand what lifestyle elements, routines and relaxation techniques can help reduce stress. In this course, students will apply a three-option method to address any stressful situation. Module One: Getting Started Workshop Objectives Pre-Assignment Pre-Test Action Plan Form Evaluation Form Module Two: Understanding Stress What is Stress? What is Eustress? Understanding the Triple ?A? Approach Practical Illustration Module Two Review Questions Module Three: Creating a Stress-Reducing Lifestyle Eating Properly Exercising Regularly Sleeping Well Practical Illustration Module Three Review Questions Module Four: Altering the Situation The First A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Four Review Questions Module Five: Avoiding the Situation The Second A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Five Review Questions Module Six: Accepting the Situation The Third A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Six Review Questions Module Seven: Using Routines to Reduce Stress Planning Meals Organizing Chores Using a To-Do List Practical Illustration Module Seven: Review Questions Module Eight: Environmental Relaxation Techniques Finding a Sanctuary Using Music Seeing the Humor Practical Illustration Module Eight: Review Questions Module Nine: Physical Relaxation Techniques Soothing Stretches Deep Breathing Tensing and Relaxing1 Meditation1 Practical Illustration Module Nine: Review Questions Module Ten: Coping with Major Events Establishing a Support System Creating a Plan Knowing When to Seek Help Practical Illustration Module Ten: Review Questions Module Eleven: Our Challenge to You Creating a Stress Log Week One: Recording Events1 Week Two: Identifying Stressors and Creating a Plan1 Week Three: Creating New Habits Reviewing and Evaluating Practical Illustration Module Eleven: Review Questions Module Twelve: Wrapping Up Words from the Wise Lessons Learned
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders engaged in improving the delivery of products and services that meet user needs through the use of Microsoft SharePoint; Anyone who wants to improve their Business Analysis skills; Project stakeholders concerned with SharePoint requirements. Overview Plan, manage and close requirements for a project in reduced time using good business analysis practices Minimize project uncertainty and risk by applying good techniques Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your team that will be able to continuously align the delivered product or services with desired business needs, easily adapting to changing requirements throughout the process. Requirements can change frequently during a SharePoint project, and therefore projects need a streamlined, flexible approach to requirements change management. SharePoint professionals want to develop systems and services which are both high-quality and high-value, and the easiest way to achieve this is to implement the highest priority requirements first. This enables the projects to maximize value for their stakeholders. Introduction ? Roles involved in a SharePoint project The opportunities and challenges of a SharePoint project The business analysis process BA role vs. project manager role BA / PM competencies Case Study Exercise Understanding SharePoint Requirements Business, User, Functional, Quality-of-service and implementation requirements Requirements vs. specifications Requirements vs. business rules Risk management and risk response strategies Analyzing requirements Characteristics of effective requirements Case Study Exercise SharePoint Requirements Modeling Identify high level scope Identify initial requirements stack Identify an architectural vision Plan your iteration Iteration modeling Model storming Test driven development Case Study Exercise The Change Management Process Managing the Solution Scope and Requirements Capturing the Requirements Traceability Maintaining the Requirements for re-use Managing Requirements Conflicts Preparing the Requirements Package Building the Requirements communications plan Case Study Exercise Assessing & Validating Requirements Validating and verifying SharePoint Requirements Creating a master test plan Create test scenarios and test cases Case Study Exercise Additional Information Useful books and links on managing requirements and projects for SharePoint initiatives