Duration 4 Days 24 CPD hours
Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring
Duration 2 Days 12 CPD hours This course is intended for Data Modelers Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing a dynamic cube, and enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Dynamic Cubes Define and differentiate Dynamic Cubes Dynamic Cubes characteristics Examine Dynamic Cube requirements Examine Dynamic Cube components Examine high level architecture IBM Cognos Dynamic Query Review Dimensional Data Structures Dynamic Cubes caching Create & Design a Dynamic Cube Explore the IBM Cognos Cube Designer Review the cube development process Examine the Automatic Cube Generation Manual development overview Create dimensions Model the cube Best practice for effective modeling Deploy & Configure a Dynamic Cube Deploy a cube Explore the Estimate Hardware Requirements Identify cube management tasks Examine Query Service administration Explore Dynamic Cube properties Schedule cube actions Use the DCAdmin comment line tool Advanced Dynamic Cube Modelling Examine advanced modeling concepts Explore modeling caveats Calculated measures and members Model Relative Time Explore the Current Period property Define period aggregation rules for measures Advanced Features of Cube Designer Examine multilingual support Examine ragged hierarchies and padding members Define Parent-Child Dimensions Refresh Metadata Import Framework Manager packages Filter measures and dimensions Optimize Performance with Aggregates Identify aggregates and aggregate tables In-memory aggregates Use Aggregate Advisor to identify aggregates User defined in-memory aggregates Optimize In-Memory Aggregates automatically Aggregate Advisor recommendations Monitor Dynamic Cube performance Model aggregates (automatically vs manually) Use Slicers to define aggregation partitions Define Security Overview of Dynamic Cube security Identify security filters The Security process - Three steps Examine security scope Identify scope rules Identify roles Capabilities and access permissions Cube security deep dive Model a Virtual Cube Explore virtual cubes Create the virtual cube Explore virtual cube objects Examine virtual measures and calculated members Currency conversion using virtual cubes Security on virtual cubes Introduction to IBM Cognos Analytics Define IBM Cognos Analytics Redefined Business Intelligence Self-service Navigate to content in IBM Cognos Analytics Interact with the user interface Model data with IBM Cognos Analytics IBM Cognos Analytics components Create reports Perform self-service with analysis and Dashboards IBM Cognos Analytics architecture (high level) IBM Cognos Analytics security Package / data source relationship Create Data modules Upload files Additional course details: Nexus Humans B6063 IBM Cognos Cube Designer - Design Dynamic Cubes (v11.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6063 IBM Cognos Cube Designer - Design Dynamic Cubes (v11.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010, 2013, or 2016 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Delve. Collaborate and work with colleagues using the Yammer and Planner apps. Use email and manage contacts with Outlook on the web. Collaborate using Teams. Configure Teams. This course introduces working with shared documents in the familiar Office 365 online apps?Word, PowerPoint©, and Excel©?as an alternative to installing the Microsoft© Office desktop applications. This course also introduces several productivity apps including Yammer?, Planner, and Delve© that can be used in combination by teams for communication and collaboration. Getting Started with Office 365 Topic A: Sign In to Office 365 Topic B: Navigate the Office 365 Environment Collaborating with Shared Files Topic A: Work with Shared Documents in SharePoint Topic B: Edit Documents in Office Online Topic C: Collaborate on the SharePoint Site Topic D: Work with OneDrive for Business Topic E: Find Shared Resources Using Productivity Apps Topic A: Work with Productivity Apps in Combination Topic B: Broadcast Messages with Yammer Using Outlook on the Web Topic A: Send and Receive Email Topic B: Manage Contacts Topic C: Schedule Appointments Topic D: Personalize Outlook on the Web Collaborating with Teams Topic A: Overview of Microsoft Teams Topic B: Converse and Share in Teams Topic C: Call and Meet in Teams Topic D: Collaborate with Microsoft 365 Apps and Teams Configuring Teams Topic A: Configure Teams Topic B: Configure Channels Topic C: Configure Tabs Additional course details: Nexus Humans Microsoft 365 Office for the Web (with Teams) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 Office for the Web (with Teams) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Leaders, Managers, Individuals who lead meetings This course is designed to help leaders run effective virtual meetings as well as managing their team virtually. We will explore communication styles and understanding their team as well as productivity. This course involves a lot of open discussion as well as teaching leaders how to manage the virtual workplace and run productive meetings. Defining the Virtual Workplace What does it look like? Tools available Communication strategies Understanding communication styles Leading different communication styles Building a Virtual Workplace Strategy Goals & agenda Check-ins Communication strategies Virtual Leadership Strategies Making connections & check ins Managing virtual meetings with team members Defining availability & creating schedules Open Discussion & Action Plan
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 202 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: configure BIND to function as an authoritative and as a recursive, caching-only DNS server install and configure a web server install and configure a proxy server, including access policies, authentication and resource usage set up a Samba server for various clients configure a DHCP server configure PAM to support authentication using various available methods perform queries and updates to an LDAP server configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains configure an FTP server for anonymous downloads and uploads receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This course prepares students to take the 202 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server HTTP Services Basic Apache configuration Apache configuration for HTTPS Implementing Squid as a caching proxy Implementing Nginx as a web server and a reverse proxy File Sharing Samba Server Configuration NFS Server Configuration Network Client Management DHCP configuration PAM authentication LDAP client usage Configuring an OpenLDAP server E-Mail Services Using e-mail servers Managing E-Mail Delivery Managing Mailbox Access System Security Configuring a router Managing FTP servers Secure shell (SSH) Security tasks OpenVPN Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-2) 202 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-2) 202 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours Overview Topics Include:Installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster.Choosing and implementing cluster networking.Various methods of application lifecycle management, including scaling, updates and roll-backs.Configuring security both for the cluster as well as containers.Managing storage available to containers.Learn monitoring, logging and troubleshooting of containers and the cluster.Configure scheduling and affinity of container deployments.Use Helm and Charts to automate application deployment.Understand Federation for fault-tolerance and higher availability. In this vendor agnostic course, you'll learn the installation, configuration and administration of a production-grade Kubernetes cluster. Introduction Linux Foundation Linux Foundation Training Linux Foundation Certifications Laboratory Exercises, Solutions and Resources Distribution Details Labs Basics of Kubernetes Define Kubernetes Cluster Structure Adoption Project Governance and CNCF Labs Installation and Configuration Getting Started With Kubernetes Minikube kubeadm More Installation Tools Labs Kubernetes Architecture Kubernetes Architecture Networking Other Cluster Systems Labs APIs and Access API Access Annotations Working with A Simple Pod kubectl and API Swagger and OpenAPI Labs API Objects API Objects The v1 Group API Resources RBAC APIs Labs Managing State With Deployments Deployment Overview Managing Deployment States Deployments and Replica Sets DaemonSets Labels Labs Services Overview Accessing Services DNS Labs Volumes and Data Volumes Overview Volumes Persistent Volumes Passing Data To Pods ConfigMaps Labs Ingress Overview Ingress Controller Ingress Rules Labs Scheduling Overview Scheduler Settings Policies Affinity Rules Taints and Tolerations Labs Logging and Troubleshooting Overview Troubleshooting Flow Basic Start Sequence Monitoring Logging Troubleshooting Resources Labs Custom Resource Definition Overview Custom Resource Definitions Aggregated APIs Labs Kubernetes Federation Overview Federated Resources Labs Helm Overview Helm Using Helm Labs Security Overview Accessing the API Authentication and Authorization Admission Controller Pod Policies Network Policies Labs
Duration 2 Days 12 CPD hours Overview What's New in This Guide? The behind-the-scenes journal entry for transactions is now included. This course is a continuation of topics following ?Get Started with QuickBooks 2020 for Windows?. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2020. This course covers features that are in QuickBooks Pro and Premier 2020. Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with Quick Reports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Forms Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20