Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Identify the role and value of Cisco Silicon One in a campus environment. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches. Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches. Describe the maintenance features on Cisco Catalyst 9000 Series switches. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP. Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center. Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Positioning Cisco Catalyst 9000 Series Switches Cisco Catalyst Silicon One Architecture Exploring Cisco Catalyst 9000 Series Switches Management Capabilities Scale and Performance Features on Cisco Catalyst 9000 Series Switches Security Features on Cisco Catalyst 9000 Series Switches Automation Features on Cisco Catalyst 9000 Series Switches QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches Maintenance Features on Cisco Catalyst 9000 Series Switches Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches Application Hosting on Cisco Catalyst 9000 Series Switches Cloud Management for Catalyst 9000 Series Using Meraki Dashboard Automating Network Changes with Cisco DNA Center Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, Program/Project Manager, System Administrators, System Architects, and Technology Consultants. Overview Explaining scenarios and processes in SAP NetWeaver process integrationIdentify the technical communications modes and processesExplain business scenarios and the business hierarchy used by SAP In this course, students learn how to explain scenarios & processes in SAP NetWeaver process integration. They learn how to identify the technical communications modes & processes, as well as explain business scenarios & the business hierarchy used by SAP. Integration Basics Explaining Scenarios and Processes in SAP NetWeaver Process Integration Explaining Technical Communication Modes and Processes Explaining Business Scenarios Classical System-to-System Communication Communicating Between Two SAP Systems Communicating Between Two Non-SAP Systems Communicating Using Business Application Programming Interfaces (BAPIs) Communicating Using IDocs Processing IDocs Web Services Processing HTTP Requests Describing Simple Object Access Protocol (SOAP) Basics Analyzing Different Web Services Describing Inside-Out and Outside-In Web Services Explaining Service Oriented Architecture (SOA) Integration Technologies: On-Premise Process Integration (Design Time) Processing Integration Middleware Tools (PI Dual Stack) Installing Dual-Stack or Single-Stack Options Securing Objects Creating PI Objects Explaining Design Objects Modeling PI Scenarios Creating an Integration Scenario Configuring an Integration Scenario Displaying the Configuration Objects in the Integration Directory Integration Technologies: On-Premise Process Integration (Runtime) Connecting SAP NetWeaver PI with Proxies Creating File Adapters Executing Configuration Objects Monitoring Tools Integration Technologies: On-Premise Process Orchestration (PO) Explaining Business Process Management (BPM) Explaining Process Orchestration (PO) Explaining Advanced Adapter Engine Extended (AEX) Explaining Business Rules Management (BRM) Integration Technologies: On Demand Explaining SAP HANA Cloud Integration (HCI) Describing Eclipse-Based Access Using the Web UI to Access HCI SAP NetWeaver Gateway Explaining the SAP NetWeaver Gateway Scenario Explaining the SAP NetWeaver Gateway Development View Accessing an Open Data (OData) Service Additional course details: Nexus Humans BIT100 SAP NetWeaver Integration Technology Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT100 SAP NetWeaver Integration Technology Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 202 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: configure BIND to function as an authoritative and as a recursive, caching-only DNS server install and configure a web server install and configure a proxy server, including access policies, authentication and resource usage set up a Samba server for various clients configure a DHCP server configure PAM to support authentication using various available methods perform queries and updates to an LDAP server configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains configure an FTP server for anonymous downloads and uploads receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This course prepares students to take the 202 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server HTTP Services Basic Apache configuration Apache configuration for HTTPS Implementing Squid as a caching proxy Implementing Nginx as a web server and a reverse proxy File Sharing Samba Server Configuration NFS Server Configuration Network Client Management DHCP configuration PAM authentication LDAP client usage Configuring an OpenLDAP server E-Mail Services Using e-mail servers Managing E-Mail Delivery Managing Mailbox Access System Security Configuring a router Managing FTP servers Secure shell (SSH) Security tasks OpenVPN Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-2) 202 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-2) 202 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Online Quran classes for kids and Females, start learning the Quran with Tajweed. Our certified (Wafaq ul Madaris®) Female tutors will take you through step by step process to read the Quran with Tajweed. Quran Assistant academy help you to learn Quran online with tajweed also teach namaz, dua's and Islamic education.
Duration 5 Days 30 CPD hours This course is intended for Students preparing to take the CCNP Collaboration certification Network administrators Network engineers Systems engineers Overview After taking this course, you should be able to: Describe the Cisco Collaboration solutions architecture Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP) Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication Implement Cisco Unified Communications Manager provisioning features Describe the different codecs and how they are used to transform analogue voice into digital streams Describe a dial plan, and explain call routing in Cisco Unified Communications Manager Implement Public Switched Telephone Network (PSTN) access using MGCP gateways Implement a Cisco gateway for PSTN access Configure calling privileges in Cisco Unified Communications Manager Implement toll fraud prevention Implement globalized call routing within a Cisco Unified Communications Manager cluster Implement and troubleshoot media resources in Cisco Unified Communications Manager Describe Cisco Instant Messaging and Presence, including call flows and protocols Describe and configure endpoints and commonly required features Configure and troubleshoot Cisco Unity Connection integration Configure and troubleshoot Cisco Unity Connection call handlers Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic Define QoS and its models Implement classification and marking Configure classification and marking options on Cisco Catalyst switches The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) v1.1 course helps you prepare for advanced-level roles focused on implementation and operation of Cisco collaboration solutions. You will gain the knowledge and skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS©) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.This course helps prepare you to take the exam:350-801 Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)After you pass this exam, you earn Cisco Certified Specialist - Collaboration Core certification and satisfy the core requirement for these certifications:CCNP CollaborationCCIE CollaborationThis course prepares you for the 300-435 Automating Cisco Enterprise Solutions (ENAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Enterprise Solutions (ENAUI) because it provides crucial foundational knowledge essential to success. Course Outlines Describing the Cisco Collaboration Solutions Architecture Exploring Call Signaling over IP Networks Integrating Cisco Unified Communications Manager LDAP Implementing Cisco Unified Communications Manager Provisioning Features Exploring Codecs Describing Dial Plans and Endpoint Addressing Implementing MGCP Gateways Implementing Voice Gateways Configuring Calling Privileges in Cisco Unified Communications Manager Implementing Toll Fraud Prevention Implementing Globalized Call Routing Implementing and Troubleshooting Media Resources in Cisco Unified Communications Manager Describing Cisco Instant Messaging and Presence Enabling Cisco Jabber© Configuring Cisco Unity Connection Integration Configuring Cisco Unity Connection Call Handlers Describing Collaboration Edge Architecture Analyzing Quality Issues in Converged Networks Defining QoS and QoS Models Implementing Classification and Marking Configuring Classification and Marking on Cisco Catalyst Switches
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager⢠and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.
Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system
Duration 3 Days 18 CPD hours This course is intended for This course is intended for experienced administrators with a background in either software development or system administration. Team leaders, lead developers, and other accidental Team Foundation Server administrators are also encouraged to take this course. This course will also help a student prepare for the relevant Microsoft certification exam. Overview At course completion, attendees will have had exposure to: - TFS editions and components - Supported topologies and environments - Must-have TFS administration tools - Hardware and software requirements - Required service accounts and permissions - Installing Team Foundation Server - Configuring Team Foundation Server - Managing relevant SQL Server components - Managing relevant SharePoint components - Installing and using Team Explorer - Team project collections and team projects - Using and customizing process templates - TFS licensing and Client Access Licenses - Connecting and using Microsoft Excel & Project - Installing and using Team Explorer Everywhere - Integrating TFS and SharePoint - Using the TFS web portal - Git and TFVC version control systems - Basic and advanced version control workflows - Configuring and using code search - Controlling access to version controlled items - Command-line and third party tools - Configuring automated builds - Deploying and using Visual Studio agents - Configuring agent pools and queues - Creating and queuing automated builds - Configuring Package Management - Configuring Release Management - Creating a release definition - Creating and deploying a release - Strategies for upgrading and migrating to TFS - Integrating TFS with other systems and data - High availability and scalability options - Capacity planning and disaster recovery - Backing up, restoring, and moving TFS data - Managing the data warehouse - Using PowerShell to manage TFS - Customizing Team Foundation Server - Extending Team Foundation Server Provides students with the knowledge and skills to deploy, configure, and manage Microsoft Team Foundation Server 2019 and related software components. Introduction to Team Foundation Server Introduction to Team Foundation Server Editions, components, and configurations Visual Studio Team Services comparison TFS' support of Application Lifecycle Management TFS administrator responsibilities and tasks ?Must-have? tools of a TFS administrator Planning and Deploying TFS Planning the deployment System requirements, software, and accounts Installing and configuring TFS Installing Team Explorer Troubleshooting Configuring TFS Administrator roles and tools Managing team project collections Managing team projects Managing process templates Securing TFS, SharePoint, and SQL Server Renaming and deleting a team project Client Applications TFS Client Access Licenses (CAL) Team Explorer and the web portal Microsoft Excel and Microsoft Project SharePoint project portal Team Explorer Everywhere Command-line and 3rd party tools Version Control Overview of Git and TFVC version control systems Integration with Visual Studio Using TFVC and Git version control Basic and advanced workflows Controlling access to version control Command-line tools and utilities TFS Proxy, MSSCCI Provider, and TFS Sidekicks Building and Releasing Overview of the Visual Studio build system Build agents, agent pools, agent queues Creating and queuing a build Monitoring, and managing a build Securing the build process Running tests as part of the build Overview of Package Management Overview of Release Management Defining, creating, and deploying a release Upgrading, Migrating, and Integrating Upgrading Team Foundation Server In-place vs. migration upgrade Performing post-upgrade tasks Migrating work items Migrating items under version controlled Integrating with Team Foundation Server Custom and 3rd party solutions Advanced Administration Monitoring the health of Team Foundation Server Web-based diagnostic tools Options for scalability and high availability Disaster recovery, backup, and restore Moving Team Foundation Server Managing the data warehouse Using PowerShell to manage TFS Customizing and Extending Customizing vs. extending Customizing a process template Customizing a work item type Creating default work items Creating and using a global list Using Witadmin.exe Using work item templates Creating a custom report Using the REST API to extend Team Foundation Server Additional course details: Nexus Humans Administering Team Foundation Server 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Team Foundation Server 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who have basic knowledge on cloud computing; on-premise system administrators; IT specialists, interested in AWS and Cloud Technologies. Overview Upon successful completion of this course, students will know how to design and deploy scalable, highly accessible and fault-tolerant systems in AWS. In this course, students will learn the main 'Managed Service' offered by AWS; How to design and deploy scalable, highly accessible and fault-tolerant systems in AWS; How to choose the most appropriate AWS service. Introduction Course overview Exam Blue Print Public clouds & cloud economics AWS Overview & Whitepapers Setting up AWS Account Identity and Access Management (IAM) Local users, groups & roles SAML providers Policies Cross Account Access Best practices & Examples Lab Exam highlights Sample questions Simple Storage Service (S3) & Glacier Buckets Objects Lifecycle Configurations and permissions Custom bucket policies Best Practices & Examples Lab Exam highlights Sample questions Virtual Private Cloud (VPC) VPC Internet gateway vs NAT Gateway Elastic IPs Subnets & Routing tables Security Groups & Network Access Lists VPC Peering & Endpoints Managed VPN Connections Best Practices & Examples Lab Exam highlights Sample questions Elastic Compute Cloud (EC2) Instances Amazon Machine Images(AMIs) Elastic Block Store (EBS) Network & Security Load Balancers (ELB) Auto Scaling Groups (ASG) Instance Management Best Practices & Examples Lab Exam highlights Sample questions Route 53 Hosted Zones Health checks Traffic flow Best Practices & Examples Lab Exam highlights Sample questions Relational Database Service (RDS) Engine types Performance & Resilience Subnet groups Best Practices & Examples Lab Exam highlights Sample questions CloudWatch Dashboard and Metrics CloudWatch logs CloudWatch rules Best Practices & Examples Lab Exam highlights Sample questions Other AWS Services Simple Overview CloudFront DynamoDB Elasticache Redshift SQS SWF SNS Elastic Transcoder API Gateway Kenesis CloudFormation Exam highlights Sample questions Multiple AWS Services exercise Lab 1 - Architecting multi-tier environment Lab 2 - Configure backup and monitoring Practice Exam Additional course details: Nexus Humans AWS Certified Solutions Architect - Associate training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Certified Solutions Architect - Associate course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.