Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. Module 1: Introduction to TSQL for Business Intelligence Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Module 2: Turning Table Columns into Variables for Analysis: SELECT List Expressions, WHERE, and ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Module 3: Combining Columns from Multiple Tables into a Single Dataset: The JOIN Operators Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNERJOIN Understanding Joins, Part 3: The OUTERJOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTERJOINs Combining JOIN Operations with WHERE and ORDER BY Module 4: Creating an Appropriate Aggregation Level Using GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Module 5: Subqueries, Derived Tables and Common Table Expressions Non-correlated and correlated subqueries Derived tables Common table expressions Module 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Module 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Additional course details: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Report Authors Overview What is IBM Cognos Analytics ? Reporting Examine dimensionally modelled and dimensional data sources Examine personal data sources and data modules Examine List reports Aggregate measure/fact data Use shared dimensions to create multi-fact queries Add repeated information to reports Create crosstab reports Create complex crosstab reports Format, sort, and aggregate data in a crosstab report Create discontinuous crosstab reports Create Visualization reports Add business logic to reports using IBM Cognos Analytics ? Reporting Focus reports using filters Focus reports using prompts Augment reports using calculations Extend report functionality in IBM Cognos Analytics - Reporting Customize reports with conditional formatting Conditionally format one crosstab measure based on another Drill-through definitions Enhance the report layout Use additional report building techniques This offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting? Create a simple list report Create a report from a dimensionally modeled relational data source Examine personal data sources and data modules Upload personal data Upload custom images Use navigation paths Create a report from a personal data source Examine list reports Group data in a list Format columns in a list Include headers and footers in a list Enhance a list report Aggregate measure/fact data Identify differences in aggregation Explore data aggregation Use shared dimensions to create multi-fact queries Create a multi-fact query in a list report Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create a simple crosstab report Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Create a complex crosstab report Format, sort, and aggregate data in a crosstab Sort, format, and aggregate a crosstab report Create discontinuous crosstab reports Present unrelated items using a discontinuous crosstab Create a visualization report Create and format a visualization report Create a report that uses a Map visualization Show the same data graphically and numerically Focus reports using filters Apply filters to a report Apply a detail filter on fact data in a report Apply a summary filter to a report Focus reports using prompts Create a prompt by adding a parameter Add a value prompt to a report Add a Select & search prompt to a report Create a cascading prompt Augment reports using calculations Add calculations to a report Display prompt selections in the report title Customize reports with conditional formatting Create a multilingual report Highlight exceptional data and conditionally render a column Drill-through definitions Let users navigate to related data in IBM Cognos Analytics Enhance report layout Create a report structured on data items Create a condensed list report Use additional report building techniques Section a report and reuse objects within the same report Reuse layout components in a different report Explore options for reports that contain no data Additional course details: Nexus Humans B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java
Duration 5 Days 30 CPD hours This course is intended for This is an introductory- level Java programming course, designed for experienced developers who wish to get up and running with JEE, or who need to reinforce sound Java for Web / JEE coding practices. Attendees should have a working knowledge of developing basic Java software applications. Overview Students who attend Mastering JEE Web Application Development will leave the course armed with the required skills to design and build scalable, secure, maintainable web applications - leveraging our extensive experience in the delivery of scalable enterprise applications with complex web interfaces based on JEE technologies. Throughout this training, you will be confronted with common web application design problems and given the tools you will need to solve them, such as JEE design patterns. You will also be exposed to a range of JEE and web technologies such as Servlets, JSPs, JSF, JNDI, CDI and advice on when and how to use them. Students will also learn about the capabilities of servlets, their advantages, servlet architecture, and session management. Developers will also learn about managing resources, deployment, and application models, how to use custom tags, and how to build robust and capable web applications using servlets and other components. The course begins with a discussion of web application architecture. A major part of the course is spent on the various web components that are used to implement dynamic web applications. Students will learn not only specific topics and APIs but also how to fit the pieces together into a complete application. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn to: Design and build web applications from both business and technical requirements Build web interfaces with JSF, JSPs and Servlets, using the latest technologies in JEE. Write maintainable web applications that separate HTML and Java Understand the design and development of web applications using Servlets, JSPs, web fragments, and JSF Work JEE's version of dependency injection (CDI) Make Servlets cooperate and share data Store and process session information Deal with concurrency issues Access databases with JPA Work with annotations included in JEE Work with WebSockets as well as asynchronous servlets Use Java Bean validation in a web application Properly handle various types of exceptions This course is for experienced Java developers who are new to JEE and need to get up and running with essential dynamic web development skills. You will gain core JEE knowledge and skills that can be used as the foundation for developing production-quality web applications to a basic level. Developing Java EE applications Enterprise Development Java EE Core Components JEE Dynamic Web Applications Introduction to Servlets Form processing using Servlets Java Server Pages Implementing MVC in JEE Session Management JEE Servlet Filters and Listeners Servlet Filters Expression Language 3.0 (EL) Overview of EL The EL language Custom Tags Introduction to Custom Tags The Java Standard Tag Library Contexts and Dependency Injection (CDI) Introduction to CDI Using CDI CDI and Java EE Using Resources JEE DataSources Overview of JPA Java API for WebSocket Introduction to WebSocket Implementing WebSocket Endpoint Extending WebSockets Java Bean Validation (JSR 349) Introduction to Bean Validation Bean Validation Managing Web Applications Web Fragments Error Handling Asynchronous Servlets Web Security Introduction to Java Server Faces Introduction to JSF JSF Components Facelets Facelets Facelets Templating and Resources Additional course details: Nexus Humans Mastering JEE Web Development (TT5100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering JEE Web Development (TT5100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones. Network administrators Network engineers Network supervisors Network managers Network Operations Center (NOC) personnel Network designers Network architects Channel partners Overview After taking this course, you should be able to: Describe VPN concepts and operation in a Service Provider environment Implement Layer 3 MPLS VPN operations in a Service Provider environment Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment Troubleshoot typical issues in Layer 3 MPLS VPN environments Implement Layer 2 VPN operations in a Service Provider environment Troubleshoot Layer 2 VPN issues in a Service Provider network Implement MPLS VPN solutions for IPv6 environments Troubleshoot MPLS VPN solutions for IPv6 environments The Implementing Cisco Service Provider VPN Services (SPVI) 5-day course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification.This course prepares you for the 300-515 Implementing Cisco© Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist - Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP© Service Provider certification.This course will help you:Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classificationsLearn to configure optional paths for traffic to avoid network congestionPrepare to take the 300-515 SPVI exam Introducing VPN Services VPN Fundamentals MPLS VPN Control Plane Operation Troubleshooting MPLS VPN Underlay Troubleshoot Core Interior Gateway Protocol (IGP) Troubleshoot Border Gateway Protocol (BGP) Implementing Layer 3 MPLS VPNs Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs Implementing Layer 3 Interdomain MPLS VPNs Inter-Autonomous System (AS) for Layer 3 MPLS VPNs Content Security and Control (CSC) for Layer 3 MPLS VPNs Implementing Layer 3 Multicast MPLS VPNs Multicast VPN (MVPN) Fundamentals Implement Intranet MVPN Troubleshooting Intra-AS Layer 3 VPNs Troubleshoot PE-CE Connectivity Troubleshoot PE-to-Route Reflecto Implementing Layer 2 VPNs Layer 2 Service Architecture and Carrier Ethernet Services Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions Troubleshooting Layer 2 VPNs Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions Implementing Layer 3 IPv6 MPLS VPNs Classical Solutions for Deploying IPv6 over IPv4 Environments Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment Troubleshooting Layer 3 IPv6 MPLS VPNs Troubleshooting PE-to-PE Connectivity Additional course details: Nexus Humans Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows - IT Staff and Managers - Network and systems personnel and engineers - Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics Overview Upon completing this course, the student will be able to meet these objectives: Students will be able to Deploy and Manage a Meraki Network using the Meraki Dashboard - Deploy, Manage, Monitor and Troubleshoot Meraki MS Switches - Deploy, Manage, Monitor and Troubleshoot Meraki MR Wireless Access Points - Deploy, Manage, Monitor and Troubleshoot Meraki MX Firewall Appliances - Deploy, Manage, Monitor and Troubleshoot Meraki MV IP Video Cameras - Deploy, Manage, Monitor and Troubleshoot Meraki MC Phones - Deploy, Manage, Monitor and Troubleshoot Meraki Systems Manager - Deploy, Manage, Monitor and Troubleshoot Meraki SDWAN This course familiarizes individuals with networking concepts and demonstrates how to effectively use Meraki products to build a comprehensive network Cisco/Meraki Product Line Introduction MS - Switching MR - Wireless LAN MX - Security MV ? Camera MC - Voice SD-WAN Cisco/Meraki Cloud Management Introduction to cloud management The dashboard and navigation Organizations & Networks ? what is the difference and how to use them System-wide parameters (organization parameters) Cisco/Meraki Dashboard Administration Creating and implementing maps Summary Report and Auto Generation Reports Adding administrators and tweaking security levels Using Tags and Configuring Alerting (SNMP, email) Adding admins, configuring reports, and alerts Firmware Management Configuring Authentication Lab 1 Lab 2 Configuring external authentication Configuring Group Policies Device Replacement Location Analytics Other advanced analytics Cisco/Meraki Switching Review switching basics Review Meraki L2 Switch Models Configuring Meraki Switches Troubleshooting / Diagnostics Lab 3 Cisco/Meraki Routing Review routing basic (IP Addresses, Networks and Masks, OSPF, etc.) Review Meraki L3 switch Models Configuring Meraki Switches for Routing Lab 4 Cisco/Meraki Wireless Review Wireless Basics Meraki Wireless Product Review Performing a Site Survey Configuring Access Points Lab 5 Cisco/Meraki Firewalls/Security Review firewall basics Meraki Firewall Model Review Configuring a Meraki Firewall Lab 6 IP Cameras MV21 vs MV71 Installing Cameras Adding Cameras to the Dashboard Managing MV Cameras Troubleshooting Cameras Lab 7 Meraki Communications QOS Voice Security Deploying Meraki MC74 Phones Deploying Cisco IP Phones to CUCM Deploying Voice Features End User Lab 8 Meraki Systems Manager Controlling Wireless Device Policies Enrolling Devices Apps Profiles Tags Security Policies Geofencing Policies Lab 9 Meraki SDWAN What is SD-WAN? Concentrator Mode VPN Topology Split Tunnel Full Tunnel Hub and Spoke VPN Mesh Datacenter Redundancy (DC-DC Failover) Warm Spare (High Availability) for VPN concentrators Connection Monitor Dual-Active VPN uplinks Policy-based Routing Dynamic Path Selection SD-WAN Objectives Example Topology High Level Traffic Flow SD-WAN Technologies Deploying a one-armed concentrator Dashboard Configuration Other Datacenter Configuration MX IP Assignment Upstream Considerations Datacenter Redundancy (DC-DC Failover) High-level architecture Failover Times Datacenter Deployment Branch Deployment Lab 10 Meraki Support Getting support for Meraki Finding the Right Documentation Posting in the Community Troubleshooting Meraki Connectivity Issues Resetting Devices. Additional course details: Nexus Humans Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Customers configuring and maintaining CUCM 8.x, 9.x, 10.x, 11.0, or 12.x. PBX System Administrators transitioning to CUCM administration IP networking professionals taking on responsibility for CUCM administration Workers being cross-trained for CUCM administration coverage The secondary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) 12.x (or earlier version) system and its environment Configure CUCM to support IP Phones in multiple locations Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Understand User Web Page functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Understand the capabilities of and demonstrate the Bulk Administration Tool Understand the SMART Licensing model for Cisco Unified Communications Understand and demonstrate the use of the Unified Reporting tool Understand and demonstrate the use of the Dialed Number Analyzer Communications Manager Administration for Version 12.5 (CMA v12.5) is an instructor-led course presented to system administrators and customers involved with the day-to-day operation of the Cisco Unified Communications Manager product. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan and implementing Features. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the Cisco Unified Communications Manager software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x. The concepts and the lab tasks are the same for most of the Cisco Unified Communications Manager software versions CUCM System Basics Introduction to IP Telephony Traditional Voice vs. IP Telephony Clustering Overview Intra-Cluster Communications CUCM Redundancy Options Deployment Models Campus (Single Site) Deployment Centralized Call Processing Deployment Distributed Call Processing Deployment Clustering over the IP WAN Call Processing Deployment Hybrid Call Processing Deployment Basics of CUCM Configuration Administrative Interfaces Administration and Serviceability Unified Reporting and the Enterprise License Manager Disaster Recovery System and Unified OS Administration Navigation Bar Command Line Interface Server Redundancy: CM Groups CM Group Configuration Date/Time Group Regions and Codecs Locations Device Pool Configuration Service Parameters Configuration Enterprise Parameters Configuration Supporting Phones and Users Configuring CUCM to Support Phones Cisco Unified IP Phone Model Ranges Specialized Cisco IP 89xx and 99xx phones Cisco Jabber Client Phone Button Templates Softkey Template Cisco IP Phone Registration Device Defaults Phone Configuration Manual Phone Configuration Auto-Registration Self-Provisioning Using the Bulk Administration Tool (BAT) Deploying new phones and users Overview of the Auto-Register Phone Tool Configuring CUCM to Support Users Understanding CUCM Users Manual User Creation User Import with BAT Importing Users with LDAP Sync LDAP Authentication Understanding User Administration Configuring User Administration Working with Access Control Groups Assigning End Users to Access Control Groups User Web Pages Understanding the Dial Plan Dial Plan Overview Introduction to the Dial Plan Understanding Dial Plan Components Route Lists, Route Groups and Devices Call Routing Understanding Digit Analysis Basics of Dial Plan Configuration Basics of the Dial Plan Dial Plan Configuration Translation Patterns Route Plan Report Advanced Dial Plan Configuration Understanding Digit Manipulation External Phone Number Masks Transformation Masks Discard Digits Instructions: PreDot Class of Control Overview of Class of Control Partitions and Calling Search Space Traditional vs. Line/Device Approach Configuring Partitions and CSSs Time of Day Routing PLAR Application Forced Authorization Codes CUCM Features Media Resources Overview of Media Resources Conference Bridge Music on Hold Transcoder Annunciator Overview of Media Resource Management Configuring Media Resources User Features Configuring Call Coverage in Cisco Unified Communications Manager Call Coverage in Cisco Unified Communications Manager Hunt Group Overview Hunt Group Configuration Final Forwarding Shared Lines Call Pickup Directed and Group Call Pickup Call Park Lab Outline Configuring the System to Support Cisco IP Phones Creating and Associating Users Configuring Basic Dial Plan Elements Configuring Complex Dial Plan Elements Implementing Class of Control Configuring Media Resources Configuring Hunt Groups and Call Coverage Configuring Call Pickup and Call Park