Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Choosing a Database Programming Language What is Database Programming? PL?SQL Performance Advantages Integration wth Other Languages PL/SQL Language Fundamentals PL/SQL Program Structure LANGUAGE SYNTAX RULES EMBEDDING SQL WRITING READABLE CODE GENERATING DATABASE OUTPUT SQL*PLUS INPUT OF A PROGRAM BLOCK Declare Section About the Declare Section DECLARE PRIMITIVE TYPES DECLARATION OPTIONS NOT NULL CONSTANT DATA DICTIONARY INTEGRATION %TYPE DECLARE SIMPLE USER---DEFINED TYPES TYPE... TABLE TYPE... RECORD EXTENDED USER---DEFINED TYPES Begin Section About the Begin Section Manipulating Program Data Logic Control & Branching GOTO LOOP IF-THEN-ELSE CASE Exception Section ABOUT THE EXCEPTION SECTION ISOLATING THE SPECIFIC EXCEPTION PRAGMA EXCEPTION_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT &SELECT...INTO Beyond the Basics: Explicit Cursors ABOUT EXPLICIT CURSORS EXTENDED CURSOR TECHNIQUES FOR UPDATE OF Clause WHERE CURRENT OF Clause Using FOR?LOOP Cursors Beyond the Basics: Nested BlocksBeyond the Basics: Declared Subprograms USING DECLARED SUBPROGRAMS DECLARED PROCEDURE DECLARED FUNCTION Introducing Databse-Resident Program Units ABOUT DATABASE---RESIDENT PROGRAMS PHYSICAL STORAGE & EXECUTION TYPES OF STORED PROGRAM UNITS STORED PROGRAM UNIT ADVANTAGES MODULAR DESIGN PRINCIPLES Creating Stored Procedures & Functions STORED PROCEDURES & FUNCTIONS CREATE PROCEDURE / CREATE FUNCTION CREATING PROCEDURES & FUNCTIONS RAISE_SALARY() Procedure SALARY_VALID() Function THE PARAMETER SPECIFICATION DEFAULT Clause SYSTEM & OBJECT PRIVILEGES USING THE DEVELOPMENT TOOLS Executing Stored Procedures & Functions CALLING PROCEDURES & FUNCTIONS UNIT TESTING WITH EXECUTE ANONYMOUS BLOCK UNIT TESTING SPECIFYING A PARAMETER NOTATION SQL WORKSHEET UNIT TESTING CALLING FUNCTIONS FROM SQL Maintaining Stored Program Units RECOMPILING PROGRAMS Mass Recompilation Using UTL_RECOMP() DROPPING PROCEDURES & FUNCTIONS DROP PROCEDURE / FUNCTION DATA DICTIONARY METADATA Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies DEPENDENCY INTERNALS TRACKING DEPENDENCIES THE DEPENDENCY TRACKING UTILITY SQL DEVELOPER DEPENDENCY INFO DEPENDENCY STRATEGY CHECKLISTS Creating & Maintaining Packages ABOUT PACKAGES CREATING PACKAGES MAINTAINING PACKAGES PERFORMANCE CONSIDERATIONS Advanced Package Capabilities DEFINER & INVOKER RIGHTS WHITE LITS & ACCESSIBLE BY PERSISTENT GLOBAL OBJECTS DEFINING INITIALIZATION LOGIC OBJECT ORIENTATION SUPPORT Advanced Cursor Techniques USING CUSROS VARIABLES USING SYS_REFCURSOR USING CURSOR EXPRESSIONS Using System-Supplied Package DBMS_OUTPUT() UTL_FILE() FOPEN() EXAMPLE Database Trigger Concepts ABOUT DATABASE TRIGGERS DML EVENT TRIGGER SUB---TYPES DATABASE TRIGGER SCENARIO TRIGGER EXECUTION MECHANISMS TRIGGERS WITHIN SQL WORKSHEET Creating Database Triggers STATEMENT-LEVEL TRIGGERS Using RAISE_APPLICATION_ERROR() ROW---LEVEL TRIGGERS EXAMPLES OF TRIGGERS EMPLOYEE_SALARY_CHECK Example EMPLOYEE_JOURNAL Example BUDGET_EVENT Example INSTEAD OF TRIGGERS TRIGGERS WITHIN AN APPLICATION Maintaining Database Triggers CALL SYNTAX TRIGGER MAINTENANCE TASKS SHOW ERRORS TRIGGER DROP TRIGGER ALTER TRIGGER MULTIPLE TRIGGERS FOR A TABLE HANDLING MUTATING TABLE ISSUES Implementing System Event Triggers WHAT ARE SYSTEM EVENT TRIGGERS? DEFININGTHE SCOPE AVAILABLE SYSTEM EVENTS SYSTEM EVENT ATTRIBUTES Additional course details: Nexus Humans Oracle 12c PL/SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c PL/SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
AAT Level 4 is the highest level or final stage of the AAT Accounting qualification. This qualification provides the skills necessary for a 'Finance Officer' role including the complex management accounting tasks, general management skills, drafting financial statements and specialist learning areas. This provides you with an opportunity to become a professional member of AAT and use it MAAT after your name. You are also entitled to exemptions in the UK's chartered and certified accounting qualifications. Besides, if you want to pursue your career further in University, you are entitled to exemptions for up to two years in various universities in the UK. What is AAT? AAT is an awarding body for vocational accountants. AAT is highly recognised globally with members over 130,000 worldwide. What are the benefits after completing AAT courses? A newly qualified AAT member can expect to earn an average of £21,600. Some accounting technicians work as accounts clerks; others go on to become managing directors or finance directors of well-known companies. Some go to work as a self employed accountant as AAT allows the student to become chartered. Osborne Training is an AAT Approved Training Provider in London. In taking the Association of Accounting Technicians qualification with Osborne Training, you will make one of the greatest decisions of your career. Duration You can expect this qualification to take 1-1.5 year to complete for most students. Tutors Tutors are highly qualified with extensive knowledge of accountancy. Study Options Distance Learning - Self Study with Study Material and access to Online study Material through Virtual Learning Campus. Osborne Books are delivered to students address with additional study materials and Tutorial support online. Online Live - Interactive tutorial sessions by expert tutors and access to world-class Virtual Learning campus for additional study materials. Classroom Based- Osborne Training offers Evening and Weekend sessions for AAT Level 4 from various centres in London, Watford, Birmingham etc. Once you finish AAT qualification and pass all exams successfully, you will be awarded globally recognised AAT Certificate in Accounting from AAT. AAT Level 4 Course Syllabus Management Accounting: Budgeting Management Accounting: Decision and Control Financial Statements of Limited Companies Accounting Systems and Controls Business Tax Personal Tax
There is a lot to learn in Power BI, this course takes a comprehensive look at the fundamentals of analysing data and includes a balanced look at the four main components that make up Power BI Desktop: Report view, Data view, Model view, and the Power Query Editor. It also demonstrates how to utilise the online Power BI service. It looks at authoring tools that enable you to connect to and transform data from a variety of sources, allowing you to produce detailed reports through a range of visualisations, in an interactive and dynamic way. It also includes a detailed look at formulas by writing both M functions in Power Query, and DAX functions in Desktop view. This knowledge will allow you to take your reports to the next level. The aim of this course is to provide a complete introduction to understanding the Power BI analysis process, by working hands-on with examples that will equip you with the necessary skills to start applying your learning straight away. 1 Getting Started The Power BI ecosystem Opening Power BI Desktop Power BI's four views Introduction to Dashboards 2 Importing Files Importing data sources Importing an Excel file Importing a CSV file Importing a database Connect to an SQL Server Database Import vs. Direct Query Importing from the web Importing a folder of files Managing file connections 3 Shape Data in the Query Editor The process of shaping data Managing data types Keeping and removing rows Add a custom column Appending tables together Hiding queries in reports Fixing error issues Basic maths operations 4 The Data Model Table relationships Relationship properties 5 Merge Queries Table join kinds Merging tables 6 Inserting Dashboard Visuals Things to keep in mind Inserting maps Formatting Maps Inserting charts Formatting Charts Inserting a tree map Inserting a table, matrix, and card Controlling number formats About report themes Highlighting key points Filter reports with slicers Sync slicers across dashboards Custom web visuals 7 Publish and share Reports Publishing to Power BI service Editing online reports Pinning visuals to a dashboard What is Q&A? Sharing dashboards Exporting reports to PowerPoint Exporting reports as PDF files 8 The Power Query Editor Fill data up and down Split column by delimiter Add a conditional column More custom columns Merging columns 9 The M Functions Inserting text functions Insert an IF function Create a query group 10 Pivoting Tables Pivot a table Pivot and append tables Pivot but don't aggregate Unpivot tables Append mismatched headers 11 Data Modelling Expanded Understanding relationships Mark a date table 12 DAX New Columns New columns and measures New column calculations Insert a SWITCH function 13 Introduction to DAX Measures Common measure functions Insert a SUM function Insert a COUNTROWS function Insert a DISTINCTCOUNT function Insert a DIVIDE function DAX rules 14 The CALCULATE Measure The syntax of CALCULATE Insert a CALCULATE function Control field summarisation Things of note 15 The SUMX measure X iterator functions Anatomy of SUMX Insert a SUMX function When to use X functions 16 Time Intelligence Measures Importance of a calendar table Insert a TOTALYTD function Change financial year end date Comparing historical data Insert a DATEADD function 17 Hierarchies and Groups Mine data using hierarchies Compare data in groups
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.
Duration 4 Days 24 CPD hours This course is intended for Cisco integrators and partners Network operators Network administrators Optical network administrators System administrators System integrators and professional services Overview After taking this course, you should be able to: Describe Cisco EPN Manager's features and navigate the Cisco EPN Manager's user interface Understand the network inventory, topologies, and circuits Manage dashboards, alarms, and events Create and interpret reports Distinguish the system requirements for Cisco EPN Manager, and procedures for new installations, upgrades, licensing, and high availability Manage device groups and virtual domains Establish user accounts and their role-based access to EPN Manager's features and devices Configure and combine devices Perform backups and restores Manage data retention, purging, and software updates Monitor system health and performance Update and manage software images Archive, review, and restore configuration files Configure Quality of Service (QoS) actions and policies Configure devices using templates Perform compliance audits Configure monitoring policies Provision Carrier Ethernet services Provision Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) services Provision Circuit Emulation (CEM) services Provision an Optical Channel Network Connection (OCHNC) circuit Provision an Optical Channel Client Connection (OCHCC) circuit Provision an optical Media Channel Group with an OCHCC circuit Describe how Cisco EPN Manager can work with Cisco Network Services Orchestrator (NSO) to provide automated service provisioning The Configuring and Operating Cisco EPN Manager (EPNM100) v4.0 course shows you how to create efficient and agile network management through automated device operations, fast provisioning install, network configuration, dashboard management, and device management using Cisco¸ Evolved Programmable Network (EPN) Manager. Through a combination of lessons and hands-on labs, you will learn to maximize the benefits of the Cisco EPN Manager as a simplified, flexible, and cost-effective end-to-end lifecycle management solution for network provisioning, and network assurance management for today?s converging packet and optical multilayer networks. Exploring Cisco EPN Manager Cisco EPN Manager Overview Cisco EPN Manager Key Features Viewing Devices and Inventory Device Types View Devices Viewing Network Topologies and Circuits Topology Map Basics Change Information Displayed Using Dashboards Dashboards Overview Customize Dashboards Managing Alarms and Events Alarms and Events Overview View Alarms and Events Generating Reports Report Fundamentals Create and Schedule Reports Performing Basic Administration Installation Basics Perform Server Setup Adding Devices Device Management Fundamentals Add a Device Manually Add User-Defined Fields Backup and Restoring Backup Fundamentals Schedule a Backup Performing System Maintenance Software Updates Data Retention and Purging Software Image Management (SWIM) Software Image Management Fundamentals Setting Up Software Image Management Configuration Management Configuration Management Fundamentals Archive Setup Configuring QoS QoS Basics Create a Classification Profile Configuring Devices with Templates Device Configuration Methods Template Basics Performing Compliance Management Compliance Audit Basics Compliance Policy Basics Monitoring with Policies Monitoring Policy Fundamentals Edit a Monitoring Policy Circuit and Video Conferencing (VC) Fundamentals Circuit Provisioning Basics Supported Service Types Provisioning Carrier Ethernet Services Provision a Carrier Ethernet Service Verify a Service Provisioning Cisco MPLS Traffic Engineering Services Cisco MPLS TE Service Basics Provision a Cisco MPLS TE Service Provisioning Circuit Emulation Services Circuit Emulation Services Basics Provision a CEM Service Provisioning an OCHNC Circuit OCHNC Circuit Basics Set Up Devices for Circuit Provisioning an Optical OCHCC Circuit OCHCC Circuit Basics Set Up Devices for Circuit Provisioning a Media Channel Group with an OCHCC Circuit Media Channel Group with OCHCC Basics Provision a Media Channel Group Introducing Cisco EPN Manager with Cisco NSO Cisco EPN Manager with Cisco NSO Basics For More Information Additional course details: Nexus Humans Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes Overview By the end of the course, you should be able to meet the following objectives: Describe vSphere with Kubernetes and use cases in on-premises environments Deploy vSphere with Kubernetes Describe the VMware NSX networking requirements for vSphere with Kubernetes. Create and manage vSphere with Kubernetes namespaces Deploy and run container applications on vSphere with Kubernetes Deploy and configure VMware Harbor Describe the VMware Tanzu⢠Kubernetes Grid⢠service Deploy a Tanzu Kubernetes Grid cluster Deploy and run container applications on a Tanzu Kubernetes Grid cluster Describe the vSphere with Kubernetes lifecycle Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes During this 3-day course, you focus on deploying and managing VMware vSphere© with Kubernetes. You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a VMware vSphere© environment. Course Introduction Introductions and course logistics Course objectives Introduction to Containers and Kubernetes Describe Virtual Machines and Containers Describe Container Hosts Describe Container Engines Describe Dockerfile Describe Container Images Describe Image Registry Describe the purpose and functionality of Kubernetes Describe Manifest YAML files Explain Pod YAML files Explain ReplicaSets Explain Services Explain Deployments Introduction to vSphere with Kubernetes Describe the purpose and functionality of vSphere with Kubernetes Explain the integration with VMware Tanzu? Mission Control? Describe the capabilities of vSphere with Kubernetes Describe the components of vSphere with Kubernetes Contrast vSphere with Kubernetes to traditional Kubernetes Describe the requirements for vSphere with Kubernetes Prepare a vSphere cluster for vSphere with Kubernetes Describe the NSX components required for vSphere with Kubernetes Describe the network topology of vSphere with Kubernetes Explain the networking requirements of vSphere with Kubernetes Compare NSX networking objects with Kubernetes networking objects vSphere with Kubernetes Core Services Explain the architecture of the vSphere with Kubernetes Core Services Describe the Container Service Describe the Volume Service Describe the Network Service Describe the Registry Service Describe the use cases of vSphere with Kubernetes Enable vSphere with Kubernetes Deploy VMware Harbor Registry vSphere with Kubernetes Namespaces Describe a vSphere with Kubernetes namespace Contrast a vSphere with Kubernetes namespace to a traditional Kubernetes namespace Describe Resource Quotas Explain Authentication and Authorization to vSphere with Kubernetes Explain the use cases of namespaces Create a namespace Describe kubectl Use kubectl to interact with vSphere with Kubernetes Describe using kubectl pod deployment Explain scaling a pod deployment Explain managing pod lifecycle Explain deleting pods Use kubectl to deploy a pod Use kubectl to scale a pod Use kubectl to switch between namespaces VMware Tanzu Kubernetes Grid service Explain Tanzu Kubernetes Grid service Describe the use cases for Tanzu Kubernetes Grid clusters Describe the integration with Tanzu Mission Control Explain the lifecycle of Tanzu Kubernetes Grid clusters Deploy Tanzu Kubernetes Grid cluster Deploy pods to a Tanzu Kubernetes Grid cluster Monitoring and Troubleshooting Describe the monitoring tools for vSphere with Kubernetes Describe the troubleshooting tools for vSphere with Kubernetes Explain cluster, node, and namespace health Explain usage and capacity monitoring Describe vCenter Server events Describe vSphere with Kubernetes events Gather support information vSphere with Kubernetes Lifecycle Describe the vSphere with Kubernetes lifecycle Describe the Tanzu Kubernetes Grid lifecycle Describe scaling a vSphere with Kubernetes cluster Update vSphere with Kubernetes Update Tanzu Kubernetes Grid clusters Remove vSphere with Kubernetes Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere with Tanzu: Deploy and Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere with Tanzu: Deploy and Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.