Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. Course Outline Setting up a DB2 database Referential integrity Getting data into and out of DB2 Keeping your DB2 data in good shape Application data recovery basics Program preparation and Bind Security Serialization Additional course details: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
AAT Level 3 is an Advanced or Intermediate level of AAT qualification in accounting. This course gives successful students the skills and knowledge to work competently in finance, accountancy, or bookkeeping role. Moreover, the students also have the opportunity to progress their studies with the AAT Level 4 Diploma in Accounting and acquire full membership of the AAT. Duration You can expect this qualification to take 1-1.5 year to complete for most students. Tutors Tutors are highly qualified with extensive knowledge of accountancy. Study Options Online Live - Live Interactive Online Classes are offered through the State of The Art Virtual Learning Campus. Classes are recorded to catch up later. In-Campus - Study at our London campus for AAT level 3. Daytime, weekend and evening courses for AAT available. AAT Distance Learning- Self-Study at home at your own pace with Study Material and access to Online study Material through Virtual Learning Campus (VLC). AAT Qualification Once you finish AAT qualification and pass all exams successfully, you will be awarded globally recognised AAT Certificate in Accounting from AAT. AAT Level 3 Course Syllabus Advanced Bookkeeping Final Accounts Preparation Indirect Tax Management Accounting: Costing Ethics for Accountants Spreadsheets for Accounting
Duration 2 Days 12 CPD hours This course is intended for This in an introductory-level class for intermediate skilled team members. Students should have prior software development experience or exposure, have some basic familiarity with containers, and should also be able to navigate the command line. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will explore: What a Kubernetes cluster is, and how to deploy and manage them on-premises and in the cloud. How Kubernetes fits into the cloud-native ecosystem, and how it interfaces with other important technologies such as Docker. The major Kubernetes components that let us deploy and manage applications in a modern cloud-native fashion. How to define and manage applications with declarative manifest files that should be version-controlled and treated like code. Containerization has taken the IT world by storm in the last few years. Large software houses, starting from Google and Amazon, are running significant portions of their production load in containers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This is a hands-on workshop style course that teaches core features and functionality of Kubernetes. You will leave this course knowing how to build a Kubernetes cluster, and how to deploy and manage applications on that cluster. Getting Started Our sample application Kubernetes concepts Declarative vs imperative Kubernetes network model First contact with kubectl Setting up Kubernetes Working with Containers Running our first containers on Kubernetes Exposing containers Shipping images with a registry Running our application on Kubernetes Exploring the Kubernetes Dashboard The Kubernetes dashboard Security implications of kubectl apply Scaling a deployment Daemon sets Labels and selectors Rolling updates Next Steps Accessing logs from the CLI Managing stacks with Helm Namespaces Next steps
Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: A technical audience at an intermediate level Overview Using Amazon SageMaker, this course teaches you how to: Prepare a dataset for training. Train and evaluate a machine learning model. Automatically tune a machine learning model. Prepare a machine learning model for production. Think critically about machine learning model results In this course, learn how to solve a real-world use case with machine learning and produce actionable results using Amazon SageMaker. This course teaches you how to use Amazon SageMaker to cover the different stages of the typical data science process, from analyzing and visualizing a data set, to preparing the data and feature engineering, down to the practical aspects of model building, training, tuning and deployment. Day 1 Business problem: Churn prediction Load and display the dataset Assess features and determine which Amazon SageMaker algorithm to use Use Amazon Sagemaker to train, evaluate, and automatically tune the model Deploy the model Assess relative cost of errors Additional course details: Nexus Humans Practical Data Science with Amazon SageMaker training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Practical Data Science with Amazon SageMaker course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for anyone who works on WebSphere related applications and projects, including administrators, IBM Business Partners, independent software vendors (ISVs), and consultants. Overview The objectives for this course are as follows:Use IBM Support Assistant to organize and analyze problem artifactsUse problem determination techniques to identify common problemsApply problem investigation approaches such as analysis and isolationGather diagnostic data problem artifacts by using administrative toolsTroubleshoot JVM-related problems such as hung threads, out of memory issues, and crashesUse IBM Support Assistant to run tools that analyze diagnostic dataIdentify and troubleshoot common problems with database connectionsConfigure and tune database connection poolsTroubleshoot WebSphere security problems associated with authentication, authorization, SSL, and Java 2 policiesIdentify and resolve Java EE application deployment problemsTroubleshoot HTTP request flow problems from web server to web containerIdentify and resolve application server startup failuresTroubleshoot problems associated with WebSphere default messaging and SI busTroubleshoot WebSphere installation problemsUse Intelligent Management features to configure health policies and tasksCommunicate effectively with IBM support teams This course teaches you how to manage WebSphere Application Server problems more skillfully within your organization by using problem determination tools and techniques. Outline Course introduction Overview of WebSphere Application Server systems and components Using the IBM Support Assistant Team Server 5.0 Exercise: Using the IBM Support Assistant Team Server 5.0 Problem determination methods Gathering diagnostic data Exercise: Gathering diagnostic data Introduction to JVM-related problems Exercise: Introduction to configuring garbage collection policies How to troubleshoot hangs Exercise: Troubleshooting hung threads How to troubleshoot crashes Exercise: Troubleshooting crashes Introduction to WebSphere out-of-memory problems Exercise: Troubleshooting an out-of-memory condition Introduction to database connection problems Exercise: Troubleshooting database connection problems Tuning and connection pool management problems Exercise: Troubleshooting a connection leak WebSphere security configuration problems Exercise: Troubleshooting security problems Application deployment problems Server start failures Exercise: Troubleshooting server start failures Request flow and web container problems Exercise: Troubleshooting request flow and web container problems Default messaging provider problem determination Exercise: Troubleshooting WebSphere default messaging WebSphere installation problems when using IBM Installation Manager Intelligent Management problem determination and problem determination tools Exercise: Configuring health management policies Course summary
Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for the Information Systems communications professional who is planning to install TCP/IP for z/OS and for TCP/IP users who are interested in installing and customizing IBM's TCP/IP product in interoperability environments and main applications. Overview Describe IBM's z/OS TCP/IP product offering Describe the installation requirements and system customization for the z/OS TCP/IP implementation Define network interface attachments that produce connectivity for z/OS TCP/IP communications Construct TCP/IP configuration statements for z/OS to allow operation and connectivity to an existing TCP/IP network Configure TCP/IP for z/OS for basic communications functions Construct TCP/IP configuration statements for z/OS for selected TCP/IP application protocols services This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS. TCP/IP for z/OS introduction . z/OS system prerequisites for TCP/IP . Basic customization . Network interfaces . Name services . OMPRoute . Telnet . Enterprise Extender . SyslogD . FTP . SMTP . Additional course details: Nexus Humans CB69 IBM TCP/IP for z/OS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CB69 IBM TCP/IP for z/OS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.