Duration 1 Days 6 CPD hours This course is intended for This course is intended for those responsible for ITAD programs and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students will learn the best practices in an IT Asset Management Program and align those processes with their organizations' business practices. They will be able to manage overall ITAM programs and demonstrate in-depth knowledge, operational knowledge and competence in asset disposal and process development. The IAITAM Certified IT Asset Disposition (CITAD) course prepares individuals to manage the IT asset disposal process within an organization. Best practices in IT Asset Disposition (ITAD) are broken down from policy management, data security to chain of custody transitioning. Attendees whose job responsibilities include ITAD will take away the knowledge of how to avoid risk of data loss and public exposure that surround a breakdown in ITAD process management. ITAD best practices, financial return, data security global implications and the importance of vendor management are just a few of the topics incorporated in the CITAD course. This course exposes the attendee to numerous concepts for ITAM that are relevant for both direct application and as a means of discussion for those persons who will implement, manage and direct ITAM initiatives for their organizations. This course includes the exam for CITAD certification. Course Outline Disposition Overview Disposition and ITAM Organizational Goals for Disposition ITAM Goals for Disposition Governance of Electronic Disposal Composition of E-Scrap Waste Management Laws Foundation for Disposal Management Policy Topics Relevant to Disposition Asset Standards Benefit Disposal The Role of Automation Data Security Governance Working with Vendors Selecting Vendors Due Diligence The Removal Process Software During Disposition Decision Factors for Retirement The Disposition Processes Financial Management & Measurement Additional course details: Nexus Humans Certified IT Asset Disposal (CITAD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Disposal (CITAD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced IT Asset Managers Overview By attending this course the attendee will be able to Understand and utilize the dependencies, relationships and benefits of the KPAs found within an effective IT Asset Management Program specify and define the duties and responsibilities necessary to be an effective IT Asset Manager be able to obtain and display an understanding of the resources and commitment necessary to implement a fully functional IT Asset Management Program. Attendees will learn about the entire ITAM Program and take with them the foundation plan for starting or improving their organization?s ITAM Program. The intense three-day course with certification is packed full of information and real-world experiences designed to make your ITAM Program more effective and efficient, and the CITAM Certification will lend notable credibility to both you and your ITAM Program.This course addresses each of the Key Process Areas (KPAs) identified within the IBPL that, when combined, empowers an organization and maximizes the value of their IT assets. The course will also review the core processes that encompass the ITAM Program and the projects that will help an organization build a productive and profitable business unit.The course includes exam for CITAM certification. Course Outline IAITAM and the Mission ITAM Code of Ethics Defining Primary Roles in an ITAM Program IAITAM?s 12 KPAs Relationships, Dependencies, and Benefits KPA Interdependencies Roles and Responsibilities Creating Dynamic Job Descriptions for ITAM Programs The Role of a Program Manager Project Management Relationship Triangle Sample Projects by KPA Prioritization and the ITAM Program Lifecycle Management Process Building Best Practices Gaining Executive Buy-in Business Case Template Maturity Assessment ITAM as a Core Business Function Additional course details: Nexus Humans Certified IT Asset Manager (CITAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Manager (CITAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for anyone with system administrative duties implementing and managing an AIX operating system in a multiuser POWER (System p) partitioned environment. Overview Install and the AIX operating system, filesets, and RedHat Package Manager (RPM) packages Perform system startup and shutdown Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX Manage physical and logical devices Discuss the purpose of the logical volume manager Perform logical volume, paging space and file system management Create and manage user administration Manage AIX user security including enhanced RBAC and implement customized access of file and directories Perform and restore system backups Utilize administrative subsystems, including cron to schedule system tasks Configure TCP/IP networking Define and run basic Workload Partitions (WPAR) Learn to install, customize, and administer the AIX operating system in a POWER (System p) partitioned environment. This course is based on AIX 7.1 running on a Power7 system managed by HMC version 7. Day 1 Introduction to IBM POWER systems, AIX and system administration AIX system management tools System startup and shutdown AIX installation Day 2 AIX software installation and maintenance System configuration and devices System storage overview Working with the Logical Volume Manager Day 3 File systems administration Paging space Backup and restore Day 4 Security and user administration: Part 1 Security and user administration: Part 2 Scheduling and time TCP/IP networking Day 5 TCP/IP networking (continued) Introduction to workload partitions Additional course details: Nexus Humans AN12 IBM Power Systems for AIX II - AIX Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN12 IBM Power Systems for AIX II - AIX Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, and reseller support. Overview After successfully completing this course, you should be able to:Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations. Configure VPN redundancy. Configure dynamic routing using IPsec VPNs. Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE. Configure generic routing encapsulation (GRE) tunnels. This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. Chapter 1: Course IntroductionChapter 2: ScreenOS VPN Basics Review VPN Review Verifying Operations VPN Monitor Lab: VPN Review Chapter 3: VPN Variations Dynamic Peers Transparent Mode Overlapping Addresses Lab: VPN Variations Chapter 4: Hub-and-Spoke VPNs Concepts Policy-Based Hub-and-Spoke VPNs Route-Based Hub-and-Spoke VPNs with No Policy and NHTB Route-Based Hub-and_Spoke VPNS with Policy Centralized Control Hub-and-Spoke VPNs ACVPNs Lab: Hub-and-Spoke VPNs Chapter 5: Routing over VPNs Routing Overview Configuring RIP Configuring OSPF Case Studies Lab: Dynamic Routing Chapter 6: Using Certificates Concepts and Terminology Configuring Certificates and Certificate Support Configuring VPNs with Certificates Lab: Using Certificates Chapter 7: Redundant VPN Gateways (Optional) Redundant VPN Gateways Other Options Demonstration: Redundant VPN Gateways Chapter 8: Generic Routing Encapsulation (Optional) Configuring GRE Chapter 9: Dial-Up IPsec VPNs (Optional) Basic Dial-Up Configuration Group IKE ID XAUTH and Shared IKE ID Additional course details: Nexus Humans Advanced Juniper Networks VPN Implementations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Juniper Networks VPN Implementations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Architects and specialists who are involved in a form of Enterprise Architecture, such as; business, application, data, technology, management and security architecture. Managers in the role of Project-, Operational- and Senior-Manager. Overview The first day of the TOGAF Foundation Level 1 training will focus on the concepts of Enterprise Architecture and its position in order to extensively consider the concepts of TOGAF and the relationship between them. The second day is devoted to going through an architectural process based on a case, in which the concepts discussed the previous day are reviewed again, but this time in context. In this way you obtain a clear and clear picture of TOGAF and the mostly theoretical and abstract material is presented in a digestible way. The TOGAF Foundation level 1 training will focus on the concepts of Enterprise Architecture and its position in order to extensively consider the concepts of TOGAF and the relationship between them. Part 1 Introduction Introduction Enterprise Architecture Position Enterprise Architecture Introduction TOGAF Overview of TOGAF concepts Architecture Capability Framework Architecture Development Method (ADM) Guidelines & Techniques Enterprise Continuity & Tools Reference Models Architecture Content Framework preliminary phase Phase A Architecture Vision' Phase B Business Architecture Phase C Information Systems Architecture Phase D Technology Architecture Phase E: Opportunities & Solutions Phase F: Migration Planning Phase G: Implementation Governance Phase H: Architecture Change Management Architects and specialists who are involved in a form of Enterprise Architecture, such as; business, application, data, technology, management and security architecture. Managers in the role of Project-, Operational- and Senior-Manager. Part 2 TOGAF Concepts Part 3 Going through a TOGAF Cycle Additional course details: Nexus Humans TOGAF training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TOGAF course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced Salesforce Administrators with little or no Flow experience who need to streamline business processes with no-code automated solutions. This class is not recommended for developers. However, if you are a developer interested in learning Flow, we highly recommend Declarative Development for Platform App Builders in Lightning Experience (DEX403). Overview When you complete this course, you will be able to: Create automated no-code solutions with Salesforce Flow. Analyze use cases and effectively translate requirements into design plans that detail accurate Flow building processes. Understand and leverage various Flow types, elements, and resources. Build Screen Flows and manage screen layouts and field visibility. Implement Flows on Home and Record pages. Automate business processes by creating Record-Triggered Flows (based on record create, update, or delete) to perform specific actions. Identify best practices for creating and managing Flows. Streamline business processes and automate manual tasks across your organization by building no-code automation solutions with Flow Builder. In this 3-day class designed for administrators, our experts will introduce you to Screen and Record-Trigger Flows, in addition to various Flow elements and resources. Learn how to effectively create and manage Flows that champion automation best practices, solve for user requirements, and empower you to get more out of Salesforce. Foundations of Flow Create Variables Understand Algorithms Explore Control Structures Examine Flow Best Practices Screen Flows Use Elements and Resources Control Field Visibility Manage Data and Navigation Surface a Flow Complete the Flow Record-Triggered Flows Define Flow Triggers Use Flow Triggers to Replace Formula Fields Share Records with Flow Additional course details: Nexus Humans Salesforce Automate No-Code Solutions Using Flow (ADX301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Automate No-Code Solutions Using Flow (ADX301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Systems Administrators and EngineersTechnical Solutions ArchitectsSystems IntegratorsChannel PartnersValue-Added Resellers Overview Understand the B-Series and C-Series product line similarities and differencesDescribe the C-Series standalone and UCS managed architectures Understand the process for upgrading B-Series and C-Series FirmwareAdministering service profiles, pools, and policiesUnderstanding RBAC with Active Directory integrationAdministering backup and restores in UCS ManagerLearn and discuss the various management tools for Cisco UCSPerform basic troubleshooting of B-Series and C-Series in normal operations Using real-world scenarios and examples, this course will explore all of the components of the UCS B-Series and C-Series solutions from a day to day administrative point of view. UCS Infrastructure Components Cisco UCS Servers and Components Exploring Cisco UCS User Interfaces Cisco UCS Management Framework and Features Administering Cisco C-Series Servers Describing Cisco UCS C-Series Servers Cisco UCS C-Series Integrated Management Controller Provisioning Monitoring and Logging on the Cisco UCS C-Series Server Provisioning Cisco UCS C-Series Server Integration in UCS Manager Updating Cisco UCS C-Series Firmware with the Host Upgrade Utility Troubleshooting C-Series Standalone and UCS Managed Environments Administering Cisco B-Series Servers RBAC, Organizations, and Active Directory Integration Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Templates and Cloning Service Profiles Managing Service Profiles Operating System Installation Options Backing Up and Restoring UCSM Database Upgrading UCS B-Series Firmware Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation UCS Management Tools UCS Management Tool Overview Integrating UCS Manager with UCS Central Managing UCS Using the Cisco UCS PowerTool Additional course details: Nexus Humans Cisco Administering Cisco Data Center Unified Computing System (DCUCA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Cisco Data Center Unified Computing System (DCUCA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for anyone who wants to develop a toolbox of personal stress management skills. Overview Upon successful completion of this course, students will be able to identify the best approach to handle a stressful situation; understand what lifestyle elements, routines and relaxation techniques can help reduce stress. In this course, students will apply a three-option method to address any stressful situation. Module One: Getting Started Workshop Objectives Pre-Assignment Pre-Test Action Plan Form Evaluation Form Module Two: Understanding Stress What is Stress? What is Eustress? Understanding the Triple ?A? Approach Practical Illustration Module Two Review Questions Module Three: Creating a Stress-Reducing Lifestyle Eating Properly Exercising Regularly Sleeping Well Practical Illustration Module Three Review Questions Module Four: Altering the Situation The First A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Four Review Questions Module Five: Avoiding the Situation The Second A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Five Review Questions Module Six: Accepting the Situation The Third A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Six Review Questions Module Seven: Using Routines to Reduce Stress Planning Meals Organizing Chores Using a To-Do List Practical Illustration Module Seven: Review Questions Module Eight: Environmental Relaxation Techniques Finding a Sanctuary Using Music Seeing the Humor Practical Illustration Module Eight: Review Questions Module Nine: Physical Relaxation Techniques Soothing Stretches Deep Breathing Tensing and Relaxing1 Meditation1 Practical Illustration Module Nine: Review Questions Module Ten: Coping with Major Events Establishing a Support System Creating a Plan Knowing When to Seek Help Practical Illustration Module Ten: Review Questions Module Eleven: Our Challenge to You Creating a Stress Log Week One: Recording Events1 Week Two: Identifying Stressors and Creating a Plan1 Week Three: Creating New Habits Reviewing and Evaluating Practical Illustration Module Eleven: Review Questions Module Twelve: Wrapping Up Words from the Wise Lessons Learned
Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.