Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants
Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting
Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in the following job roles: Network security engineer CCNP Security candidate Channel Partner Overview After taking this course, you should be able to: Introduce site-to-site VPN options available on Cisco router and firewalls Introduce remote access VPN options available on Cisco router and firewalls Review site-to-site and remote access VPN design options Review troubleshooting processes for various VPN options available on Cisco router and firewalls The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. Course Outline Introducing VPN Technology Fundamentals Implementing Site-to-Site VPN Solutions Implementing Cisco Internetwork Operating System (Cisco IOS©) Site-to-Site FlexVPN Solutions Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions Implementing Cisco AnyConnect VPNs Implementing Clientless VPNs Lab Outline Explore IPsec Technologies Implement and Verify Cisco IOS Point-to-Point VPN Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN Implement and Verify Dynamic Multipoint VPN (DMVPN) Troubleshoot DMVPN Implement and Verify FlexVPN with Smart Defaults Implement and Verify Point-to-Point FlexVPN Implement and Verify Hub and Spoke FlexVPN Implement and Verify Spoke-to-Spoke FlexVPN Troubleshoot Cisco IOS FlexVPN Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN Implement and Verify Clientless VPN on ASA
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Network Administrator, Systems Administrator. Overview Upon successful completion of this course, students will be able to Configure and use Transparent Data Encryption, Understand and use Oracle Key Vault, Understand Oracle Data Redaction, Understand and use Oracle Data Masking and Subsetting, Understand security risks and identify appropriate Oracle solutions, Configure general authentication and authorization, Understand and implement Global Users, Set up and maintain a simple wallet, Install and use Oracle Database Vault, and Configure and use Transparent Sensitive Data Protection. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. Additional course details: Nexus Humans Oracle Database Security - Preventive Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Preventive Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators, system architects, and technology consultants In this course, students learn how to manage the SAP Solutions Manager Configuration suite and discover how it can be integrated into their day-to-day operations. Course Outline SAP Solution Manager Overview: available Scenarios, Enhancements, Work Center Technical Overview: Installation, Architecture, Sizing SAP Solution Manager Configuration: SOLMAN_SETUP, SMSY, LMDB, Landscape Verification (LV), System Landscape Directory (SLD), Solution Manager Diagnostics Managing Authorizations in SAP Solution Manager Maintenance Optimizer, Maintenance Certificates, System Recommendations, Issue and Task Management Early Watch Alert Reporting: ABAP & Java, EarlyWatch Alert for Solutions Managing Solutions: Work Mode Management and additional administrative Tasks Monitoring and Alerting Infrastructure (MAI), Solution Monitoring and System Monitoring Service Level Reporting, Technical Reporting, Management Reporting SAP Mobile Apps for SAP Solution Manager Job Management: Job Request Management, Job Documentation, Job Monitoring, Job Scheduling Management Health Checks and more Additional course details: Nexus Humans SM100 SAP Solution Manager Configuration for Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM100 SAP Solution Manager Configuration for Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. Course Outline Setting up a DB2 database Referential integrity Getting data into and out of DB2 Keeping your DB2 data in good shape Application data recovery basics Program preparation and Bind Security Serialization Additional course details: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 1 Days 6 CPD hours Articulate Rise 360 is a elearning authoring tool that lets you create beautiful, fully-responsive interactive courses fast. All you need to use Rise is an internet connection and a web browser to get started. This one day workshop covers the full creation of a Rise project from beginning to end and demonstrates how you can customize the look of your course with different themes, create lessons, add blocks and integrate flashcards and quizzes. Getting Started with Rise Logging into Articulate Touring the Rise Interface Previewing a Rise Course Creating a New Rise Course Creating a Lesson Creating a Video Lesson Creating a Labeled Graphic Lesson Creating a Process Lesson Creating a Sorting Activity Lesson Creating a URL Embed Lesson Creating a Quiz lesson Customizing Lessons Understanding Blocks Image and Gallery Blocks Multimedia Blocks Interactive Blocks Divider Blocks Course Settings Customizing Theme Settings Customizing Label Settings Customizing Navigation Settings Sharing and Exporting Your Project Sharing a Rise Course Exporting a Rise Course Additional course details: Nexus Humans Articulate Rise 360 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Articulate Rise 360 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for operators and schedulers who perform duties that are related to batch workload automation. Overview In this course, you learn how to perform the following tasks:Explain the production terminology used with IBM Workload Scheduler and its production planning processMonitor production batch workload processesManage production batch workloadCreate and modify scheduling objectsSchedule new workloadsForecast future workloadsMigrate workload definitions from test to production environmentsCreate and maintain reports about production workloads This course provides professional report authors an opportunity to learn report building techniques using relational data models. Demonstrations and exercises will illustrate and reinforce key concepts during this learning opportunity. IBM Workload Scheduler Introduction About Workload Automation IBM workload automation offerings IBM Workload Scheduler terminology Workload Scheduler user interfaces Getting started with Application Lab Getting started with the Dynamic Workload Console Connecting the console to Workload Scheduler Getting started with the command-line interfaces Using the Application Lab Interface Using the processes status overview page Managing processes Using other Application Lab functions Monitoring Workload Scheduler Production Monitoring Workload Scheduler production by using queries Using the Workload Dashboard Monitoring system status and health Monitoring plan objects Using the What-if Analysis interface Monitoring the plan graphically Managing Workload Scheduler Production Managing the scheduling environment Managing scheduling objects in the plan Creating Scheduling Objects Using the Workload Designer Creating scheduling objects Creating variables and variable tables Creating prompts and resources Creating calendars Defining jobs Scheduling, Forecasting, and Migrating Workloads Creating job streams Applying jobs to job streams Setting time and date restrictions Using advanced scheduling options Creating job stream definitions by using composer Creating and using event rules Forecasting and previewing future dates Exporting and importing scheduling definitions Using Workload Application Templates Reporting with Workload Scheduler Using reporting features Using Common Reporting with Workload Scheduler Using the batch reporting utility Using the preformatted text-based report utilities
Duration 4 Days 24 CPD hours Overview Topics Include:Installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster.Choosing and implementing cluster networking.Various methods of application lifecycle management, including scaling, updates and roll-backs.Configuring security both for the cluster as well as containers.Managing storage available to containers.Learn monitoring, logging and troubleshooting of containers and the cluster.Configure scheduling and affinity of container deployments.Use Helm and Charts to automate application deployment.Understand Federation for fault-tolerance and higher availability. In this vendor agnostic course, you'll learn the installation, configuration and administration of a production-grade Kubernetes cluster. Introduction Linux Foundation Linux Foundation Training Linux Foundation Certifications Laboratory Exercises, Solutions and Resources Distribution Details Labs Basics of Kubernetes Define Kubernetes Cluster Structure Adoption Project Governance and CNCF Labs Installation and Configuration Getting Started With Kubernetes Minikube kubeadm More Installation Tools Labs Kubernetes Architecture Kubernetes Architecture Networking Other Cluster Systems Labs APIs and Access API Access Annotations Working with A Simple Pod kubectl and API Swagger and OpenAPI Labs API Objects API Objects The v1 Group API Resources RBAC APIs Labs Managing State With Deployments Deployment Overview Managing Deployment States Deployments and Replica Sets DaemonSets Labels Labs Services Overview Accessing Services DNS Labs Volumes and Data Volumes Overview Volumes Persistent Volumes Passing Data To Pods ConfigMaps Labs Ingress Overview Ingress Controller Ingress Rules Labs Scheduling Overview Scheduler Settings Policies Affinity Rules Taints and Tolerations Labs Logging and Troubleshooting Overview Troubleshooting Flow Basic Start Sequence Monitoring Logging Troubleshooting Resources Labs Custom Resource Definition Overview Custom Resource Definitions Aggregated APIs Labs Kubernetes Federation Overview Federated Resources Labs Helm Overview Helm Using Helm Labs Security Overview Accessing the API Authentication and Authorization Admission Controller Pod Policies Network Policies Labs