• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5318 Courses in Cardiff delivered Live Online

Oracle Database 12c - Performance Management and Tuning

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase Administrators Overview Use the Oracle Database tuning methodology appropriate to the available toolsUtilize database advisors to proactively tune an Oracle Database InstanceUse the tools based on the Automatic Workload Repository to tune the databaseDiagnose and tune common SQL related performance problemsDiagnose and tune common Instance related performance problemsUse Enterprise Manager performance-related pages to monitor an Oracle DatabaseGain an understanding of the Oracle Database Cloud Service In the Oracle Database 12c: Performance Management and Tuning course, learn about the performance analysis and tuning tasks expected of a DBA: proactive management through built-in performance analysis features and tools, diagnosis and tuning of the Oracle Database instance components, and diagnosis and tuning of SQL-related performance issues. In this course, you will be introduced to Oracle Database Cloud Service. Introduction Course Objectives Course Organization Course Agenda Topics Not Included in the Course Who Tunes? What Does the DBA Tune? How to Tune Tuning Methodology Basic Tuning Diagnostics Performance Tuning Diagnostics Performance Tuning Tools Tuning Objectives Top Timed Events DB Time CPU and Wait Time Tuning Dimensions Time Model Dynamic Performance Views Using Automatic Workload Repository Automatic Workload Repository Overview Automatic Workload Repository Data Enterprise Manager Cloud Control and AWR Snapshots Reports Compare Periods Defining the Scope of Performance Issues Defining the Problem Limiting the Scope Setting the Priority Top SQL Reports Common Tuning Problems Tuning During the Life Cycle ADDM Tuning Session Performance Versus Business Requirements Using Metrics and Alerts Metrics and Alerts Overview Limitation of Base Statistics Benefits of Metrics Viewing Metric History Information Viewing Histograms Server-Generated Alerts Setting Thresholds Metrics and Alerts Views Using Baselines Comparative Performance Analysis with AWR Baselines Automatic Workload Repository Baselines Moving Window Baseline Baselines in Performance Page Settings Baseline Templates AWR Baseslines Creating AWR Baselines Managing Baselines with PL/SQL Using AWR-Based Tools Automatic Maintenance Tasks ADDM Performance Monitoring Using Compare Periods ADDM Active Session History New or Enhanced Automatic Workload Repository Views Emergency Monitoring Real-time ADDM Real-Time Database Operation Monitoring Overview Use Cases Defining a Database Operation Scope of a Composite Database Operation Database Operation Concepts Identifying a Database Operation Enabling Monitoring of Database Operations Identifying, Starting, and Completing a Database Operation Monitoring Applications What is a Service? Service Attributes Service Types Creating Services Managing Services in a Single-Instance Environment Where are Services Used? Using Services with Client Applications Services and Pluggable Databases Identifying Problem SQL Statements SQL Statement Processing Phases Role of the Oracle Optimizer Identifying Bad SQL Top SQL Reports SQL Monitoring What is an Execution Plan? Methods for Viewing Execution Plans Uses of Execution Plans Influencing the Optimizer Functions of the Query Optimizer Selectivity Cardinality and Cost Changing Optimizer Behavior Optimizer Statistics Extended Statistics Controlling the Behavior of the Optimizer with Parameters Enabling Query Optimizer Features Reducing the Cost of SQL Operations Reducing the Cost Index Maintenance SQL Access Advisor Table Maintenance for Performance Table Reorganization Methods Space Management Extent Management Data Storage Using SQL Performance Analyzer Real Application Testing: Overview Real Application Testing: Use Cases SQL Performance Analyzer: Process Capturing the SQL Workload Creating a SQL Performance Analyzer Task SQL Performance Analyzer: Tasks Parameter Change SQL Performance Analyzer Task Page SQL Performance Management Maintaining SQL Performance Maintaining Optimizer Statistics Automated Maintenance Tasks Statistic Gathering Options Setting Statistic Preferences Restore Statistics Deferred Statistics Publishing Automatic SQL Tuning Using Database Replay Using Database Replay The Big Picture System Architecture Capture Considerations Replay Considerations: Preparation Replay Considerations Replay Options Replay Analysis Tuning the Shared Pool Shared Pool Architecture Shared Pool Operation The Library Cache Latch and Mutex Diagnostic Tools for Tuning the Shared Pool Avoiding Hard Parses Reducing the Cost of Soft Parses Sizing the Shared Pool Tuning the Buffer Cache Oracle Database Architecture: Buffer Cache Buffer Cache: Highlights Database Buffers Buffer Hash Table for Lookups Working Sets Buffer Cache Tuning Goals and Techniques Buffer Cache Performance Symptoms Buffer Cache Performance Solutions Tuning PGA and Temporary Space SQL Memory Usage Performance Impact Automatic PGA Memory SQL Memory Manager Configuring Automatic PGA Memory Setting PGA_AGGREGATE_TARGET Initially Limiting the size of the Program Global Area (PGA) SQL Memory Usage Automatic Memory Oracle Database Architecture Dynamic SGA Granule Memory Advisories Manually Adding Granules to Components Increasing the Size of an SGA Component Automatic Shared Memory Management: Overview SGA Sizing Parameters: Overview Performance Tuning Summary with Waits Commonly Observed Wait Events Additional Statistics Top 10 Mistakes Found in Customer Systems Symptoms Oracle Database Cloud Service: Overview Database as a Service Architecture, Features and Tooling Software Editions: Included Database Options and Management Packs Accessing the Oracle Database Cloud Service Console Automated Database Provisioning Managing the Compute Node Associated With a Database Deployment Managing Network Access to Database as a Service Scaling a Database Deployment Performance Management in the Database Cloud Environment Performance Monitoring and Tuning What Can be Tuned in a DBCS Environment?

Oracle Database 12c - Performance Management and Tuning
Delivered OnlineFlexible Dates
Price on Enquiry

BA20 - Business Process Improvement

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified

BA20 - Business Process Improvement
Delivered OnlineFlexible Dates
Price on Enquiry

IS20SECURITYCON - IS20 Security Controls Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20

IS20SECURITYCON - IS20 Security Controls Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

GRC100 Principles of SAP Governance, Risk, and Compliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration

GRC100 Principles of SAP Governance, Risk, and Compliance
Delivered OnlineFlexible Dates
Price on Enquiry

Excel for business professionals

By Nexus Human

Duration 2.25 Days 13.5 CPD hours This course is intended for The job roles best suited to the material in this course are: sales personnel, accountants, administrators, auditors, lab assistants, office job positions. Overview Work with functions. Work with lists. Analyze data. Visualize data with charts. Use PivotTables and PivotCharts. Work with multiple worksheets and workbooks. Share and protect workbooks. Automate workbook functionality. Use Lookup functions and formula auditing. Forecast data. Create sparklines and map data This course provides the knowledge to create advanced workbooks and worksheets that can deepen the understanding of organizational intelligence. The ability to analyze massive amounts of data, extract actionable information from it and present that information to decision makers. In addition this course will give you the ability to collaborate with colleagues, automate complex or repetitive tasks and use conditional logic to construct and apply elaborate formulas and functions which will allow you to work through a lot of data and generate the answers that your organisation needs. WORKING WITH FUNCTIONS Topic A: Work with Ranges Topic B: Use Specialized Functions Topic C: Work with Logical Functions Topic D: Work with Date and Time Functions Topic E: Work with Text Functions WORKING WITH LISTS Topic A: Sort Data Topic B: Filter Data Topic C: Query Data with Database Functions Topic D: Outline and Subtotal Data ANALYZING DATA Topic A: Create and Modify Tables Topic B: Apply Intermediate Conditional Formatting Topic C: Apply Advanced Conditional Formatting VISUALIZING DATA WITH CHARTS Topic A: Create Charts Topic B: Modify and Format Charts Topic C: Use Advanced Chart Features USING PIVOTTABLES AND PIVOTCHARTS Topic A: Create a PivotTable Topic B: Analyze PivotTable Data Topic C: Present Data with PivotCharts Topic D: Filter Data by Using Timelines and Slicers WORKING WITH MULTIPLE WORKSHEETS AND WORKBOOKS Topic A: Use Links and External References Topic B: Use 3-D References Topic C: Consolidate Data SHARING AND PROTECTING WORKBOOKS Topic A: Collaborate on a Workbook Topic B: Protect Worksheets and Workbooks AUTOMATING WORKBOOK FUNCTIONALITY Topic A: Apply Data Validation Topic B: Search for Invalid Data and Formulas with Errors Topic C: Work with Macros USING LOOKUP FUNCTIONS AND FORMULAS AUDITING Topic A: Use Lookup Functions Topic B: Trace Cells Topic C: Watch and Evaluate Formulas FORECASTING DATA Topic A: Determine Potential Outcomes Using Data Tables Topic B: Determine Potential Outcomes Using Scenarios Topic C: Use the Goal Seek Feature Topic D: Forecast Data Trends CREATING SPARKLINES AND MAPPING DATA Topic A: Create Sparklines Topic B: Map Data

Excel for business professionals
Delivered OnlineFlexible Dates
Price on Enquiry

MS-203T00 Microsoft 365 Messaging

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Messaging Administrator deploys, configures, manages, and troubleshoots recipients, permissions, mail protection, mail flow, and public folders in both on-premises and cloud enterprise environments. Responsibilities include managing message hygiene, messaging infrastructure, and hybrid configuration and migration. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with the Security Administrator and Microsoft 365 Enterprise Administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications. Overview After completing this course, students will be able to: Configure and manage the transport pipeline Manage and troubleshoot mail flow and transport issues Manage message hygiene and compliance Manage authentication for messaging Configure organizational settings and sharing Manage mobile devices Manage role-based permissions Create and manage recipient objects and resources Plan, implement, and troubleshoot public folders Plan a hybrid environment Perform mailbox migrations Deploy and troubleshoot a hybrid environment This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization. Managing the Transport Pipeline Overview of Transport Services Configuring Message Transport Managing Transport Rules Managing and Troubleshooting Mail Flow Managing Mail Flow Troubleshooting Mail Flow Troubleshooting Transport Issues Troubleshooting with Logs Managing Message Hygiene Planning for Message Hygiene Managing Anti-Malware and Anti-Spam Policies Managing Advanced Threat Protection Managing Compliance Messaging Compliance in the SCC Messaging Compliance in Exchange Managing Exchange Online Archiving and Auditing Managing Content Search Managing Organizational Settings Managing Authentication for Messaging Configuring Organizational Settings Configuring Organizational Sharing Managing Mobile Devices Mobile Device Mailbox Policies Managing Mobile Device Access Managing Role-Based Permissions Managing Admin Roles Managing User Roles Exchange Setup - RBAC and AD Split Permission Managing Recipient Objects and Resources Exchange Recipients Creating and Managing Exchange Recipients Managing Email Addresses, Lists, and Resources Managing Public Folders Planning the Public Folder Hierarchy Implementing and Managing Public Folders Troubleshooting Public Folders Planning a Hybrid Environment Exchange Hybrid Deployment Requirements Planning to Run the Hybrid Configuration Wizard Performing Mailbox Migrations Planning Mailbox Migrations Performing IMAP Migrations Performing Cutover and Staged Migrations Performing Advanced Migrations Deploying and Troubleshooting a Hybrid Environment Deploying and Managing an Edge Transport Server Configuring a Hybrid Deployment using the HCW Implementing Advanced Hybrid Functionality Troubleshooting Hybrid Deployments

MS-203T00 Microsoft 365 Messaging
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Intune Overview

By Nexus Human

Duration 3.25 Days 19.5 CPD hours This course is intended for This course is intended for IT administrators with a minimum 2-5 years of experiencing working with Microsoft Windows Server, Windows 10, and Office 365 licensing. The course will utilize a pre-provisioned lab environment which includes Microsoft 365 E5 licenses and Enterprise Mobility and Security E5 licenses for each student. Powershell management topics will be discussed where applicable in the respective topics. This course will address Windows devices only enrolled in Intune. Configuring and Licensing Intune Endpoint Manager - quick discussion, portal access Discuss which licenses include Intune Discuss Microsoft Intune device-only subscription Discuss Azure Active Directory basic, P1, P2 licensing Intune setup and overview of capabilities Supported configurations Logging in and using Intune Admin portal via Azure Portal and via Endpoint manager site Configure a domain name (needed to support labs though may be done already for E1B/district) Add users and groups in Azure Portal Configure Azure AD connect and discuss AAD Connect Health Assigning licenses manually, via Powershell, and via AAD groups Set the MDM authority and enable device enrollment Add Apps to Intune - covered in detail in a later topic Configuring device profiles - covered in detail in a later topic Company Portal discussion - covered in detail in a later topic Configure app policies - covered in detail in a later topic Windows device management What is co-management - brief discussion on Endpoint Manager with Configuration Manager Registering, joining, hybrid join to Azure AD Enrollment method capabilities Azure AD joined Azure AD joined with Autopilot (User driven mode) Azure AD joined with Autopilot (Self deploying mode) Autopilot pre-provisioned deployment (formally known as white-glove) Device group tags for profile deployment Troubleshooting Autopilot Policy conflicts Known issues Using Powershell to connect to and manage Intune Software deployment Add apps to Intune Windows Store apps Microsoft Store for Business apps LOB apps - Sideloading Adding Win32 apps Running Powershell Scripts on devices Assigning Apps Monitor Apps Discovered Apps Configure Apps App Configuration Policies Office app policys Custom OMA-URI Policies Troubleshooting Managing devices Windows 10 Feature Updates Update rings to manage updates Mapping drives to SMB shares Discuss OneDrive for Business Manage Enterprise Wireless - Windows Configuration Designer, provisioning packages Implementing Conditional Access - device based, app based Printer management Universal Print Deploying printer settings Remote administration Intune Device Management Inventory Fresh Start Full Scan Remote Lock Restart Sync devices Bulk device actions Teamviewer integration requirements Intune Reporting Accessing Reports Exporting Reports using Graph

Microsoft Intune Overview
Delivered OnlineFlexible Dates
Price on Enquiry

Developing iOS Mobile Apps for Business

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for a programmer or web developer who is new to mobile app development in iOS. The student has experience using a computer running Mac OS X and developing applications or websites using object-oriented programming languages and tools, but may not have experience using the languages and tools specific to the iOS development environment. Overview In this course, you will develop, test, and package applications for devices that run the iOS operating system, including iPad and iPhone. You will: •Use Xcode to create and run an iOS application. •Write Objective-C code to enable iOS app user interface elements to interact with users. •Identify and describe common iOS design patterns and user interface standards. •Lay out and program apps to provide navigation among multiple views. •Access data from various locations, including app resources, user preferences, private app storage, and web services. •Enable an app to present graphics and multimedia. •Enable an app to interact well with other apps, the iOS system, and the mobile device it runs on. •Debug an app and implement runtime error handling. •Prepare an app for release, including configuration to support internationalization, and to run on multiple devices and different screen dimensions. This Logical Operations courseware is no longer available on the LO Store, but can be purchased by phone orderIn this course, students will learn how to develop and publish iOS apps, focusing on developing business apps for iPhones and iPads. Using Xcode to Develop an iOS App Set Up and Configure Xcode Create an App Project Create a User Interface Run an App in Simulator Programming in the iOS Development Environment Write Code to Handle User Interaction Organize and Maintain Code Use Predefined Classes Identifying Design Requirements for iOS Apps Design an App to Meet User Expectations iOS Design Patterns and Templates Implementing Multiple View Navigation Create an iOS App with Multiple Views Add a Custom View Controller Class Show Temporary Views Working with Data Select an Appropriate Data Storage Approach Load App Data from Property Lists Access Web Data and Services Store and Retrieve Preferences Working with Graphics and Media Load Graphic Images Draw Graphics Through Code Add Animation Effects Integrating with the App Ecosystem Manage App State Changes Map a Location Support Multiple Devices and Orientations Making Code More Robust and Maintainable Debug an App in Xcode Write Code to Handle Runtime Errors Finalizing an App Enable an App to Support Multiple Languages Prepare an App for Release

Developing iOS Mobile Apps for Business
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication™ functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups. Build, edit, execute, test, and remove a recovery plan Perform a planned migration This two-day, hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Introductions and course logistics Course objectives Site Recovery Manager Architecture Describe Site Recovery Manager architecture Identify disaster recovery options with Site Recovery Manager Evaluate how Site Recovery Manager integrates with VMware products Describe Site Recovery Manager licensing options List the disaster recovery topologies supported by Site Recovery Manager Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager Deploying and Configuring Site Recovery Manager Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager Define Site Recovery Manager virtual appliance system requirements Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Configuring Inventory Mappings Explain the importance of inventory mappings Identify configuration options for inventory mappings Describe the importance of placeholder virtual machines and datastores Describe the importance of the vSphere inventory changes for Site Recovery Manager operation Using Array-Based Replication Describe array-based replication Describe Storage Replication Adapters and explain their role for the array-based replication Describe the concept and configuration of array pairs Describe datastore groups and the relationship between devices and datastore groups Describe the role of consistency groups Identify the advantages of array-based replication vSphere Replication Describe Site Recovery Manager with vSphere Replication Architecture Discuss the role of vSphere Replication components Discuss use cases for vSphere Replication Discuss system requirements and operational limits of vSphere Replication Determine how to calculate bandwidth requirements for vSphere Replication Identify the advantages of vSphere Replication Deploy a vSphere Replication appliance Configure a vSphere Replication appliance and register it with vCenter Server Pair vSphere Replication appliances Deploy an additional vSphere Replication server Register a vSphere Replication server with a vSphere Replication management server Replicating VMs Using vSphere Replication Describe the replication process used by vSphere Replication List vSphere Replication replica states Describe vSphere Replication of encrypted virtual machines Describe vSphere native key provider Describe how to configure vSphere Replication Discuss vSphere Replication RPO settings Describe MPIT instances Describe additional vSphere Replication settings Describe how to disable vSphere Replication Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups Create a protection group View a placeholder virtual machine in the inventory Configure protection for virtual machines and edit protection groups Recovery Plans Discuss recovery plan concepts Discuss network planning Discuss the organization of storage for recovery plans Describe customization options in recovery planning Describe priority groups and VM dependencies Describe how to implement a recovery plan Configure VM recovery plan properties Describe the customization of recovery plans Configure additional steps in the recovery plan Delete a recovery plan Executing Recovery Plans Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Examine Site Recovery Manager integration with various vSphere technologies Describe how to conduct a recovery plan test Perform a recovery plan test Identify the effect on the storage layer during the test recovery steps Review the recovery plan test steps Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation Explain a recovery plan execution in planned migration or disaster recovery mode Identify the recovery steps for each execution type Describe a forced recovery Explain the importance of reprotection processes and states Examine failback steps Describe how to reprotect a data center Monitoring and Troubleshooting Identify Site Recovery Manager alarm options Generate Site Recovery Manager recovery plan history reports Configure Site Recovery Manager advanced settings Identify Site Recovery Manager logs Describe the vRealize Operations management pack for Site Recovery Manager

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry