This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.
One On One Personalised Presentation & Communication Skills Coaching for Senior Executives
This workshop is very practical in its nature and aims to give delegates an opportunity to not only learn about the key aspects of successful bid writing, but to also put them into practice. The workshop helps delegates understand what is most important to buyers and how to successfully convey they proposition to them. 1 Welcome and introductions 2 The mindset of successful bid writing The mindset needed for successful bid writing Thinking from the buyer's perspective and not your own 3 Decision making The way buyers make decisions - rational and emotional Understanding buying motives Looking at how to present ideas against those motives The idea of cognitive fluency How to pitch an idea in a way that leads to a positive decision 4 To bid or not to bid? Writing a bid is a big commitment; a clear understanding of the chances of winning is required Understanding of the implications of winning and the impact it will have on the organisation 5 Understanding your value proposition Framework to help identify unique proposition and how that fits in with the requirements of the bid 6 The tender process Understanding the process to enable a successful chance of winning the bid Different types of tender processes Evaluation of criteria and the impact on bid writing 7 Writing skills Different ways of writing and structuring bids to ensure their messages gets across well in a way that will be looked on favourably by the buyer 8 Summarise 9 Close
Establish a wellbeing-centric culture at your organisation using the latest research and best practices.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers Network Engineers Technical Architects Technical Support Personnel Channel Partners Resellers Overview Upon completing the course, the learner will be able to meet these overall objectives: Describe Cisco SD-Access and how it relates to Cisco DNA Orchestrate a Cisco SD-Access solution using the Cisco DNA Center⢠orchestration platform Use the Network Data Platform to demonstrate the assurance and analytics capabilities of SD-Access The Deploying Cisco SD-Access (ENSDA) v1.0 course is an instructor-led, lab based, hands-on course that teaches students how to successfully deploy the Cisco© Software-Defined Access (SD-Access) solution within their enterprise networks. The course discusses how Cisco SD-Access fits into the Cisco Digital Network Architecture (Cisco DNA?). It covers SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. Module 1: Cisco SD-Access Overview Lesson 1: Exploring Cisco SD-Access Lesson 2: Describing the Cisco SD-Access Architecture Lesson 3: Exploring Cisco DNA Center Lesson 4: Configuring Underlay Automation Module 2: Cisco SD-Access Implementation Lesson 1: ISE Integration in DNA Center Lesson 2: Policy Provisioning Basics Lesson 3: Navigating and Managing the Policy Application Workflows Module 3: Cisco SD-Access Border Operations Lesson 1: Cisco SD-Access Deployment Models Lesson 2: Connecting the Fabric to External Domains Module 4: Wireless Integration Orchestration Lesson 1: Integrating Wireless with the Cisco SD-Access Solution Lesson 2: Workflow of Cisco SD-Access Wireless Lesson 3: Cisco SD-Access Wireless Network Design Lesson 4: Cisco SD-Access Wireless Basic Operation Module 5: Cisco SD-Access Assurance and Migration Lesson 1: Cisco Network Data Platform Lesson 2: Cisco SD-Access Migration Strategies
Create a well-structured pathway to optimized content by understanding how information architecture applies to user experience design.
Duration 2 Days 12 CPD hours This course is intended for This in an introductory-level class for intermediate skilled team members. Students should have prior software development experience or exposure, have some basic familiarity with containers, and should also be able to navigate the command line. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will explore: What a Kubernetes cluster is, and how to deploy and manage them on-premises and in the cloud. How Kubernetes fits into the cloud-native ecosystem, and how it interfaces with other important technologies such as Docker. The major Kubernetes components that let us deploy and manage applications in a modern cloud-native fashion. How to define and manage applications with declarative manifest files that should be version-controlled and treated like code. Containerization has taken the IT world by storm in the last few years. Large software houses, starting from Google and Amazon, are running significant portions of their production load in containers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This is a hands-on workshop style course that teaches core features and functionality of Kubernetes. You will leave this course knowing how to build a Kubernetes cluster, and how to deploy and manage applications on that cluster. Getting Started Our sample application Kubernetes concepts Declarative vs imperative Kubernetes network model First contact with kubectl Setting up Kubernetes Working with Containers Running our first containers on Kubernetes Exposing containers Shipping images with a registry Running our application on Kubernetes Exploring the Kubernetes Dashboard The Kubernetes dashboard Security implications of kubectl apply Scaling a deployment Daemon sets Labels and selectors Rolling updates Next Steps Accessing logs from the CLI Managing stacks with Helm Namespaces Next steps
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F
Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0