Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators or operators responsible for the installation, setup, configuration, and administration of the BIG-IQ system or management of BIG-IP devices and F5 products running on those devices. This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ© product. Students are introduced to BIG-IQ, its interface, and its various functionality. We first look at administering and operating the BIG-IQ system itself, then detail how it is used to remotely manage BIG-IP devices running BIG-IP Local Traffic Manager (LTM). We then look configuring a BIG-IQ Data Collection Device (DCD) system and see how it is used for the remote storage and examination of BIG-IP log events and statistics. Module 1: BIG-IQ Overview BIG-IQ Centralized Management BIG-IQ Components BIG-IQ Core Functionality REST API BIG-IQ Data Collection Device (DCD) BIG-IP Cloud Edition (CE) Setting up the BIG-IQ System Module 2: Administering the BIG-IQ System Controlling Access to the BIG-IQ Creating, Authenticating, Configuring Users Backups Local Host Settings Configuring DNS, NTP, and SMTP Monitoring BIG-IQ, DCD, and BIG-IP Events with Alerts Monitoring BIG-IQ with iHealth Post Installation Issues; Licensing, Changing Management IP, Master Key, Restoring Backups Module 3: Managing BIG-IP LTM Devices BIG-IP LTM Device Discovery BIG-IP Device Backup Deploying to BIG-IP Devices Deployment and Deployment Logs Configuration Snapshots Managing BIG-IP Certificates Managing BIG-IP Licenses Monitoring BIG-IP Devices with iHealth Management of QKView Reports from Managed BIG-IP Devices Module 4: Setting Up the BIG-IQ Data Collection Device Custom Roles Types and Groups Setting up User Accounts with custom roles and privileges Managing BIG-IP DSC Discovery and management of BIG-IP Device Clusters (DSC) with BIG-IQ Administering BIG-IQ High Availability Configuration and management of BIG-IQ systems in a High Availability pair
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions architects and cloud architects seeking their AWS Certified Solutions Architect - Associate certification Customers and APN Partners who have 6 to 12 months of experience with AWS including a strong architecture background and experience Individuals who prefer an instructor led course for training and exam readiness Individuals who have not taken the Architecting on AWS course in the last ~6 months Overview In this course, you will learn to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly available Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well-Architected Framework to improve architectures with AWS solutions Navigate the logistics of the examination process, exam structure, and question types Identify how questions relate to AWS architectural concepts Interpret the concepts being tested by an exam question This five-day, instructor-led course helps busy architects get away from the day-to-day to get focused and ready for their AWS Certified Solutions Architect ? Associate exam. Attendees learn the fundamentals of building IT infrastructure on AWS, so they can build scalable and resilient solutions in the cloud, by spending the first 3 days on the Architecting on AWS course. They?ll start getting in the exam readiness mindset with bonus end of module quizzes. Next, they?ll learn strategies to answer exam questions and avoid common mistakes with the Exam Readiness: AWS Certified Solutions Architect ? Associate half-day course. The course broadens attendees? knowledge of AWS services with deep dives into Amazon Redshift, Amazon Kinesis, and AWS Key Management Service, and then concludes with two quizzes and an instructor guided review of the AWS Certified Solutions Architect ? Associate practice exam. Architecting on AWS Module 1: Introduction Module 2: The Simplest Architectures Hands-On Lab 1: Hosting a Static Website Module 3: Adding a Compute Layer Module 4: Adding a Database Layer Hands-On Lab 2: Deploying a Web Application on AWS Module 5: Networking in AWS Part 1 Hands-On Lab 3: Creating a Virtual Private Cloud Architecting on AWS (continued) Module 6: Networking in AWS Part 2 Module 7: AWS Identity and Access Management (IAM) Module 8: Elasticity, High Availability, and Monitoring Hands-On Lab 4: Creating a Highly Available Environment Module 9: Automation Hands-On Lab 5: Automating Infrastructure Deployment with AWS CloudFormation Module 10: Caching Architecting on AWS (continued) Module 11: Building Decoupled Architectures Module 12: Microservices and Serverless Architectures Hands-On Lab 6: Implementing a Serverless Architecture with AWS Managed Services Module 13: RTP/RPO and Backup Recovery Setup Module 14: Optimizations and Review Exam Readiness: AWS Certified Solutions Architect -- Associate Module 0: The Exam Module 1: Design Resilient Architectures Module 2: Design Performant Architectures Module 3: Specify Secure Applications and Architectures Module 4: Design Cost-Optimized Architectures Module 5: Define Operationally Excellent Architectures Exam Readiness Additional deep dive of AWS services Quiz #1 Practice exam: AWS Certified Solutions Architect ? Associate Quiz #2 Wrap-up
Duration 5 Days 30 CPD hours This course is intended for This basic course is for IT personnel with a theoretical background of z/OS. Overview Review the main concepts of z/OS Log on to TSO and start ISPF/PDF Navigate through ISPF/PDF dialogs and use the basic ISPF/PDF functions and the ISPF Editor Use ISPF/PDF to allocate data sets and edit data sets (including hierarchical file system (HFS) files) via the ISPF Editor primary and line commands Use ISPF to create and manipulate (copy, rename, delete, list, sort and merge) data sets Identify security considerations for Multiple Virtual Storage (MVS) data sets and HFS files Describe and use TSO/E commands Perform simple modifications to existing ISPF/PDF panels Invoke a REXX exec and TSO CLIST Tailor existing JCL and submit batch jobs Review job status and job output using SDSF Invoke UNIX processes Manipulate HFS directories and file systems using the UNIX System Services ISHELL This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. Review of the z/Architecture and z/OS An Introduction to ISPF, ISPF/PDF, and RACF System familiarization Working with ISPF/PDF (Part 1 & 2) Allocate new data sets ISPF editor primary commands ISPF editor line command Copy/move/rename/delete data sets and members Data set lists Working with TSO/E Using TSO/E commands Working with JCL Submit a job JCL exercises Working with UNIX System Services Procedures ISHELL and hierarchical file system Additional course details: Nexus Humans ES10 IBM Fundamental System Skills in z/OS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES10 IBM Fundamental System Skills in z/OS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours
Duration 1 Days 6 CPD hours This course is intended for Professionals in a variety of fields who are seeking improved time-management skills, so that they can meet their long-term goals and perform more effectively will benefit from this course. Overview State your goals. Analyze how you are currently allocating your most precious resources: energy and time. Identify elements of your personal work style that contribute to your effective use of time. Assemble a collection of time-management tools and strategies that you can use to take control of your time. Create an action plan for your time-management process and identify ways to evaluate and improve your efforts. Time is a form of currency, and the ways you talk about it illustrate its value: people say ?Time is money,? and ?My time was well spent,? or ?It's a waste of time.? Like most professionals, you've probably struggled with managing time effectively. In this course, you will acquire day-to-day time-management tools that will help you more effectively use your time so you can direct your energy towards fulfilling your short- and long-term professional and personal goals. Your time is a precious and limited resource. Too often, you may feel frustrated that there aren't enough hours in the day to accomplish everything you hope to do. Effective time managers enjoy the satisfaction of directing their talents and energy towards productive, goal-centered activities. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success, we recommend you have some level of work experience in any of a variety of organizational settings, and general end-user computer and Internet skills. 1. Defining Goals Define Time Management Describe Your Dreams Identify Regrets State Goals 2. Analyzing Energy Allocation Create a Time Long Analyze Tasks Analyze Time Usage Analyze Energy Flow 3. Identifying Personal Style Review a Successful Day or Project Analyze Your Preferences Identify Personal Strengths Identify Personal Motivators Reduce Time Wasters 4. Assembling the Toolbox Negotiate for Success Delegate Tasks Choose Tools that Work for You 5. Creating a Time-Management Action Plan Create the Action Plan Evaluate the Time-Management Process Additional course details: Nexus Humans Effective Time Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Time Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized. The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies. Overview Understand Data Platform Modernization Choose the right tools for Data Migration Migrate SQL Workloads to Azure Virtual Machines Migrate SQL Workloads to Azure SQL Databases Migrate SQL Workloads to Azure SQL Database Managed Instance In this course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. Students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications, so that they can make best use of modern data platforms in Azure. Introducing Data Platform Modernization Understand Data Platform Modernization Understanding the stages of migration Data Migration Paths Choose the right tools for Data Migration Discover the Database Migration Guide Build your data estate inventory using Map Toolkit Identify Migration candidates using Data Migration Assistant Evaluate a Data workload using Database Experimentation Assistant Data Migration using Azure Database Migration Service Migrate non-SQL Server workloads to Azure using SQL Migration Assistant Migrating SQL Workloads to Azure Virtual Machines Considerations of SQL Server to Azure VM Migrations SQL Workloads to Azure VM Migration Options Implementing High Availability and Disaster Recovery Scenarios Migrate SQL Workloads to Azure SQL Databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL DB offline Migrate SQL Server to Azure SQL DB online Load and Move data to Azure SQL Database Migrate SQL Workloads to Azure SQL Database Managed Instance Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed instance Load and Move data to SQL Database Managed instance Application Configuration and Optimization
Duration 5 Days 30 CPD hours This course is intended for Motivations: Quickly learn the foundations of containerization and orchestration with Docker Swarm, and become familiar with all the features of Docker Enterprise. Roles: System Operators & Administrators Overview This course combines all topics of CN100 , CN110 , CN210 In this intense cloud native bootcamp, you?ll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible. In this intense cloud native bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible.
Duration 0.5 Days 3 CPD hours This course is intended for Individuals and organizations seeking a foundational understanding of DevOps Overview Please refer to Overview This course brings a high-level understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. Course introductionWhat is DevOps? Why Now?Emerging DevOps PracticesCultureAutomationLeanMeasurement and MetricsSharingGetting Started: Implementing DevOpsNext Steps
Duration 4 Days 24 CPD hours This course is intended for This course is best suited to developers, engineers, and architects who want to use use Hadoop and related tools to solve real-world problems. Overview Skills learned in this course include:Creating a data set with Kite SDKDeveloping custom Flume components for data ingestionManaging a multi-stage workflow with OozieAnalyzing data with CrunchWriting user-defined functions for Hive and ImpalaWriting user-defined functions for Hive and ImpalaIndexing data with Cloudera Search Cloudera University?s four-day course for designing and building Big Data applications prepares you to analyze and solve real-world problems using Apache Hadoop and associated tools in the enterprise data hub (EDH). IntroductionApplication Architecture Scenario Explanation Understanding the Development Environment Identifying and Collecting Input Data Selecting Tools for Data Processing and Analysis Presenting Results to the Use Defining & Using Datasets Metadata Management What is Apache Avro? Avro Schemas Avro Schema Evolution Selecting a File Format Performance Considerations Using the Kite SDK Data Module What is the Kite SDK? Fundamental Data Module Concepts Creating New Data Sets Using the Kite SDK Loading, Accessing, and Deleting a Data Set Importing Relational Data with Apache Sqoop What is Apache Sqoop? Basic Imports Limiting Results Improving Sqoop?s Performance Sqoop 2 Capturing Data with Apache Flume What is Apache Flume? Basic Flume Architecture Flume Sources Flume Sinks Flume Configuration Logging Application Events to Hadoop Developing Custom Flume Components Flume Data Flow and Common Extension Points Custom Flume Sources Developing a Flume Pollable Source Developing a Flume Event-Driven Source Custom Flume Interceptors Developing a Header-Modifying Flume Interceptor Developing a Filtering Flume Interceptor Writing Avro Objects with a Custom Flume Interceptor Managing Workflows with Apache Oozie The Need for Workflow Management What is Apache Oozie? Defining an Oozie Workflow Validation, Packaging, and Deployment Running and Tracking Workflows Using the CLI Hue UI for Oozie Processing Data Pipelines with Apache Crunch What is Apache Crunch? Understanding the Crunch Pipeline Comparing Crunch to Java MapReduce Working with Crunch Projects Reading and Writing Data in Crunch Data Collection API Functions Utility Classes in the Crunch API Working with Tables in Apache Hive What is Apache Hive? Accessing Hive Basic Query Syntax Creating and Populating Hive Tables How Hive Reads Data Using the RegexSerDe in Hive Developing User-Defined Functions What are User-Defined Functions? Implementing a User-Defined Function Deploying Custom Libraries in Hive Registering a User-Defined Function in Hive Executing Interactive Queries with Impala What is Impala? Comparing Hive to Impala Running Queries in Impala Support for User-Defined Functions Data and Metadata Management Understanding Cloudera Search What is Cloudera Search? Search Architecture Supported Document Formats Indexing Data with Cloudera Search Collection and Schema Management Morphlines Indexing Data in Batch Mode Indexing Data in Near Real Time Presenting Results to Users Solr Query Syntax Building a Search UI with Hue Accessing Impala through JDBC Powering a Custom Web Application with Impala and Search