• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7010 Courses near Leeds delivered Live Online

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No-Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructs such as virtual services, pools, health monitors, and related components Explain and configure advanced virtual services and related concepts such as Subject Name Indication, Enhanced Virtual Hosting, and authentication of virtual services Explain and modify application behavior through profiles, policies, and DataScripts Describe Central licensing management using VMware NSX Advanced Load Balancer Enterprise with Cloud services (formerly Avi Pulse) Explain how to configure Role-Based Access Control (RBAC) in NSX Advanced Load Balancer Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling Identify the key features of VMware NSX Network Detection and Response This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 21.x release. Features include the overall infrastructure, virtual services, application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain virtual service components Explain virtual service types Explain and configure basic virtual service components such as application profiles and network profiles Virtual Services Configuration Advanced Concepts Explain the virtual service advanced components such as Wildcard VIP, Server Name Identification (SNI), and Enhanced Virtual Hosting (EVH) Explain the concept of virtual service VIP Sharing Explain different authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Profiles and Policies Explain application profiles and types such as L4, DNS, Syslog, HTTP, and VMware Horizon VDI Explain and configure advanced application HTTP profile options Describe network profiles and types Explain and configure SSL profiles and certificates Explain and configure HTTP, network, and DNS policies Pools Configuration Concepts Explain pools configuration options Describe the available load balancing algorithms Explain multiple health monitor types Explain multiple Persistence profiles Explain and configure pool groups Modifying Application Behavior Design and apply application solutions by using application profiles Design and apply application solutions by using network, HTTP policies, and DataScripts Explain DataScript fundamentals Explain and use NSX Advanced Load Balancer analytics to understand application behavior Describe and configure client SSL certificate validation Describe and configure virtual service DDoS, Rate limiting, and Throttling capabilities Modify network profile properties such as TCP connection properties Design and apply application solutions by using Persistence profiles NSX Advanced Load Balancer Infrastructure Architecture Explain management, control, data, and consumption planes and functions Describe control plane clustering and high availability Describe controller sizing and process sharing Describe Service Engine CPU and NIC architecture Explain tenants Configure properties of Service Engine groups Explain Service Engine group high availability modes Describe and configure active-standby high availability mode Explain Service Engine placement in multiple availability zones for public clouds Describe and configure elastic HA high availability mode (Active-Active, N+M) Explain Service Engine failure detection and self-healing Describe Service Engine as a router Explain virtual service scale-out options such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Describe how to upgrade NSX Advanced Load Balancer Introduction to Cloud Connector Explain cloud connectors Review cloud connector integration modes List cloud connector types Review the different Service Engine image types in different ecosystems Installing, Configuring, and Managing NSX Advanced Load Balancer in No-Orchestrator Cloud Explain No-Access cloud concepts Configure No-Access cloud integration on bare metal Explain and configure Linux Server Cloud Explain and configure VMware No Orchestrator Describe the advanced configuration options available in bare metal (Linux Server Cloud) Installing, Configuring, and Managing NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware Write Access Cloud Connector Explain NSX Advanced Load Balancer integration options in a VMware NSX environment Explain and configure NSX Cloud Connector for Overlay and VLAN-backed segments AWS Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different AWS components Explain and demonstrate AWS public cloud integration Deploy VMware NSX Advanced Load Balancer Controller, SEs, and virtual services in AWS Cloud Review Multi-AZ Support for virtual services in AWS cloud GCP Cloud Configuration Explain different GCP components Explain and demonstrate GCP public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in GCP cloud Azure Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different Microsoft Azure components Explain and demonstrate Azure public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in Azure Cloud NSX Advanced Load Balancer Enterprise with Cloud Services (Avi Pulse) Describe NSX Advanced Load Balancer public cloud services Explain different features of NSX Advanced Load Balancer Cloud Services Register the controller with Cloud Services DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing (GSLB) Introduce Global Server load balancing concepts and benefits Explain and configure the NSX Advanced Load Balancer infrastructure Explain and configure the DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB sites Explain and configure basic GSLB services to include pools and health monitors Describe GSLB Server Load Balancing algorithms Explain and configure health monitors based on data plane and control plane Describe GSLB Health Monitor Proxy Explain GSLB Site-Cookie Persistence Explain the different GSLB replication methods Role-Based Access Control (RBAC) Introduce local authentication in NSX Advanced Load Balancer Introduce remote authentication in NSX Advanced Load Balancer Review the different types of remote authentication Explain granular RBAC using labels NSX Advanced Load Balancer: Troubleshooting Introduce infrastructure and application troubleshooting concepts Describe troubleshooting based on control plane and data plane Explain application analytics and logs Describe client logs analysis Explain headers troubleshooting and packet capture mechanism Describe how to use CLI for detailed data plane troubleshooting Explain Service Engine logs Explain health monitors troubleshooting Explain BGP session troubleshooting Describe control plane troubleshooting, clustering, and cloud connector issues Events and Alerts Describe NSX Advanced Load Balancer events Describe and configure NSX Advanced Load Balancer alerts Describe NSX Advanced Load Balancer monitoring capabilities with SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce the NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface with

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered OnlineFlexible Dates
Price on Enquiry

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. Identifying What's at Stake Topic A: Identify the Threats and Regulatory Responses Topic B: Identify Sensitive Information Describing CMMC Topic A: Describe the CMMC Model Architecture Topic B: Describe the CMMC Program Getting Ready for a CMMC Assessment Topic A: Scope Your Environment Topic B: Analyze the CMMC Assessment Guides Topic C: Foster a Mature Cybersecurity Culture Topic D: Identify Helpful Documents Topic E: Evaluate Your Readiness Interacting with the CMMC Ecosystem Topic A: Identify the CMMC Ecosystem Topic B: Describe a CMMC Assessment

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c Administration I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F

Oracle 12c Administration I
Delivered OnlineFlexible Dates
Price on Enquiry

Building Web Applications With TypeScript, Angular, and React

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for web developers who are well-versed in JavaScript and want to take their TypeScript knowledge to the next level. No prior TypeScript knowledge is required. Overview By completing this course, you will be able to build interesting TypeScript projects. This course will take your current TypeScript knowledge to the next level. Here are the important topics that this course will cover: - Learn the fundamentals of TypeScript - Build a weather forecast widget with Angular - Create building a note-taking client/server application using Angular, Node.js, and MongoDB - Create a real-time chat application with React In this course, you will begin by learning the fundamentals of TypeScript and then move toward advanced concepts. Then, learn how TypeScript relates to JavaScript that you may have written before. and understand the benefits of TypeScript and how it can help you avoid software defects. You will also learn to use type guards, check null and undefined, create tagged union types, and compare the performance of algorithms. Additionally, you will use TypeScript to build a weather forecast widget with Angular and then progress by building a note-taking client/server application using Angular, Node.js, and MongoDB, and finally create a real-time chat application with React. TypeScript Fundamentals Introduction to TypeScript Type Checking Advanced Type Analysis Features Comparing Performance of Algorithms Building a Weather Forecast Widget with Angular 4 Using Modules Creating the First Component Using the Component in Other Components Using the Main Component Note-Taking Client/Server App Setting up the Server Integrating with MongoDB Creating the Client Side with Angular Real-Time Chat Setting up the Project Writing the Server Creating the Chat Room Additional course details: Nexus Humans Building Web Applications With TypeScript, Angular, and React training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Web Applications With TypeScript, Angular, and React course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Web Applications With TypeScript, Angular, and React
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with React Native (TT4198)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an intermediate-level course for web developers with prior practical experience working with React. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: React Native Essentials React Fundamentals: 7 steps of app development Building a React Native App / Case Study Core Components Core APIs Getting Started with React Native is a hands-on, intermediate level web development course geared for experienced web developers who need to build and design applications using React Native. Students will explore the core APIs and Components, applying these skills to the course case study project to create a React Native app in class. React Native: An Introduction What Is React Native, Exactly? What Does React Native Bring to the Table? Pros and Cons Introduction to React Native Prerequisites: How to Get React Native Baby Steps: A First App Getting Started with React Native Weather App Starting the project Expo Components Custom components React Fundamentals Breaking the app into components 7 step process Step 2: Build a static version of the app Step 3: Determine what should be stateful Step 4: Determine in which component each piece of state should live Step 5: Hardcode initial states Step 6: Add inverse data flow Updating timers Deleting timers Adding timing functionality Add start and stop functionality Methodology review Core Components, Part 1 What are components? Building an Instagram clone View StyleSheet Text TouchableOpacity Image ActivityIndicator FlatList Core Components, Part 2 TextInput ScrollView Modal Core APIs, Part 1 Building a messaging app Initializing the project The app Network connectivity indicator The message list Toolbar Geolocation Input Method Editor (IME) Core APIs, Part 2 The keyboard Day Four to Five or Time Permitting Navigation Navigation in React Native Contact List Starting the project Container and Presentational components Contacts Profile React Navigation Stack navigation Tab navigation Drawer navigation Sharing state between screens Deep Linking Testing Flow - Benefits of Using Flow Jest - Jest with React Native Snapshot Testing with Jest Building and publishing Building Building with Expo OS Android Handling Updates Additional course details: Nexus Humans Getting Started with React Native (TT4198) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with React Native (TT4198) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Getting Started with React Native  (TT4198)
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)

By Nexus Human

Duration 3.75 Days 22.5 CPD hours This course is intended for New systems administrators Overview When you complete this course, you will be able to:Customize your application, including page layouts, fields, tabs, and business processes in Lightning Experience.Learn how security settings created in Salesforce Classic are applied in Lightning.Maintain and import clean data in Lightning.Use Lightning features to create high-value reports and dashboards.Understand how workflow automation complies with Lightning This course is the core training that ensures your success with Salesforce Lightning. It?s a must for new administrators, and we recommend completing this course before starting a Salesforce deployment or when taking over an existing deployment. Getting Around the App Data Model and Navigation Lightning Experience Help & Training Getting Your Organization Ready for Users Setting Up the Company Profile Configuring the User Interface Setting Up Activities and Calendars Configuring Search Settings Setting Up Chatter Groups Mobile Access with Salesforce1 Setting Up & Managing Users Managing User Profiles Managing Users Setting Up Chatter Free Users and Invites Troubleshooting Login Issues Security & Data Access Restricting Logins Determining Object Access Setting Up Record Access Creating a Role Hierarchy Dealing with Record Access Exceptions Managing Field-level Security Object Customizations Administering Standard Fields Creating New Custom Fields Creating Selection Fields: Picklists and Lookups Creating Formula Fields Working with Page Layouts Working with Record Types and Business Processes Maintaining Data Quality Managing Data Import Wizards Data Loader Data.com Mass Transfer Backing Up Data Mass Delete and Recycle Bin Reports & Dashboards Running and Modifying Reports Creating New Reports with the Report Builder Working with Report Filters Summarizing with Formulas and Visual Summaries Printing, Exporting, and Emailing Reports Building Dashboards Automation Email Templates Workflow Rules Process Builder Lead Automation Managing the Support Process Managing and Resolving Cases Customizing a Support Process Automating Support Understanding the Salesforce Console for Service Collaborating in the Service Cloud Analyzing Support Data Additional course details: Nexus Humans Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Administration Essentials for New Admins in Lightning Experience (ADX201)
Delivered OnlineFlexible Dates
Price on Enquiry