Duration 1 Days 6 CPD hours This course is intended for This course is designed for people who need to use Microsoft Teams to communicate, share files, and conduct online meetings with colleagues. No experience with Teams is required; however, a basic understanding of Office apps will be useful. Overview In this course, you will use Microsoft Teams to communicate and collaborate with your colleagues. You will: Send messages to colleagues using Teams. Call and meet with people in Teams. Lead a meeting. Configure your Teams environment. Share files and app content. Create and configure Teams. This course is designed to help you master Microsoft© Teams©, the key communications tool in the suite of Microsoft© 365© productivity apps. Microsoft Teams enables individuals and organizations to chat, share ideas, collaborate on files, and essentially, work together. You can use Teams to have a quick chat with a colleague, participate in a virtual meeting, make an online call, and share files and resources. The Microsoft Teams app is available in three versions: a desktop app, a web app, and a mobile app. Once you are familiar with the Teams desktop app, you can easily transfer that knowledge and work in the web and mobile apps to take advantage of connecting through Teams wherever your work takes you. Messaging Colleagues Using Teams Topic A: Navigate in Teams Topic B: Chat with Contacts Topic C: Post in Team Channels Calling and Meeting in Teams Topic A: Call People in Teams Topic B: Meet in Teams Leading Meetings in Teams Topic A: Conduct Presentations Topic B: Manage Meetings Configuring Your Teams Environment Topic A: Configure General Application Settings Topic B: Configure Notifications and Privacy Settings Topic C: Configure Call and Device Settings Sharing Files and App Content in Teams Topic A: Share Files Topic B: Add Apps and Connectors Creating and Configuring Teams Topic A: Create and Manage a Team Topic B: Create and Configure Channels Topic C: Add and Configure Channel Tabs
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resiliency though high-availability clustering services and using fault-tolerant shared storage technologies. Overview As a result of attending this course, students should be able to create, manage, and troubleshoot highly available network services and tightly coupled cluster storage for business-critical applications. Students should be able to demonstrate the following skills: Improve application uptime by using high-availability clustering Manage storage in a high-availability environment using iSCSI initiators, HA-LVM or CLVM as appropriate, and GFS2 cluster file systems Implement strategies to identify single points of failure in high-availability clusters, and eliminate them This course will guide you through an intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.This course covers the same material as RH436, but includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436). This course is based on Red Hat Enterprise Linux 7.1. Clusters and storage Get an overview of storage and cluster technologies. Create high-availability clusters Review and create the architecture of Pacemaker-based high-availability clusters. Nodes and quorum Review cluster node membership and how quorum is used to control clusters. Fencing Understand fencing and fencing configuration. Resource groups Create and configure simple resource groups to provide high-availability services to clients. Troubleshoot high-availability clusters Identify and troubleshoot cluster problems. Complex resource groups Control complex resource groups by using constraints. Two-node clusters Identify and work around two-node clusters issues. ISCSI initiators Manage iSCSI initiators for access to shared storage. Multipath Storage Configure redundant storage access. Logical volume manager (LVM) clusters Manage clustered LVM. Global File System 2 Create symmetric shared file systems. Eliminate single points of failure Eliminate single points of failure to increase service availability. Comprehensive review Set up high-availability services and storage.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow
Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for persons in a variety of job roles such as publishing specialists, layout specialists, graphic designers, or any other knowledge workers who need to use Microsoft Office Publisher to create, lay out, edit, and share publications. Overview In this course, you will create, format, edit, and share publications. You will: Perform basic tasks in the Microsoft Publisher interface. Add content to a publication. Format text and paragraphs in a publication. Manage text in a publication. Work with graphics in a publication. Prepare a publication for printing and sharing. Microsoft© Publisher for Office 365? is a desktop publishing softwareapplication capable of producing greeting cards, certificates, newsletters, and otherprinted publications. Publisher includes a large collection of templates that provideagreat way to start a new publication. Publisher offers a large selection of 'buildingblocks' that can be dragged into your documents, helping you to create page elementssuch as calendars, newsletter sidebars, and borders. Publisher integrates online sharingand mail merge features, which are handy when you need to send publications to a listofcustomers, and it's possible to export publications as HTML web pages or PDF documents.With a user-friendly interface, Publisher makes it easy to create and editpublications. This course presents information and skills that are appropriate for users of theOffice2019/2021 or Office 365 desktop applications. However, the instructional environmentforthe delivery of this course utilizes Office 365. Getting Started with Microsoft Publisher Topic A: Navigate the Interface Topic B: Customize the Publisher Interface Topic C: Create a Publication Adding Content to a Publication Topic A: Add Text to a Publication Topic B: Add Pages and Picture Placeholders to a Publication Topic C: Control the Display of Content in Text Boxes Topic D: Apply Building Blocks to a Publication Formatting Text and Paragraphs in a Publication Topic A: Format Text Topic B: Format Paragraphs Topic C: Apply Schemes Managing Text in a Publication Topic A: Edit Text in a Publication Topic B: Work with Tables Topic C: Insert Symbols and Special Characters Working with Graphics in a Publication Topic A: Insert Graphics in a Publication Topic B: Customize the Appearance of Pictures Preparing a Publication for Sharing and Printing Topic A: Check the Design of a Publication Topic B: Save a Publication in Different Formats Topic C: Print a Publication Topic D: Share a Publication
Duration 5 Days 30 CPD hours This course is intended for Application Developers; Programmers, Sales and Pre Sales, Technical Support, Project Managers, Cisco customers, partners and employees involved in UCCE/CVP or CVP stand alone deployments Overview Upon completing this course, the learner will be able to meet these overall objectives: Introduction to the Java API, its capabilities and limitations - Practice - This course is applicable for any version of CVP and Studio. Introduction to Voice Elements and their complexity - creating every different Java component to extend Studio (see below) Overview of a UCCE with CVP Comprehensive Call Flow Module 1 Overview of a UCCE with CVP Comprehensive Call Flow Module 2 ICM routing scripts to route calls to CVP VXML Server applications Passing data (e.g., global variables) Parsing and evaluating data returned Queueing Assigning data to send to Finesse. Module 3 Writing Call Studio scripts (applications) Prompting Callers ? using pre-recorded audio; TTS text-to-speech; Say it Smart to format audio as digits, date, time, currency; input error reprompting Menus Collecting and confirming caller input, such as account numbers, dates of birth, etc Working with variables ? Session data, Element data, Call data, Local data (CVP11) Introduction to retrieving data from back end systems: SQL Database interaction ? using the Studio Database element to select data Web service interaction- Studio Web Services element for SOAP-web services and calling a simple REST web service Playing audio to callers during back-end data retrieval Catch events Working with counters, decisions, math Introduction to javascript for substrings and string length Setting VoiceXML properties affecting the gateway Multi-Language applications Module 4 Working with Version Control Module 5 ÿImplementing a Post Call Survey Module 6 Using the Studio Debugger to test applications within Studio Module 7 CVP Reporting Server and CVP CUIC Reports Best practices regarding naming elements and variables Configuring data to pass to the Reporting Server using OAMP Understanding Reporting Server tables Understanding the Application Summary CUIC reports Module 8 Administration covered throughout the course OAMP Operations Console to deploy applications to VXML Server Using Studio Documenter to print Visio-like diagrams of the application Configuring log file properties Using logs for debugging applications Administrative scripts for graceful updates or suspensions of the server Important log, debug, administration files Module 9 Cisco Courtesy Callback Detailed discussion of the CCB Call flow, the ICM script, and the 5 Studio scripts used for Courtesy Callback.
Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course
Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level course, designed for anyone wanting to learn Linux. Attendees should be comfortable working with computers and the command line, but no other specific skills are required to attend. Overview This skills-focused course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on labs that emphasize current techniques, best practices and standards. Working in a hands-on lab environment, guided by our expert practitioner, attendees will explore The Design of Linux Basic Operations File System Basics Wildcards File and Directory Permissions Working with files Executing Programs Using find Filters and other useful commands The vi editor Customizing the user environment Networking/Communications Backups and archiving This hands-on course provides you with an essentials-level foundation in core skills for using any version of Linux. This course focuses on essential skills that ordinary users might use daily when working with Linux. The Design of Linux A brief history of Linux The Linux design philosophy Linux architecture Basic Operations Logging in and out The general form of a Linux command Common commands Using man pages Essential commands File System Basics The Linux directory structure Standard directories Relative and absolute pathnames Legal file names Navigating the filesystem Wildcards Matching one character Matching many characters Shortcuts Wildcard gotchas Wildcards and ls File and Directory Permissions Viewing permissions File permissions Directory permissions Setting defaults Changing permissions Keeping data secure Working with files Viewing contents Identifying file contents Copying and moving Deleting Using symbolic links Executing Programs Redirecting STDOUT Redirecting STDERR Redirecting STDIN Creating pipelines Processes attributes Listing processes Killing processes Foreground & background processes Using find Syntax Finding by name, type, or size Combining tests Finding by size, owner, or timestamps Using xargs with find Other find options Filters and other useful commands What is a filter? cat: a generic filter head and tail grep sort wc other interesting filters The vi editor Why vi? Basic vi operations: navigating, adding, deleting Advanced operations: buffer management, search and replace, configuration options Customizing the user environment About shells Shell startup files Shell variables Search path Aliases Simple shell scripts Networking/Communications Reading and sending mail Remote login Remote file transfer Other network utilities (ping, finger, etc) Backups and archiving Checking space used or available Creating tar archives Viewing and extracting files from archives Compression utilities Working with windows