• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2179 Courses delivered Live Online

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the Cisco IOS XR 64-Bit software architecture and Linux system fundamentals Describe the major differences between classic Cisco IOS XR software and Cisco IOS XR 64-Bit software on the ASR 9000 Series routers Migrate an ASR 9000 Series router from classic IOS XR software to Cisco IOS XR 64-Bit software Perform and explain Cisco IOS XR 64-Bit software installations Configure and describe Cisco IOS XR 64-Bit software features The Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) course covers the migration from classic 32-bit Cisco IOS© XR software to Cisco IOS XR 64-Bit software on the Cisco© ASR 9000 Series Aggregation Services Routers. This course will also examine the software architecture, boot process, and auto-provisioning of the Cisco IOS XR 64-bit software, as well as showing you how to install Cisco IOS XR and third-party software packages. In addition, it will investigate data models and show you how to implement telemetry, model-driven programmability, and application hosting services. Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 Series IOS XR 64-Bit Software vs. Classic 32-Bit Software Exploring Linux Fundamentals Creating User Profiles Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Examining the Boot Process Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Features Investigating Data Models Implementing Telemetry Exploring Model-Driven Programmability Employing Application Hosting Additional course details: Nexus Humans Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers interested in automation and programmability and who hold job roles such as: Account manager Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview This course will help you: Gain the high-demand knowledge and skills to implement automation, streamline container orchestration, and enhance scalability Learn the skills to maximize the lightweight design of containers to scale more quickly and allow more responsiveness to website traffic load Prepare for the 300-910 DEVOPS exam What to expect in the exam The 300-910 DEVOPS exam certifies your knowledge and skills with DevOps. Key DevOps practices include deployment automation that enables configuration, management, and scalability of cloud microservices and infrastructure processes on Cisco platforms. This course teaches you how to automate application deployment, enable automated configuration, enhance management, and improve scalability of cloud microservices and infrastructure processes on Cisco© platforms. You will also learn how to integrate Docker and Kubernetes to create advanced capabilities and flexibility in application deployment. This course prepares you for the 300-910 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) certification exam. Course Outlines ITRODUCING THE DEVOPS MODEL INTRODUCING CONTAINERS PACKAGING AN APPLICATION USING DOCKER DEPLOYING A MULTITIER APPLICATION INTRODUCING CI/CD BUILDING THE DEVOPS FLOW VALIDATING THE APPLICATION BUILD PROCESS BUILDING AN IMPROVED DEPLOYMENT FLOW EXTENDING DEVOPS PRACTICES TO THE ENTIRE INFRASTRUCTURE IMPLEMENTING ON-DEMAND TEST ENVIRONMENTS AT THE INFRASTRUCTURE LEVEL MONITORING IN NETDEVOPS ENGINEERING FOR VISIBILITY AND STABILITY SECURING DEVOPS WORKFLOWS EXPLORING MULTICLOUD STRATEGIES EXAMINING APPLICATION AND DEPLOYMENT ARCHITECTURES DESCRIBING KUBERNETES INTEGRATING MULTIPLE DATA CENTER DEPLOYMENTS WITH KUBERNETES MONITORING AND LOGGING IN KUBERNETES Additional course details: Nexus Humans Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Data Science Practitioner (CDSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for business professionals who leverage data to address business issues. The typical student in this course will have several years of experience with computing technology, including some aptitude in computer programming. However, there is not necessarily a single organizational role that this course targets. A prospective student might be a programmer looking to expand their knowledge of how to guide business decisions by collecting, wrangling, analyzing, and manipulating data through code; or a data analyst with a background in applied math and statistics who wants to take their skills to the next level; or any number of other data-driven situations. Ultimately, the target student is someone who wants to learn how to more effectively extract insights from their work and leverage that insight in addressing business issues, thereby bringing greater value to the business. Overview In this course, you will learn to: Use data science principles to address business issues. Apply the extract, transform, and load (ETL) process to prepare datasets. Use multiple techniques to analyze data and extract valuable insights. Design a machine learning approach to address business issues. Train, tune, and evaluate classification models. Train, tune, and evaluate regression and forecasting models. Train, tune, and evaluate clustering models. Finalize a data science project by presenting models to an audience, putting models into production, and monitoring model performance. For a business to thrive in our data-driven world, it must treat data as one of its most important assets. Data is crucial for understanding where the business is and where it's headed. Not only can data reveal insights, it can also inform?by guiding decisions and influencing day-to-day operations. This calls for a robust workforce of professionals who can analyze, understand, manipulate, and present data within an effective and repeatable process framework. In other words, the business world needs data science practitioners. This course will enable you to bring value to the business by putting data science concepts into practice Addressing Business Issues with Data Science Topic A: Initiate a Data Science Project Topic B: Formulate a Data Science Problem Extracting, Transforming, and Loading Data Topic A: Extract Data Topic B: Transform Data Topic C: Load Data Analyzing Data Topic A: Examine Data Topic B: Explore the Underlying Distribution of Data Topic C: Use Visualizations to Analyze Data Topic D: Preprocess Data Designing a Machine Learning Approach Topic A: Identify Machine Learning Concepts Topic B: Test a Hypothesis Developing Classification Models Topic A: Train and Tune Classification Models Topic B: Evaluate Classification Models Developing Regression Models Topic A: Train and Tune Regression Models Topic B: Evaluate Regression Models Developing Clustering Models Topic A: Train and Tune Clustering Models Topic B: Evaluate Clustering Models Finalizing a Data Science Project Topic A: Communicate Results to Stakeholders Topic B: Demonstrate Models in a Web App Topic C: Implement and Test Production Pipelines

CertNexus Certified Data Science Practitioner (CDSP)
Delivered OnlineFlexible Dates
Price on Enquiry

Troubleshooting VMware vRealize Operations [V8.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators tasked with maintaining a vRealize Operations cluster Overview By the end of the course, you should be able to meet the following objectives: Identify the vRealize Operations components affected in typical troubleshooting scenarios List the environmental and operational factors that can generate problems in vRealize Operations Use self-monitoring tools to assess and troubleshoot operational issues in vRealize Operations Access CLI-based tools to assess and troubleshoot operational issues in vRealize Operations Use the vRealize Operations API tool to retrieve cluster data and perform actions Retrieve and review log files associated with specific vRealize Operations components Use available tools to troubleshoot problem scenarios in vRealize Operations Identify the best practices to ensure a vRealize Operations instance remains in a healthy state Locate resources to help you troubleshoot vRealize Operations This two-day course gives VMware vRealize© Operations? administrators the skills to perform basic troubleshooting tasks. The course also gives administrators the skills to ensure that their vRealize Operations instance meets its use-case objectives of continuous performance optimization, app-aware intelligent remediation, and integrated compliance. Course Introduction Introduction and course logistics Course objectives Running a vRealize Operations Instance Identify the components of a vRealize Operations cluster Identify common problems that affect vRealize Operations List the environmental and operational factors that can affect vRealize Operations Identify the affected components vRealize Operations Troubleshooting Tools Use vRealize Operations self-monitoring tools to troubleshoot problems Use CLI tools to troubleshoot vRealize Operations problems Identify the log files used by individual vRealize Operations components Run commands to analyze vRealize Operations log files Use the vRealize Operations API tool vRealize Operations Troubleshooting Scenarios Use relevant tools to troubleshoot problem scenarios Maintaining vRealize Operations Use best practices to ensure the vRealize Operations cluster remains in a healthy state Back up and restore vRealize Operations Identify vRealize Operations troubleshooting resources Additional course details: Nexus Humans Troubleshooting VMware vRealize Operations [V8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Troubleshooting VMware vRealize Operations [V8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Troubleshooting VMware vRealize Operations [V8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Master Certified (SMC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This certification is appropriate for anyone who is interested in working as a Scrum Master or for someone who is already a Scrum master in his organization. Scrum Master is an important role in any Scrum team and need not be a technology expert to be effective. Moreover, although Scrum is popular in the IT industry, it can be used effectively across different industries. The SBOK Guide, on which the SMC course is based on, can be used as an effective guide for implementation. Overview The participants will be prepared to take SMC™ certification exam and pass. Also they will be able to apply the concepts in their day to day job. This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Introduction Course Objectives Course Methodology Certification Schema Exam Format Overview of Agile Agile Manifesto Agile Principles What has Changed Agile Methods Overview of Scrum Definition and brief history of Scrum Why Scrum Scrum vs. Traditional Project Management Benefits of Scrum Overview of A Guide to the Scrum Body of Knowledge (SBOK? Guide) Framework of the SBOK? Guide Who uses the SBOK? Guide How to use the SBOK? Guide Scrum Flow Principles Empirical Process Control Self-organization Collaboration Value-based Prioritization Time-boxing Iterative Development Scrum Aspects Organization Business Justification Quality Change Risk Scrum Phases and Processes Initiate Plan and Estimate Implement Review and Retrospect Release Scaling Scrum Scaling Scrum for Large Projects Scaling Scrum for the Enterprise Transition to Scrum Mapping Traditional Roles To Scrum Maintaining Stakeholder Involvement Importance Of Executive Support Additional course details: Nexus Humans Scrum Master Certified (SMC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Scrum Master Certified (SMC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Scrum Master Certified (SMC)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Virtualization with RHCVA Exam (RH319)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. Migrate virtual machines Migrate and control automatic migration of virtual machines. Manage virtual machine images Manage virtual machine snapshots and disk images. Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.

Red Hat Virtualization with RHCVA Exam (RH319)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System Installers System Integrators System Administrators Network Administrators Solution Designers Overview Upon completion of this course, you will be able to: Describe the architecture and function of the Cisco IOS XR Broadband Network Gateway Configure and verify Authentication, Authorization, and Accounting (AAA) in a Broadband Network Gateway deployment Define policies to control subscriber traffic Establish and verify subscriber sessions Prioritize subscriber traffic using QoS Implement subscriber features Deploy redundancy for subscriber sessions The Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 course teaches you how to successfully deploy, configure, operate, maintain, and support a Cisco IOS© XR Broadband Network Gateway (BNG) solution. This course will show you how to implement and verify BNG on a Cisco IOS XR device to manage subscriber access. You will also learn how to implement and verify subscriber management functions, including authentication, authorization, and accounting of subscriber sessions, address assignment, security, policy management, and Quality of Service (QoS). Broadband Network Gateway Overview BNG Architecture BNG Software and Hardware Requirements Configuring and Verifying Authentication, Authorization, and Accounting AAA Overview and Operation RADIUS Operation and Configuration DIAMETER Operation and Configuration Activating Control Policy Control Policy Overview Creating and Activating Class Maps and Policy Maps Defining Dynamic Templates Establishing Subscriber Sessions Subscriber Session Overview Establishing IPoE and PPPoE Sessions DHCP Operation Subscriber Interface Neighbor Discovery Static Session and Session Limits BGP Subscriber Support Deploying Quality of Service Quality of Service Overview and QoS Feature Support RADIUS Based Policing Share Policy Instances and Merged Policy-Maps Configuring Subscriber Features Managing Control Plane Traffic Controlling Packet Forwarding Providing Multicast Services Routing and Traffic Mirroring on Subscriber Sessions BNG Geo Redundancy and XML Support Geo Redundancy Overview and Deployment Models Configuring and Verifying Geo Redundancy XML Support Additional course details: Nexus Humans Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Ultra M Deployment and Operations v1.0 (SPMBL301)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who will deploy or have deployed the Ultra M virtual packet core solution in their network, including: Systems engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the Ultra M hardware and software Describe the features covered in the OpenStack component overview and deployment architecture Describe the Ultra M deployment architecture and operation Describe the Virtualized Packet Core-Distributed Instance (VPC-DI) architecture and packet flow Deploy and operate Ultra M This course teaches you about the hardware components of the Cisco© Ultra M virtual packet core solution, including Cisco Nexus© spine and leaf switches and Cisco Unified Computing System. The course also covers the operation and administration of the Red Hat Enterprise Linux operating system in relation to the Ultra M Undercloud and Overcloud deployments. Cisco Ultra M Hardware and Topology Overview Cisco Ultra M Hardware Components Cisco Ultra M UCS Components Cisco Ultra M UCS Interfaces Cisco Ultra M Networking Components Cisco Ultra M Physical Network Topology OpenStack Deployment Architecture and Components OpenStack Overview Nova ? OpenStack Compute Service Glance ? OpenStack Image Service Neutron ? OpenStack Network Service Keystone ? OpenStack Identity Service Cinder ? OpenStack Block Storage Service OpenStack Horizon Dashboard Ultra M Services Platform Ultra Services Platform Architecture Ultra M VNF Architecture Ultra Automation Services (UAS) Elastic Services Controller OpenStack and Ultra Automation Services VPC-DI Overview and Operation Virtual Packet Core Evolution Ultra M Layer 3 Network Topology VPC-DI Network Topology VPC-DI Packet Flows Ultra M Installation and Deployment Reviewing the Ultra M System Components Planning the Network for Installation and Deployment Deploying Hyperconverged Ultra M Models Using UAS Deploying VNFs Using AutoVNF Ultra Automation Services Additional course details: Nexus Humans Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Ultra M Deployment and Operations v1.0 (SPMBL301)
Delivered OnlineFlexible Dates
Price on Enquiry