Duration 5 Days 30 CPD hours This course is intended for Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Overview After completing this course, learners should be able to: Prepare to install Windows 10. Install Windows 10. Configure Updates for Windows. Perform post-installation configuration tasks. Configure devices and drivers for Windows. Configure storage for Windows. Configure network settings in Windows. Configure remote management of Windows. Configure and manage applications in Windows. Configure Internet Explorer. Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them. Use Windows troubleshooting and monitoring tools. Troubleshoot Windows installations. Troubleshoot application installation issues. Troubleshoot web browser settings. Troubleshoot Windows authentication. Troubleshoot hardware issues related to Windows machines. Develop an Operating System deployment and upgrade strategy. Understand the different methods of deployment. Understand on-premise and cloud-based solutions. Deploy and migrate desktops to Windows 10. Plan and configure Windows Update policies. Describe the benefits and capabilities of Azure AD. Manage users using Azure AD with Active Directory DS. Implement Windows Hello for Business. Configure conditional access rules based on compliance policies. Describe the various tools used to secure devices and data. Implement Windows Defender Advanced Threat Protection. This five day accelerated course will cover topics necessary to prepare attendees with the baseline knowledge to take the MD-100 and MD-101 exams for the Modern Desktop Administrator Associate certification. Installing Windows Introducing Windows 10 Installation Options Requirements for Windows Features Installation Process and Media Upgrading to Windows 10 Updating Windows Windows Servicing Model Updating Windows Applying Applications and Windows Updates Post-Instalation Configuration and Personalization Customize the Windows 10 UI Configure device specific settings such as power plans and mobile device options Use the Windows control panel and setting app to configure settings Describe using Windows PowerShell Configuring Peripherals and Drivers Managing Devices and Drivers Managing Printers Configuring Networking Configure IP Network Connectivity Implement Name Resolution Implement Wireless Network Connectivity Remote Access Overview Remote Management Configuring Storage Overview of storage options Using OneDrive Managing Disks, Partitions, and Volumes Maintaining Disks and Volumes Managing Storage Spaces Managing Apps in Windows 10 Providing Apps to Users Managing Universal Windows Apps The Windows Store Web browsers in Windows 10 Configuring Authorization and Authentication Using Security Settings to Mitigate Threats Configuring User Account Control Implementing Device Registration Authentication Configuring Data Access and Usage Overview of File Systems Configuring and Managing File Access Configuring and Managing Shared Folders Managing Security with Policies Configuring Advanced Management Tools Configuring Tenant Roles Managing Tenant Health and Services Supporting the Windows 10 Environment Troubleshooting Windows Troubleshooting Tools Troubleshooting the Windows OS Troubleshooting Windows Startup Troubleshooting Operating System Service Issues Troubleshooting Sign-In Issues Troubleshooting Files and Applications File Recovery in Windows 10 Application Troubleshooting Troubleshooting Hardware and Drivers Troubleshooting Device Driver Failures Overview of Hardware Troubleshooting Troubleshooting Physical Failures Planning an Operating System Deployment Strategy Overview of Windows as a service Windows 10 Deployment options Considerations for Windows 10 deployment Implementing Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Managing Updates for Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Device Enrollment Device management options Manage Intune device enrollment and inventory Configuring Profiles Configuring device profiles Managing user profiles Monitoring devices Application Management Implement Mobile Application Management (MAM) Deploying and updating applications Administering applications Managing Authentication in Azure Ad MANAGING AUTHENTICATION IN AZURE AD Managing Devices and Device Policies Microsoft Intune Overview Managing devices with Intune Implement device compliance policies Managing Security Implement device data protection Managing Windows Defender ATP Managing Windows Defender in Windows 10 Additional course details: Nexus Humans Windows 10 Modern Desktop Administrator Associate Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Windows 10 Modern Desktop Administrator Associate Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations⢠for Logs and VMware Aria Operations⢠for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview In this course, you will learn to: Recognize the AWS services that support the different phases of Operational Excellence, a WellArchitected Framework pillar. Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM). Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config. Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment. Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog. Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches. Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance. Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand. Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment. Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config. Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service. State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment. Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier. Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report. This course teaches systems operators and anyone performing system operations functions how to install, configure, automate, monitor, secure, maintain and troubleshoot the services, networks, and systems on AWS necessary to support business applications. The course also covers specific AWS features, tools, andbest practices related to these functions. Module 1: Introduction to System Operations on AWS Systems operations AWS Well-Architected Framework AWS Well-Architected Tool Module 2a: Access Management Access management Resources, accounts, and AWS Organizations Module 2b: System Discovery Methods to interact with AWS services Introduction to monitoring services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Troubleshooting scenario Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config Module 3: Deploying and Updating Resources Systems operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower Troubleshooting scenario Module 4: Automating Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Troubleshooting scenario Hands-On Lab: Infrastructure as Code Module 5: Manage Resources AWS Systems Manager Troubleshooting scenario Hands-On Lab: Operations as Code Module 6a: Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 Module 6b: Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager Troubleshooting scenario Module 7: Monitor and Maintaining System Health Monitoring and maintaining healthy workloads Monitoring distributed applications Monitoring AWS infrastructure Monitoring your AWS account Troubleshooting scenario Hands-On Lab: Monitoring Applications and Infrastructure Module 8: Data Security and System Auditing Maintain a strong identity and access foundation Implement detection mechanisms Automate incident remediation Troubleshooting scenario Hands-On Lab: Securing the Environment Module 9: Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC Troubleshooting scenario Module 10a : Mountable Storage Configuring Amazon Elastic Block Storage (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Module 10b: Object Storage Deploying Amazon Simple Storage Service (Amazon S3) with Access Logs, Cross-Region Replication, and S3 Intelligent-Tiering Hands-On Lab: Automating with AWS Backup for Archiving and Recovery Module 11: Cost Reporting, Alerts, and Optimization Gain AWS expenditure awareness Use control mechanisms for cost management Optimize your AWS spend and usage Hands-On Lab: Capstone lab for SysOps Additional course details: Nexus Humans Systems Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Systems Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators Consultants responsible for designing, implementing, and customizing vRealize Operations Overview By the end of the course, you should be able to meet the following objectives: List the vRealize Operations use cases Identify features and benefits of vRealize Operations Determine the vRealize Operations cluster that meets your monitoring requirements Deploy and configure a vRealize Operations cluster Use interface features to assess and troubleshoot operational problems Describe vRealize Operations certificates Create policies to meet the operational needs of your environment Recognize effective ways to optimize performance, capacity, and cost in data centers Troubleshoot and manage problems using workbench, alerts, and predefined dashboards Manage configurations Configure application monitoring using VMware vRealize Operations Cloud Appliance⢠Create custom symptoms and alert definitions, reports, and views Create various custom dashboards using the dashboard creation canvas Configure widgets and widget interactions for dashboards Create super metrics Set up users and user groups for controlled access to your environment Extend the capabilities of vRealize Operations by adding management packs and configuring solutions Monitor the health of the vRealize Operations cluster by using self-monitoring dashboards This course provides you with the knowledge and skills to deploy a VMware vRealize Operations cluster that meets the monitoring requirements of your environment.This course includes advanced capabilities such as customizing alerts, views, reports, and dashboards and explains the deployment and architecture in vRealize Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs. Course Introduction Introduction and course logistics Course objectives Introduction to vRealize Operations List the vRealize Operations use cases Access the vRealize Operations User Interface (UI) vRealize Operations Architecture Identify the functions of components in a vRealize Operations node Identify the types of nodes and their role in a vRealize Operations cluster Outline how high availability is achieved in vRealize Operations List the components required to enable Continuous Availability (CA) Deploying vRealize Operations Design and size a vRealize Operations cluster Deploy a vRealize Operations node Install a vRealize Operations instance Describe different vRealize Operations deployment scenarios vRealize Operations Concepts Identify product UI components Create and use tags to group objects Use a custom group to group objects vRealize Operations Policies and Certificate Management Describe vRealize Operations certificates Create policies for various types of workloads Explain how policy inheritance works Capacity Optimization Define capacity planning terms Explain capacity planning models Assess the overall capacity of a data center and identify optimization recommendations What-If Scenarios and Costing in vRealize Operations Run what-if scenarios for adding workloads to a data center Discuss the types of cost drivers in vRealize Operations Assess the cost of your data center inventory Performance Optimization Introduction to performance optimization Define the business and operational intentions for a data center Automate the process of optimizing and balancing workloads in data centers Report the results of optimization potential Troubleshooting and Managing Configurations Describe the troubleshooting workbench Recognize how to troubleshoot problems by monitoring alerts Use step-by-step workflows to troubleshoot different vSphere objects Assess your environment?s compliance to standards View the configurations of vSphere objects in your environment Operating System and Application Monitoring Describe native service discovery and application monitoring features Configure application monitoring Monitor operating systems and applications by using VMware vRealize© Operations Cloud Appliance? Custom Alerts Create symptom definitions Create recommendations, actions, and notifications Create alert definitions that monitor resource demand in hosts and VMs Build and use custom views in your environment Custom Views and Reports Build and use custom views in your environment Create custom reports for presenting data about your environment Custom Dashboards Create dashboards that use predefined and custom widgets Configure widgets to interact with other widgets and other dashboards Configure the Scoreboard widget to use a metric configuration file Manage dashboards by grouping dashboards and sharing dashboards with users Super Metrics Recognize different types of super metrics Create super metrics and associate them with objects Enable super metrics in policies User Access Control Recognize how users are authorized to access objects Determine privilege priorities when a user has multiple privileges Import users and user groups from an LDAP source Extending and managing a vRealize Operations Deployment Identify available management packs in the VMware Marketplace? Monitor the health of a vRealize Operations cluster Generate a support bundle View vRealize Operations logs and audit reports Perform vRealize Operations cluster management tasks Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Operations: Install, Configure, Manage [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Operations: Install, Configure, Manage [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Business Analysts, Technical Managers, and Programmers Overview This intensive training course helps students learn the practical aspects of the R programming language. The course is supplemented by many hands-on labs which allow attendees to immediately apply their theoretical knowledge in practice. Over the past few years, R has been steadily gaining popularity with business analysts, statisticians and data scientists as a tool of choice for conducting statistical analysis of data as well as supervised and unsupervised machine learning. What is R ? What is R? ? Positioning of R in the Data Science Space ? The Legal Aspects ? Microsoft R Open ? R Integrated Development Environments ? Running R ? Running RStudio ? Getting Help ? General Notes on R Commands and Statements ? Assignment Operators ? R Core Data Structures ? Assignment Example ? R Objects and Workspace ? Printing Objects ? Arithmetic Operators ? Logical Operators ? System Date and Time ? Operations ? User-defined Functions ? Control Statements ? Conditional Execution ? Repetitive Execution ? Repetitive execution ? Built-in Functions ? Summary Introduction to Functional Programming with R ? What is Functional Programming (FP)? ? Terminology: Higher-Order Functions ? A Short List of Languages that Support FP ? Functional Programming in R ? Vector and Matrix Arithmetic ? Vector Arithmetic Example ? More Examples of FP in R ? Summary Managing Your Environment ? Getting and Setting the Working Directory ? Getting the List of Files in a Directory ? The R Home Directory ? Executing External R commands ? Loading External Scripts in RStudio ? Listing Objects in Workspace ? Removing Objects in Workspace ? Saving Your Workspace in R ? Saving Your Workspace in RStudio ? Saving Your Workspace in R GUI ? Loading Your Workspace ? Diverting Output to a File ? Batch (Unattended) Processing ? Controlling Global Options ? Summary R Type System and Structures ? The R Data Types ? System Date and Time ? Formatting Date and Time ? Using the mode() Function ? R Data Structures ? What is the Type of My Data Structure? ? Creating Vectors ? Logical Vectors ? Character Vectors ? Factorization ? Multi-Mode Vectors ? The Length of the Vector ? Getting Vector Elements ? Lists ? A List with Element Names ? Extracting List Elements ? Adding to a List ? Matrix Data Structure ? Creating Matrices ? Creating Matrices with cbind() and rbind() ? Working with Data Frames ? Matrices vs Data Frames ? A Data Frame Sample ? Creating a Data Frame ? Accessing Data Cells ? Getting Info About a Data Frame ? Selecting Columns in Data Frames ? Selecting Rows in Data Frames ? Getting a Subset of a Data Frame ? Sorting (ordering) Data in Data Frames by Attribute(s) ? Editing Data Frames ? The str() Function ? Type Conversion (Coercion) ? The summary() Function ? Checking an Object's Type ? Summary Extending R ? The Base R Packages ? Loading Packages ? What is the Difference between Package and Library? ? Extending R ? The CRAN Web Site ? Extending R in R GUI ? Extending R in RStudio ? Installing and Removing Packages from Command-Line ? Summary Read-Write and Import-Export Operations in R ? Reading Data from a File into a Vector ? Example of Reading Data from a File into A Vector ? Writing Data to a File ? Example of Writing Data to a File ? Reading Data into A Data Frame ? Writing CSV Files ? Importing Data into R ? Exporting Data from R ? Summary Statistical Computing Features in R ? Statistical Computing Features ? Descriptive Statistics ? Basic Statistical Functions ? Examples of Using Basic Statistical Functions ? Non-uniformity of a Probability Distribution ? Writing Your Own skew and kurtosis Functions ? Generating Normally Distributed Random Numbers ? Generating Uniformly Distributed Random Numbers ? Using the summary() Function ? Math Functions Used in Data Analysis ? Examples of Using Math Functions ? Correlations ? Correlation Example ? Testing Correlation Coefficient for Significance ? The cor.test() Function ? The cor.test() Example ? Regression Analysis ? Types of Regression ? Simple Linear Regression Model ? Least-Squares Method (LSM) ? LSM Assumptions ? Fitting Linear Regression Models in R ? Example of Using lm() ? Confidence Intervals for Model Parameters ? Example of Using lm() with a Data Frame ? Regression Models in Excel ? Multiple Regression Analysis ? Summary Data Manipulation and Transformation in R ? Applying Functions to Matrices and Data Frames ? The apply() Function ? Using apply() ? Using apply() with a User-Defined Function ? apply() Variants ? Using tapply() ? Adding a Column to a Data Frame ? Dropping A Column in a Data Frame ? The attach() and detach() Functions ? Sampling ? Using sample() for Generating Labels ? Set Operations ? Example of Using Set Operations ? The dplyr Package ? Object Masking (Shadowing) Considerations ? Getting More Information on dplyr in RStudio ? The search() or searchpaths() Functions ? Handling Large Data Sets in R with the data.table Package ? The fread() and fwrite() functions from the data.table Package ? Using the Data Table Structure ? Summary Data Visualization in R ? Data Visualization ? Data Visualization in R ? The ggplot2 Data Visualization Package ? Creating Bar Plots in R ? Creating Horizontal Bar Plots ? Using barplot() with Matrices ? Using barplot() with Matrices Example ? Customizing Plots ? Histograms in R ? Building Histograms with hist() ? Example of using hist() ? Pie Charts in R ? Examples of using pie() ? Generic X-Y Plotting ? Examples of the plot() function ? Dot Plots in R ? Saving Your Work ? Supported Export Options ? Plots in RStudio ? Saving a Plot as an Image ? Summary Using R Efficiently ? Object Memory Allocation Considerations ? Garbage Collection ? Finding Out About Loaded Packages ? Using the conflicts() Function ? Getting Information About the Object Source Package with the pryr Package ? Using the where() Function from the pryr Package ? Timing Your Code ? Timing Your Code with system.time() ? Timing Your Code with System.time() ? Sleeping a Program ? Handling Large Data Sets in R with the data.table Package ? Passing System-Level Parameters to R ? Summary Lab Exercises Lab 1 - Getting Started with R Lab 2 - Learning the R Type System and Structures Lab 3 - Read and Write Operations in R Lab 4 - Data Import and Export in R Lab 5 - k-Nearest Neighbors Algorithm Lab 6 - Creating Your Own Statistical Functions Lab 7 - Simple Linear Regression Lab 8 - Monte-Carlo Simulation (Method) Lab 9 - Data Processing with R Lab 10 - Using R Graphics Package Lab 11 - Using R Efficiently
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. Define Collaboration Technology and Benefits Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments Describe On-Premise Collaboration Deployments Describe Cisco's Collaboration Endpoints Describe Cisco Collaboration On-Premise Edge Solutions Describe Cisco's Collaboration On-Premise Conferencing Solutions Describe Cisco Cloud Services Administering Initial Parameters for Cisco Unified Communications Manager Understand the On-Premise Collaboration Deployment Models Describe The Cisco Unified CM Cluster Services Define Network requirements for Collaboration Define Network Services for Collaboration Navigate Cisco Unified CM Discovery 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery 2: Configure the Cisco UCM Core Systems Settings Exploring Endpoints and the Registration Process Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint Describe Power Over Ethernet Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings Discovery 4: Deploy an IP Phone Through Auto and Manual Registration Discovery 5: Administer Endpoints in Cisco Unified Communications Manager Managing Users in Cisco Unified Communications Manager Analyze Cisco UCM Users Types and Settings Describe Methods for Authenticating Cisco UCM Users Discovery 6: Create Local User Accounts Discovery 7: Adding Users in Cisco Unified Communications Manager Describing a Basic Dial Plan Describe the Concepts of a Dial Plan and Call Routing Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns Discovery 8: Create a Basic Dial Plan Describing Class of Service Explore the Concepts of Class of Control Discovery 9: Explore Partitions and Calling Search Spaces Discovery 10: Explore Private Line Automatic Ringdown (PLAR) Enabling Endpoints and Features Configure a Cisco Jabber Endpoint in Cisco UCM Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility Discovery 12: Implement Mobility Implementing Media Resources in Cisco Unified Communications Manager Media Resource Overview Media Resource Selection and Access Control Audio and Video Conference Bridge Devices Audio and Video Conference Bridge Integration Options Discovery 13: Configuring Media Resources Reporting and Maintenance Explore the Troubleshooting Process Describe Reporting and Maintenance Tools Describe the Cisco Real-Time Monitoring Tool Discovery 14: Use Reporting and maintenance Tools Describing Cisco Instant Messaging and Presence Describe Cisco IM and Presence Features and Architecture Clustering Describe Cisco IM and Presence Components and Communication Flows Enabling Jabber Cisco Jabber Deployment Modes Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows Configure Unity Connection Integration Overview of Cisco Unity Connection Integration SIP Integration Typical Integration Mistakes Integration Considerations Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM Discovery 17: Configure Voicemail Users Configuring Cisco Unity Connection Call Handlers Call handler Overview System Call Handler Caller Input Operator Call Handler Goodbye Call Handler Directory Handler Interview Handler Troubleshooting Cisco Unity Connection Overview of Cisco Unity Connection Troubleshooting Options Integration Troubleshooting Tools Cisco Real-Time Monitoring Tool Discovery 18: Troubleshoot Cisco Unity Connection Additional course details: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level Java programming course, designed for experienced developers who wish to get up and running with Java, or who need to reinforce sound Java coding practices, immediately. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand not only the fundamentals of the Java language, but also its importance, uses, strengths and weaknesses Understand the basics of the Java language and how it relates to OO programming and the Object Model Learn to use Java exception handling features Work with the Modular system (Project Jigsaw) Understand and use classes, inheritance and polymorphism Understand and use collections, generics, autoboxing, and enumerations Process large amount of data using Lambda expressions and the Stream API Abstract, static and private methods in interfaces Take advantage of the Java tooling that is available with the programming environment being used in the class Specific Java 11 features covered: Using the Local Variable Type in Lambda expressions; Updates made to the String AP Time Permitting: Quick look ahead - Java 12, Java 13, Java 14 and Beyond If you're an experienced OO developer (coming from a C# or C++ background, etc.) who needs to transition to programming in Java, this fast-paced, hands-on course will get you there quickly. Fast Track to Java Programming for OO Experienced Developers is a four-day, lab-intensive class where you'll quickly be immersed in working with the latest Java 11 programming techniques, using best practices for writing solid, robust (and well-written!) modern object-oriented applications. In addition to learning excellent, current coding skills in Java, you'll explore the new improved features for better performance and new capabilities for addressing rapid application development that Java 11 brings to the table. This course includes several key aspects that were introduced in Java 9, Java 10, and Java 11 including the Java Modular System, Local Variable Type Inference, and several API updates. This course also includes a Quick Look at what?s next in Java ? Java 12, Java 13, Java 14 and beyond. The Java Platform Java Platforms Lifecycle of a Java Program Responsibilities of JVM Documentation and Code Reuse Using the JDK Setting Up Environment Locating Class Files Compiling Package Classes Source and Class Files Java Applications The Eclipse Paradigm Workbench and Workspace Views Editors Perspectives Projects Writing a Simple Class Classes in Java Class Modifiers and Types Class Instance Variables Primitives vs. Object References Creating Objects Adding Methods to the Class Passing Parameters into Methods Returning a Value from a Method Overloaded Methods Constructors Optimizing Constructor Usage Language Statements Operators Comparison and Logical Operators Looping Continue and Break Statements The switch Statement The for-each() Loop Using Strings Create an instance of the String class Test if two strings are equal Get the length of a string Parse a string for its token components Perform a case-insensitive equality test Build up a string using StringBuffer Contrast String, StringBuffer, and StringBuilder Specializing in a Subclass Extending a Class Casting The Object Class Default Constructor Implicit Constructor Chaining Fields and Variables Instance vs. Local Variables: Usage Differences Data Types Default Values Block Scoping Rules Final and Static Fields Static Methods Using Arrays Arrays Accessing the Array Multidimensional Arrays Copying Arrays Variable Arguments Local-Variable Type Inference Type inference Infering Types of Local Variables The var Reserved Type name Benefits of Using var Backward Compatibility Java Packages and Visibility Class Location of Packages The Package Keyword Importing Classes Executing Programs Visibility in the Modular System Java Naming Conventions Inheritance and Polymorphism Polymorphism: The Subclasses Upcasting vs. Downcasting Calling Superclass Methods from Subclass The final Keyword Interfaces and Abstract Classes Separating Capability from Implementation Abstract Classes Implementing an Interface Abstract Classes vs. Interfaces Introduction to Exception Handling Exception Architecture Throwing Exceptions Checked vs. Unchecked Exceptions Exceptions Handling Multiple Exceptions Automatic Closure of Resources Creating Your Own Exceptions Utility Classes Wrapper Classes Autoboxing/Unboxing Enumeration Syntax Using Static imports Introduction to Generics Generics and Subtyping Bounded Wildcards Generic Methods Legacy Calls to Generics When Generics Should Be Used Lambda Expressions and Functional Interface Lambda Expression Syntax Functional Interfaces Type Inference in Java 8 Method references Collections Characterizing Collections Collection Interface Hierarchy The Set, List and Queue Interfaces Map Interfaces Using Collections Collection Sorting Comparators Using the Right Collection Lambda expressions in Collections Streams Processing Collections of data The Stream interface Reduction and Parallelism Filtering collection data Sorting Collection data Map collection data Find elements in Stream Numeric Streams Create infinite Streams Sources for using Streams Collectors Creating Collections from a Stream Group elements in the Stream Multi-level grouping of elements Partitioning Streams Introduction to the Module System Introduce Project Jigsaw Classpath and Encapsulation The JDK internal APIs Java 9 Platform modules Defining application modules Define module dependencies Implicit dependencies Implied Readability Exporting packages Java Date/Time The Date and Calendar classes Introduce the new Date/Time API LocalDate, LocalDateTime, etc. Formatting Dates Working with time zones Manipulate date/time values Java 12 and beyond Provide an overview of changes since Java 11 Introduce Preview Features Records (Java 14) Switch Expressions (Java 12, Java 13, Java 14) Text Blocks (Java 13, Java 14) Helpful NullPointerExceptions (Java 14) Pattern Matching for instanceof (Java 14) Additional course details: Nexus Humans Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett