Duration 4 Days 24 CPD hours This course is intended for Systems engineers Network engineers Field engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the key concepts of segment routing Implement and verify IGP segment routing Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing Implement and verify TI-LFA segment routing Instantiate segment routing policies Instantiate multidomain segment routing policies Configure and verify BGP prefix segments and SR-based services The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP). Introduction to Segment Routing Examining Unified Fabric Routing Exploring Segment Routing Concepts Examining Segment Types Examining the Segment Routing Global Block (SRGB) IGP Segment Routing Implementation and Verification Examining the IGP Control Plane Examining SRGB and IGP Interactions Examining Prefix and Adjacency SIDs Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area Configuring and Verifying IS-IS SR Operation Configuring and Verifying OSPF SR Operation Segment Routing and LDP Interworking SR and LDP Interworking Data Plane Mapping Server Function and Configuration Interworking Deployment Models Topology Independent ? Loop Free Alternate Examining Classic LFA Examining TI-LFA Fundamentals Implementing and Verifying TI-LFA for SR Traffic Implementing and Verifying SR TI-LFA for LDP Traffic TI-LFA and SR LDP Interworking Segment Routing Policies ? Traffic Engineering (SR-TE) Exploring SR Policies Introducing the Anycast and Binding SIDs Enabling and Verifying SR Policies Instantiating SR Policies Instantiating SR Policies using BGP Dynamic Multidomain SR Policies Configuring and Verifying a Path Computation Element (PCE) Configuring and Verifying BGP Link-State (LS) Configuring Multidomain SR Policies with a PCE Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) Segment Routing?Based Services Examining the BGP Prefix-SID Operation Configuring and Verifying the BGP Prefix SID Examining Egress Peer Engineering Examining the BGP Prefix-SID Operation SR Flexible Algorithm and Performance Measurement (PM) Delay SR-Enabled VPNs
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for z/OS system programmers, z/OS performance analysts, and z/OS performance administrators new to performance management for their z/OS system.Note: ES54 is intended for individuals new to WLM and the z/OS performance area Overview The objectives for this course are as follows:Describe a performance and tuning methodologyDevelop a systematic z/OS performance and tuning planDescribe the factors which could affect the performance of an z/OS systemUse the WLM ISPF applicationDescribe the components of a service definitionDefine workloads and service levels and classification rulesState which z/OS commands affect WLM operationIdentify the major WLM services for z/OS, including enclaves and application environments, and how they are used by DB2, WebSphere, and CICSAnalyze CPU performance when running in a shared LPAR environmentUtilize and monitor zIIP and zAAP specialty enginesMeasure and tune z/OS DASD, processor storage, and coupling facility configurationsExplain the functions and facilities of RMF and SMFAnalyze performance bottlenecks using RMFUse Workload License Charges (WLC), defined capacity and soft capping to manage software costsDescribe advanced z/OS environments that utilize Intelligent Resource Director (IRD), HiperDispatch, z/OSMF Workload Management, and I/O Priority ManagerUse the z/OSMF Workload Management (WLM) taskUse Performance Monitoring with z/OSMFModify a WLM service definition to meet the requirements for monitoring a specific system workloadCreate and customize Monitoring DesktopsReview any issues by using the Monitoring Desktops options displaysAssess the performance of the workloads running on the z/OS This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM. Day 1 Welcome Unit 1 - Tuning methodology Unit 2 - Using SMF and RMF to monitor performance Lab 1 - Introduction to your system Lab 2 - Using RMF Monitor I and Monitor II Day 2 Unit 3 - Performance impacts when running in a shared LPAR environment Unit 4 - Basic system workload management (part 1) Lab 3 - Implementing a WLM environment on z/OS (part 1) Day 3 Unit 4 - Basic system workload management (part 2) Lab 3 - Implementing a WLM environment on z/OS (part 2) Day 4 Unit 5 - WLM commands, internals, and service Lab 4 - Using RMF Monitor III to solve performance problems Day 5 Unit 6 - z/OS DASD performance topics Unit 7 - Tuning processor storage Unit 8 - Miscellaneous performance topics Lab 5 - z/OSMF and performance management
Duration 3 Days 18 CPD hours This course is intended for Technical professionals who support, install, deploy or administer Check Point Software Blades. Overview Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.Describe the key elements of Check Point?s unified Security Management Architecture.Recognize SmartConsole features, functions and tools.Understand Check Point deployment options.Describe the basic functions of Gaia.Describe the essential elements of a Security Policy.Understand how traffic inspection takes place in a unified Security Policy.Summarize how administration roles and permissions assist in managing policy.Recall how to implement backup techniques.Understand the Check Point policy layer concept.Recognize Check Point security solutions and products and how they work to protect your network.Understand licensing and contract requirements for Check Point security products.Identify tools designed to monitor data, determine threats and recognize performance improvements.Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.Understand Site-to-Site and Remote Access VPN deployments and communities.Understand how to analyze and interpret VPN traffic.Recognize how to define users and user groups.Understand how to manage user access for internal and external users.Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. Introduction to Check Point Technology Security Policy Management Policy Layers Check Point Security Solutions and Licensing Traffic Visibility Basic Concepts of VPNManaging User Access Working with ClusterXLAdministrator Task Implementation Additional course details: Nexus Humans Check Point Cyber Security Administrator (CCSA R80.10) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Check Point Cyber Security Administrator (CCSA R80.10) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, and Business Process Owners/Team Leads/Power Users. In this course, students are enabled to transform Excel workbooks into captivating dashboards for executives and business users. Introduction to Dashboards Creating Interactive Dashboards Using an Embedded Excel Workbook in the Dashboard Data Visualizations with Charts Using Data in a Range Using Data in a Series Preparing Future Data by Ignoring End Blanks Dashboard Distribution Distributing a Dashboard Single Value Components Using Single Value Components Alerts Setting Up Alerts Selectors Using Selectors Setting Default Values for Selectors Selecting Multiple Items Common Components Using Images in a Dashboard Using Tables in a Dashboard Using an Interactive Calendar in a Dashboard Adding a URL to a Dashboard Components Used as Selectors Using the Chart Component as a Selector Using the Map Component as a Selector Format Options Configuring Proportional Size and Position Using Themes to Apply Formats Using Templates to Apply Formats Applying Globalization Dynamic Visability Adding Dynamic Visibility Using Formulas to Create Dynamic Visibility Creating Multi-Layer Dashboards Dashboard Design Optimization Optimizing Dashboard Design Dashboard Connection to Live Data Using Live Data Sources Setting Up an XML Connection Using Web Services to Connect to Data Using the Query Browser to Connect to Data Using the Portal Data Connection to Connect to Data Additional course details: Nexus Humans BOX310 SAP BusinessObjects Dashboards 4.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOX310 SAP BusinessObjects Dashboards 4.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for If you want to advance from being a front-end developer to a full-stack developer and learn how Node.js can be used for hosting full-stack applications, this course is for you. Knowledge of JavaScript's basic syntax and experience with popular front-end libraries such as jQuery is required. You should also have used JavaScript with HTML and CSS, but not necessarily Node.js. Overview By the end of this course, you'll have the skills you need to tackle any real-world JavaScript development problem using a modern JavaScript approach, both for client and server sides.After completing this course, you will be able to: Apply the core concepts of functional programming Build a Node.js project that uses the Express.js library to host an API Create unit tests for a Node.js project to validate it Use the Cheerio library with Node.js to create a basic web scraper Develop a React interface to build processing flows Use callbacks as a basic way to bring control back This is your one-stop solution to mastering modern JavaScript. This course covers the latest features of JavaScript and advanced concepts, such as modularity, testing, and asynchronous programming. By the end of the course, you?ll know how to create a full-stack JavaScript application using NodeJS and how to use JavaScript in functional programming. JavaScript, HTML, and the DOM HTML and the DOM Developer Tools Node.js and npm What is Node.js? Node Version Manager (nvm) Node Package Manager (npm) Node.js APIs and Web Scraping Globals FileSystem APIs HTTP APIs What is Scraping? RESTful APIs with Node.js What is an API? What is REST? Useful Defaults and Easy Inputs Middleware The Contents of a JWT MongoDB Modular JavaScript ES6 Modules Object-Oriented Programming (OOP) npm Package? Code Quality Clear Naming Unit Tests Integration Tests End-to-End Testing Puppeteer Advanced JavaScript Language Features Supported in ES5, ES6, ES7, ES8, and ES9 OOP in JavaScript Sorting Maps and Sets Math, Date, and String Symbols, Iterators, Generators, and Proxies Asynchronous Programming Callback Hell Async and Await Event-Driven Programming and Built-In Modules Eventing Node.js Built-In Modules Handling Large Files in Node.js Functional Programming with JavaScript Functions ? First-Class Citizens Pure Functions Higher-Order Functions Function Composition Immutability and Side Effects Introduction to GraphQL Language Schemas and Queries
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer In this 3 Day Cisco Course, students will learn how to deploy Voice Gateways/CUBE and setup Cisco Unified Communication Manager (CUCM) to deploy SIP Trunking. The course starts out with an overview of Cisco gateways and their uses. Next, students learn about MGCP and SIP and how to implement each protocol. Students will then learn how to use Cisco CUBE to connect CUCM, Gateways and Service Providers together. This course details how to connect a Cisco environment to a Service Provider using a Cisco CUBE. Introduction to Voice Gateways Cisco UC Networks and the Role of Gateways Gateway Call Routing and Call Legs Configuring Gateway Voice Ports DSP Functionality, Codecs, and Codec Complexity Router Requirements for CUBE SIP Protocol Overview Gateway Dial Plans VoIP Call Legs Dial Plan Implementation Configuring (CUCM) Cisco Unified Communication Manager 12.5 Cisco UCM Audio Codec Preference List Cisco UCM Region Configuration Device Pool Configuration Annunciator Configuration Conference Bridge Configuration Media Termination Point Configuration Music on Hold Server Configuration Music on Hold Service (IP Voice Media Streaming App) Parameter Settings Music on Hold Service (Duplex Streaming) Parameter Settings Media Resource Group Configuration Media Resource Group List Configuration UC Service Configuration Service Profile Configuration End User Configuration SIP Trunk Security Profile Configuration used by SIP trunk to Cisco UBE SIP Profile Configuration used by SIP trunk to Cisco UBE SIP Trunk to Cisco UBE Configuration Route Pattern Configuration Configuring Cisco Unified Border Element (CUBE) Deploying Cisco VCUBE CUCM to CUBE Integration Configuration Steps to connecting to a SIP Trunk Provider Interworking Security and Call Admission Control Media Manipulation, Enhancement & Optimization SIP UA Translation Rules VoIP Dial Peer SIP Registration SIP attributes of CUBE Transcoding services Creating and configuring Sip Trunks CUBE Configuration CUBE Call Flow CUBE Dial-Peers Call Routing CUBE Advanced Call Routing Media Manipulation External/PSTN Call Recording Call Admission Control Multiple Non-Authenticated SIP Trunks on a CUBE Multiple Authenticated/Registered SIP Trunks on a CUBE Configuring High Availability High availability on ISR G2 High availability on ISR 4k High availability on ASR Cisco Unified Border Element (CUBE) Security Five Layers of Security in CUBE SIP TLS Support with SRTP Monitoring and Troubleshooting Cisco CUBE Dialed Number Analyzer (DNA) for CUBE SIP Profile Test Tool Troubleshooting Serviceability
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting
Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Application developers, Cloud Solutions Architects, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview At the end of the course, students will be able to: Understand container basics. Containerize an existing application. Understand Kubernetes concepts and principles. Deploy applications to Kubernetes using the CLI. Set up a continuous delivery pipeline using Jenkins Learn to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those workloads to handle increased traffic. Students will also learn how to continuously deploy new code in a Kubernetes cluster to provide application updates. Introduction to Containers and Docker Acquaint yourself with containers, Docker, and the Google Container Registry. Create a container. Package a container using Docker. Store a container image in Google Container Registry. Launch a Docker container. Kubernetes Basics Deploy an application with microservices in a Kubernetes cluster. Provision a complete Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl. Break an application into microservices using Kubernetes? Deployments and Services. Deploying to Kubernetes Create and manage Kubernetes deployments. Create a Kubernetes deployment. Trigger, pause, resume, and rollback updates. Understand and build canary deployments. Continuous Deployment with Jenkins Build a continuous delivery pipeline. Provision Jenkins in your Kubernetes cluster. Create a Jenkins pipeline. Implement a canary deployment using Jenkins. Additional course details: Nexus Humans Getting Started with Google Kubernetes Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with Google Kubernetes Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.