Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 1 Days 6 CPD hours This course is intended for This basic course is for: Business Analyst Systems Engineer Software Engineer Requirements Engineer Requirements Manager Requirements Team Leader Overview Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data This course builds on the content learned in the IBM Engineering Requirements Management DOORS V9.6 Foundation course. It is designed for those who will be in the role of team lead or project manager, or who want to learn more about advanced DOORS end-user functionality. It discusses creating and structuring DOORS projects, defining linking relationships and attributes, setting access permissions, and managing change. It also discusses external linking, working with spreadsheets, and applying configuration management strategies to DOORS data. Course Outline Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data
Duration 5 Days 30 CPD hours This course is intended for Administrator Architect Database Administrator Overview To provide an acceptable response time to users and manage resources effectively, you learn how to monitor performance and manage resources within the multitenant container database and its pluggable databases, and within each pluggable database. Another important aspect is the data movement between non-CDBs and pluggable databases, and between pluggable databases. It is also important to understand the procedures of upgrading an Oracle Database multitenant container database or an Oracle Database pluggable database. Finally, students discover the way multitenant container database and pluggable databases are created and monitored in the Cloud. This course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database and its regular and application pluggable databases. You learn why and how to create and manage a multitenant container database and its regular and application pluggable databases, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged pluggable databases in multitenant container databases using various methods. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods
Duration 2 Days 12 CPD hours This course is intended for This course is geared toward development, engineering, and operations staff. Students in this class should have some familiarity and comfort with the following: 1. Writing code (of just about any flavor) in a text editor 2. Working on the command line 3. Basic system administration ? installing packages, configuring those packages, starting service Overview Get started with Chef by taking Chef Essentials. It?s a two-day instructor-led course that covers all the basics. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your servers. You?ll also learn about Chef Architecture and the set of tools included in the Chef Development Kit (ChefDK). Each of the core units includes hands-on exercises that will give you confidence in your new skills. At the end of the course, you?ll come away with a repo and the skills to start automating your own infrastructure. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your Windows servers. IntroductionResourcesCookbooksOhaiTemplatesLabWorkstation installationSigning up for Managed ChefThe Chef serverCommunity cookbooksManaging multiple nodesRolesSearchEnvironmentsFurther resources
Duration 2 Days 12 CPD hours This course is intended for Enterprise network system installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Identify the various network elements of the Cisco SD-WAN solution. Deploy WAN Edge routers. Create templates to aid in the deployment and operation of the Cisco SD-WAN network. Configure and verify Cisco SD-WAN overlay routing. Create simple policies to control traffic flow through the Cisco SD-WAN fabric. The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco© Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.The course will allow you to earn 16 Continuing Education (CE) credits toward recertification. Course Outline Cisco SD-WAN Solution Components Cisco SD-WAN Network Deployment Cisco SD-WAN Configuration Management Cisco SD-WAN Overlay Routing Cisco SD-WAN Policies
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate level course for students that will perform Database Administration tasks, who plan, implement, and maintain D22 11.1 databases. Overview These skills can be developed by taking: DB2 SQL Workshop DB2 Fundamentals This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database. Overview of Db2 11.1Db2 Command Line Processor (CLP) and GUI toolsThe Db2 database manager instanceCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryDatabase Maintenance, Monitoring and Problem DeterminationLocking and concurrencySecurity
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for business professionals in any functional role who need to participate in Zoom meetings and webinars, and who may also be called on to host Zoom events. Overview In this course, you will participate in and host Zoom meetings to collaborate with others. You will: Use Zoom as a meeting participant. Use Zoom to host meetings. Customize Zoom settings. Manage Zoom contacts. With people transitioning to working remotely, virtual meetings have become the norm and, as a result, the Zoom video conferencing tool is gaining attention and usage. If Zoom has become part of your professional or personal life, this course will help you be a more confident and productive Zoom user. In this course, you will participate in and host Zoom meetings, use Zoom productivity tools such as breakout rooms and contacts, and apply Zoom security and personalization. Using Zoom as a Meeting Participant Topic A: Join a Zoom Meeting Topic B: Participate in a Zoom Meeting Topic C: Collaborate in a Meeting Using Zoom to Host Meetings Topic A: Schedule a Meeting Topic B: Host a Meeting Topic C: Use Breakout Rooms Topic D: Compare Meetings and Webinars Customizing Zoom Topic A: Customize Settings in the Zoom Web Portal Topic B: Customize Zoom Desktop Client Settings Managing Zoom Contacts Topic A: Add Zoom Contacts Topic B: Chat with Zoom Contacts
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner will be able to meet these overall objectives: These are the ones listed in the Objectives Table I put together: Identify the basic components and operations of the Unified CCE solution. Use the available UCCE tools to complete a basic UCCE system installation. Discuss the installation and configuration steps required to support agent functionality in a UCCE deployment. Install a basic CCE VXML Solution. Install, configure and run a CCE Outbound Option Campaign. Describe how to support CCE. Deploying Cisco Unified Contact Center Enterprise (DUCCE) v2.0 is a 5-day instructor-led course presented by training partners. The course allows learners to deploy the Unified CCE v10.0 solution including installation, deploying HA and using troubleshooting tools to identify issues with inbound and outbound Contact Center functionality. This course is intended for those installing the Unified CCE solution, or those providing Level 3 solution support. This course also serves as a foundation for the two corresponding UCCE Administration courses, but is not a prerequisite. Students will learn enough about CCE scripting in this course to ensure system functionality only. A separate course exists for advanced scripting. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: Preparing UCCE for Basic IVR Scripting Module 3: Preparing UCCE for Basic Agent Functionality Module 4: Installing and Configuring CCE VXML Solution Module 5: Installing CCE Outbound Option Module 6: Supporting CCE