Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication⢠functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager protection groups based on vSphere Replication Build, edit, execute, test, and remove a recovery plan Perform a planned migration Perform reprotect and failback using Site Recovery Manager and vSphere Replication This hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.2. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Outline the necessary information to effectively undertake this course Identify resources for additional information Overview and Architecture Discuss Site Recovery Manager architecture Examine disaster recovery options with Site Recovery Manager Describe Site Recovery Manager integration with VMware vSphere© ClientTM Discuss Site Recovery Manager features Analyze Site Recovery Manager storage policies and integration options Discuss how Site Recovery Manager supports several disaster recovery topologies identify use cases for Site Recovery Manager across various scenarios Describe how VMware Site Recovery? for VMware Cloud? on AWS integrates with Site Recovery Manager. Deploy & Configure Site Recovery Manager Identify the requirements to deploy Site Recovery Manager Discuss the benefits of the Site Recovery Manager appliance Explore vSphere deployment models Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration user interface Describe the process to register Site Recovery Manager with VMware vCenter Server© Configure site pairing Identify how to perform updates to the Site Recovery Manager appliance Configuring Inventory Mappings Outline the importance of inventory mappings Examine configuration options for inventory mappings Outline the importance of placeholders Using Array-based Replication Describe array-based replication Discuss the role of the Storage Replication Adapter (SRA) Explore the relationship between devices, consistency groups and datastore groups Configure array pairs vSphere Replication Explore vSphere Replication architecture Examine vSphere Replication functionality Formulate use cases for vSphere Replication Deploy a vSphere Replication appliance Configure vSphere Replication appliance settings Configure a vSphere Replication appliance connection Deploy a vSphere Replication server Register a vSphere Replication server Replicating Virtual Machines with vSphere Replication Configure vSphere Replication for virtual machines Explain the importance of datastore mappings Describe vSphere Replication recovery point objective scheduling Describe the vSphere Replication disk transfer protocol Building Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and storage profile protection groups Create a protection group Discuss protection group settings Remove protection from a virtual machine Create a storage profile protection group Building Recovery Plans Discuss recovery plan concepts List recovery plan steps Discuss network planning Discuss customization options in recovery planning Outline how to implement a recovery plan Investigate recovery plan options Testing and Running a Recovery Plan Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Discuss the importance of VMware vSphere© VMFS resignaturing Examine Site Recovery Manager integration with various vSphere technologies Outline how to conduct a recovery plan test Perform recovery plan test execution Identify the effects on the storage layer during recovery steps Explain a recovery plan execution in planned migration or disaster recovery mode Understand storage layer changes for plan execution types Identify the recovery steps for each execution type Describe how to reprotect a data center Examine failback steps Monitoring and Troubleshooting Discuss Site Recovery Manager alarms Explore Site Recovery Manager history reports Configuring advanced Site Recovery Manager settings Describe how to modify logging levels Explain how to collect log bundles Identify key log locations
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: DevOps engineers DevOps architects Operations engineers System administrators Developers Overview In this course, you will learn to: Use DevOps best practices to develop, deliver, and maintain applications and services at high velocity on AWS List the advantages, roles and responsibilities of small autonomous DevOps teams Design and implement an infrastructure on AWS that supports DevOps development projects Leverage AWS Cloud9 to write, run and debug your code Deploy various environments with AWS CloudFormation Host secure, highly scalable, and private Git repositories with AWS CodeCommit Integrate Git repositories into CI/CD pipelines Automate build, test, and packaging code with AWS CodeBuild Securely store and leverage Docker images and integrate them into your CI/CD pipelines Build CI/CD pipelines to deploy applications on Amazon EC2, serverless applications, and container-based applications Implement common deployment strategies such as 'all at once,' 'rolling,' and 'blue/green' Integrate testing and security into CI/CD pipelines Monitor applications and environments using AWS tools and technologies DevOps Engineering on AWS teaches you how to use the combination of DevOps cultural philosophies, practices, and tools to increase your organization?s ability to develop, deliver, and maintain applications and services at high velocity on AWS. This course covers Continuous Integration (CI), Continuous Delivery (CD), infrastructure as code, microservices, monitoring and logging, and communication and collaboration. Hands-on labs give you experience building and deploying AWS CloudFormation templates and CI/CD pipelines that build and deploy applications on Amazon Elastic Compute Cloud (Amazon EC2), serverless applications, and container-based applications. Labs for multi-pipeline workflows and pipelines that deploy to multiple environments are also included. Module 0: Course overview Course objective Suggested prerequisites Course overview breakdown Module 1: Introduction to DevOps What is DevOps? The Amazon journey to DevOps Foundations for DevOps Module 2: Infrastructure automation Introduction to Infrastructure Automation Diving into the AWS CloudFormation template Modifying an AWS CloudFormation template Demonstration: AWS CloudFormation template structure, parameters, stacks, updates, importing resources, and drift detection Module 3: AWS toolkits Configuring the AWS CLI AWS Software Development Kits (AWS SDKs) AWS SAM CLI AWS Cloud Development Kit (AWS CDK) AWS Cloud9 Demonstration: AWS CLI and AWS CDK Hands-on lab: Using AWS CloudFormation to provision and manage a basic infrastructure Module 4: Continuous integration and continuous delivery (CI/CD) with development tools CI/CD Pipeline and Dev Tools Demonstration: CI/CD pipeline displaying some actions from AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS CodePipeline Hands-on lab: Deploying an application to an EC2 fleet using AWS CodeDeploy AWS CodePipeline Demonstration: AWS integration with Jenkins Hands-on lab: Automating code deployments using AWS CodePipeline Module 5: Introduction to Microservices Introduction to Microservices Module 6: DevOps and containers Deploying applications with Docker Amazon Elastic Container Service and AWS Fargate Amazon Elastic Container Registry and Amazon Elastic Kubernetes service Demonstration: CI/CD pipeline deployment in a containerized application Module 7: DevOps and serverless computing AWS Lambda and AWS Fargate AWS Serverless Application Repository and AWS SAM AWS Step Functions Demonstration: AWS Lambda and characteristics Demonstration: AWS SAM quick start in AWS Cloud9 Hands-on lab: Deploying a serverless application using AWS Serverless Application Model (AWS SAM) and a CI/CD Pipeline Module 8: Deployment strategies Continuous Deployment Deployments with AWS Services Module 9: Automated testing Introduction to testing Tests: Unit, integration, fault tolerance, load, and synthetic Product and service integrations Module 10: Security automation Introduction to DevSecOps Security of the Pipeline Security in the Pipeline Threat Detection Tools Demonstration: AWS Security Hub, Amazon GuardDuty, AWS Config, and Amazon Inspector Module 11: Configuration management Introduction to the configuration management process AWS services and tooling for configuration management Hands-on lab: Performing blue/green deployments with CI/CD pipelines and Amazon Elastic Container Service (Amazon ECS) Module 12: Observability Introduction to observability AWS tools to assist with observability Hands-on lab: Using AWS DevOps tools for CI/CD pipeline automations Module 13: Reference architecture (Optional module) Reference architectures Module 14: Course summary Components of DevOps practice CI/CD pipeline review AWS Certification
Duration 3 Days 18 CPD hours This course is intended for Team leaders, managers, executives, and other business and IT professionals who lead others as well as Individual contributors ready for transformational self-development as a leader. Overview Recognize vulnerability as the emotion we feel during times of uncertainty, risk, and emotional exposure. Explain why courage requires vulnerability. Establish a link between what I learned and behaviors I want to change. Recognize the critical role that self-awareness plays in daring leadership. Give examples to support how armor - not fear -is the greatest obstacle to daring leadership. Identify the four skill sets that make up courage: rumbling with vulnerability, living into our values, BRAVING trust, and learning to rise. Recognize that courage is a collection of four skill sets that are measurable, observable, and teachable. Recognize that vulnerability is the birthplace of many of the behaviors that define daring leadership, including creativity, accountability, and difficult conversations. Give examples of why daring leadership requires showing up for hard conversations and rumbles, including giving and receiving feedback. This workshop is all about your own leadership self-awareness, identifying your call to courage as a leader and the learning, practice and integration of the four courage skills sets so you can show up authentically in life and leadership. Dare to Lead? is the ultimate playbook for developing brave leaders and courageous cultures. The greatest barrier to daring leadership is not fear; the greatest obstacle is armor ? how we self-protect when we feel uncertainty, risk and emotional exposure. Learn the skills to move from armored leadership to daring leadership. Daring leaders are self-aware, know how to have hard conversations, hold themselves and others accountable, build trust, lead with empathy and connection, take smart risks that lead to innovation, reset quickly after disappointments and setbacks, and give and receive feedback. This interactive curriculum is delivered in five, half-day sessions and is based on the research by Brenâ Brown. This course comes with a PDF workbook and an Amazon gift card to purchase the Dare to Lead? book in the version of your choice. You also have access to a series of leadership and personal development assessments and exclusive training videos led by Dr. Brenâ Brown. At the end of the event, a digital badge is awarded to those who complete 24 hours of course content. The Heart of Daring Leadership Permission Slips Container Building Armored Leadership versus Daring Leadership Call to Courage Assembling Our Armor Building Grounded Confidence to Replace our Armor Aplying the 5Cs Self-Awareness & Emotional Literacy Developing Emotional Literacy Getting Curious About Emotions Exploring the Iceberg The Myths of Vulnerability Rumbling with Vulnerability The Six Myths of Vulnerability Exploring Your Arena Shame Resilience Shame 101 Defining Shame The Physiology of Shame Shame Shields How Shame Shows Up in Organizations How Shame Shows up at Work Empathy and Self-Compassion Attributes of Empathy What Does Empathy Look Like? Empathy Misses Comparative Suffering Self-Compassion Talk to Yourself the Way You Talk to Someone You Love Empathy & Self-Compassion Commitment Supplemental Exercise: Kristin Neff?s Self-Compassion Scale Supplemental Exercise: Putting Empathy, Curiosity, and Rumble Tools in Action Living Into Our Values Living Into Our Values Values Clarification Taking Values from Professing Words to Practicing Behaviors Grounded Confidence and Rumbling Skills Grounded Confidence and Rumbling Skills Rumble Starters The 5Cs of Strategic Thinking, Decision Making, and Delegation Using the 5Cs Supplemental Exercise ? Gritty Faith & Gritty Facts Supplemental Exercise ? Horizon Conflict Engaged Feedback Giving Engaged Feedback Recognizing Defensiveness in Feedback Conversations BRAVING Trust BRAVING Trust Square Squad Rumbling with Self-Trust Trust with Others Trust on Teams Rumbling with Living BIG Learning to Rise: The Reckoning Learning to Rise: The Rising Strong Process The Rising Strong Process Getting Emotionally Hooked Offloading Hurt: Barriers to Reckoning with Emotion Strategies for Reckoning with Emotion The Rumble and The Revolution Writing My SFD The Delta The Revolution: When the Process Becomes a Daily Practice Supplemental Exercise ? Reset and Resilience Practices Integration Dare to Lead Integration Plan
Duration 45.625 Days 273.75 CPD hours Overview Live, instructor-led virtual classes: Benefit from an interactive classroom with added flexibility and convenience. Access to Red Hat certified instructors: Virtual classes are taught by the same experienced subject matter experts who lead classroom trainings. Flexible scheduling options: Various class topics and time options facilitate incorporating learning and preferences into busy schedules. Focused training sessions: Participants can narrow their learning to more specific topic areas. Choice of learning modality: A combination of self-paced materials and expert-taught classes maximizes learning. Train without traveling: Learn when, where, and how it is best for you Red Hat© Learning Subscription Premium provides a customizable learning experience with self-paced and live training options. Users can tailor their learning with recorded video classes, e-books, online content, and live virtual classes. A subscription provides access to content across the entire Red Hat product portfolio, content that is continuously updated by Red Hat experts. Live, instructor-led classes create an engaging, immersive learning experience. These interactive sessions compliment the on-demand, self-paced learning materials available with a Red Hat Learning Subscription for highly effective, flexible training for everyone from beginners to experienced professionals.This subscription provides an array of additional features to complement the learning experience. Cloud-based labs give the opportunity for hands-on practice in actual Red Hat environments. Expert extras are short, on-demand videos where Red Hat practitioners demonstrate innovative technologies in practical scenarios. Skills paths and pre-assessments are available for course selection guidance. Red Hat Learning Subscription Premium also includes certification exams. Red Hat?s exams are industry-recognized and performance-based. These exams validate that holders have the skills needed to undertake even the most ambitious technology projects. Reporting capabilities to track progress toward training and certification goals. 24x7 self-paced access to Red Hat online training and video classroom courses Content is created by Red Hat experts who build and use Red Hat technology and is directly related to Red Hat certification exams. Early access Be the first to explore in-development technology before it is officially released by accessing courses and labs in development. Cloud-based labs Get hands-on practice in authentic Red Hat environments, delivered 24x7 on six continents. Skills paths Map your learning and certification goals to one of the skills paths inside the platform to develop a strong foundation for a specific skill set. Certification exams and retakes Validate your skills through performance-based exams remotely or at a testing station. Exams can be taken when and where it's most convenient. Expert extras Red Hat field practitioners present short demo videos to supplement courses by showing innovative technologies and practices based on actual use cases. Expert chat Get direct answers and guidance from curriculum experts via a 30-minute chat session per day. Machine translations provide chat dialogue in local languages. E-book Downloads Download course e-books to continue learning offline. Reporting An individual?s dashboard provides a summary of training progress, courses and labs taken, and exam status. Management reports provide insights so a team?s engagement and progress can be measured. Globally available,translated content Access Red Hat?s most popular courses in as many as 11 languages: English, International Spanish, Brazilian Portuguese, French, Italian, German, Simplified Chinese, Korean, Japanese, Hindi, and Czech. Additional course details: Nexus Humans Red Hat Learning Subscription Premium training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Learning Subscription Premium course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network engineer Systems engineer Wireless engineer Consulting systems engineer Technical solutions architect Network administrator Wireless design engineer Network manager Sales engineer Account manager Overview Upon completing this course, the learner will be able to meet these overall objectives: Get familiar with different API styles (REST, RPC) and synchronous and asynchronous API requests Learn how to use Postman software development tool in order to test the API calls Learn how to automate repetitive tasks using Ansible automation engine Explore a Python programming language, Python libraries and Python virtual environments and learn how can they be used for automation of network configuration tasks Get introduced to GIT version control system and its common operations Learn how to leverage the various models and APIs of the Cisco IOS XE platform to perform day-zero operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python Learn about the paradigm shift of model-driven telemetry and the building blocks of a working solution Learn how to leverage the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center⢠Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman Understand Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure Learn how to leverage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and Postman Implementing Automation for Cisco Enterprise Solutions (ENAUI) v.1.2 teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools. This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification. This course will help you:Gain high-demand skills using modern programming languages, APIs, and systems such as Python, Ansible, and Git to automate, streamline, and enhance business operationsAcquire the skills and knowledge to customize tools, methods, and processes that improve network performance and agilityPrepare for the 300-435 ENAUTO exam Course Outline Network Programmability Foundation Automating APIs and Protocols Managing Configuration with Python and Ansible Implementing On-Box Programmability and Automation with Cisco IOS XE Software Implementing Model-Driven Telemetry Day 0 Provisioning with Cisco IOS-XE Software Implementing Automation in Enterprise Networks Building Cisco DNA Center Automation with Python Automating Operations using Cisco DNA Center Introducing Cisco SD-WAN Programmability Building Cisco SD-WAN Automation with Python Building Cisco SD-WAN Automation with Ansible Automating Cisco Meraki Implementing Meraki Integration APIs Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory- level course appropriate for those who are developing applications using relational databases, or who are using SQL to extract and analyze data from databases and need to use the full power of SQL queries. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner, attendees will learn to: Maximize the potential of SQL to build powerful, complex and robust SQL queries Query multiple tables with inner joins, outer joins and self joins Construct recursive common table expressions Summarize data using aggregation and grouping Execute analytic functions to calculate ranks Build simple and correlated subqueries Thoroughly test SQL queries to avoid common errors Select the most efficient solution to complex SQL problems A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. SQL is the cornerstone of all relational database operations. In this hands-on course, you learn to exploit the full potential of the SELECT statement to write robust queries using the best query method for your application, test your queries, and avoid common errors and pitfalls. It also teaches alternative solutions to given problems, enabling you to choose the most efficient solution in each situation. Introduction: Quick Tools Review Introduction to SQL and its development environments Using SQL*PLUS Using SQL Developer Using the SQL SELECT Statement Capabilities of the SELECT statement Arithmetic expressions and NULL values in the SELECT statement Column aliases Use of concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword Use of the DESCRIBE command Restricting and Sorting Data Limiting the Rows Rules of precedence for operators in an expression Substitution Variables Using the DEFINE and VERIFY command Single-Row Functions Describe the differences between single row and multiple row functions Manipulate strings with character function in the SELECT and WHERE clauses Manipulate numbers with the ROUND, TRUNC and MOD functions Perform arithmetic with date data Manipulate dates with the date functions Conversion Functions and Expressions Describe implicit and explicit data type conversion Use the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions Nest multiple functions Apply the NVL, NULLIF, and COALESCE functions to data Decode/Case Statements Using the Group Functions and Aggregated Data Group Functions Creating Groups of Data Having Clause Cube/Rollup Clause SQL Joins and Join Types Introduction to JOINS Types of Joins Natural join Self-join Non equijoins OUTER join Using Subqueries Introduction to Subqueries Single Row Subqueries Multiple Row Subqueries Using the SET Operators Set Operators UNION and UNION ALL operator INTERSECT operator MINUS operator Matching the SELECT statements Using Data Manipulation Language (DML) statements Data Manipulation Language Database Transactions Insert Update Delete Merge Using Data Definition Language (DDL) Data Definition Language Create Alter Drop Data Dictionary Views Introduction to Data Dictionary Describe the Data Dictionary Structure Using the Data Dictionary views Querying the Data Dictionary Views Dynamic Performance Views Creating Sequences, Synonyms, Indexes Creating sequences Creating synonyms Creating indexes Index Types Creating Views Creating Views Altering Views Replacing Views Managing Schema Objects Managing constraints Creating and using temporary tables Creating and using external tables Retrieving Data Using Subqueries Retrieving Data by Using a Subquery as Source Working with Multiple-Column subqueries Correlated Subqueries Non-Correlated Subqueries Using Subqueries to Manipulate Data Using the Check Option Subqueries in Updates and Deletes In-line Views Data Control Language (DCL) System privileges Creating a role Object privileges Revoking object privileges Manipulating Data Overview of the Explicit Default Feature Using multitable INSERTs Using the MERGE statement Tracking Changes in Data