Duration 4 Days 24 CPD hours This course is intended for This course is best suited to systems administrators and IT managers. Overview Skills gained in this training include:Determining the correct hardware and infrastructure for your clusterProper cluster configuration and deployment to integrate with the data centerConfiguring the FairScheduler to provide service-level agreements for multiple users of a clusterBest practices for preparing and maintaining Apache Hadoop in productionTroubleshooting, diagnosing, tuning, and solving Hadoop issues Cloudera University?s four-day administrator training course for Apache Hadoop provides participants with a comprehensive understanding of all the steps necessary to operate and maintain a Hadoop cluster. The Case for Apache Hadoop Why Hadoop? Core Hadoop Components Fundamental Concepts HDFS HDFS Features Writing and Reading Files NameNode Memory Considerations Overview of HDFS Security Using the Namenode Web UI Using the Hadoop File Shell Getting Data into HDFS Ingesting Data from External Sources with Flume Ingesting Data from Relational Databases with Sqoop REST Interfaces Best Practices for Importing Data YARN & MapReduce What Is MapReduce? Basic MapReduce Concepts YARN Cluster Architecture Resource Allocation Failure Recovery Using the YARN Web UI MapReduce Version 1 Planning Your Hadoop Cluster General Planning Considerations Choosing the Right Hardware Network Considerations Configuring Nodes Planning for Cluster Management Hadoop Installation and Initial Configuration Deployment Types Installing Hadoop Specifying the Hadoop Configuration Performing Initial HDFS Configuration Performing Initial YARN and MapReduce Configuration Hadoop Logging Installing and Configuring Hive, Impala, and Pig Hive Impala Pig Hadoop Clients What is a Hadoop Client? Installing and Configuring Hadoop Clients Installing and Configuring Hue Hue Authentication and Authorization Cloudera Manager The Motivation for Cloudera Manager Cloudera Manager Features Express and Enterprise Versions Cloudera Manager Topology Installing Cloudera Manager Installing Hadoop Using Cloudera Manager Performing Basic Administration Tasks Using Cloudera Manager Advanced Cluster Configuration Advanced Configuration Parameters Configuring Hadoop Ports Explicitly Including and Excluding Hosts Configuring HDFS for Rack Awareness Configuring HDFS High Availability Hadoop Security Why Hadoop Security Is Important Hadoop?s Security System Concepts What Kerberos Is and How it Works Securing a Hadoop Cluster with Kerberos Managing and Scheduling Jobs Managing Running Jobs Scheduling Hadoop Jobs Configuring the FairScheduler Impala Query Scheduling Cluster Maintainence Checking HDFS Status Copying Data Between Clusters Adding and Removing Cluster Nodes Rebalancing the Cluster Cluster Upgrading Cluster Monitoring & Troubleshooting General System Monitoring Monitoring Hadoop Clusters Common Troubleshooting Hadoop Clusters Common Misconfigurations Additional course details: Nexus Humans Cloudera Administrator Training for Apache Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Administrator Training for Apache Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations
Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting. In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. This course provides participants with a foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices with banks of sample questions. PMI-ACP© Exam Preperation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process Core Agile Concepts Core Agile Concepts Overview Traditional Project Management Methodologies Drawbacks of Waterfall Methodologies Agile Approach Empirical Process Control Agile and Traditional Project Management Choice of Methodologies/Frameworks The Agile Manifesto The Agile Manifesto Overview Manifesto Contributors Manifesto Values Manifesto Principles Common Agile Methodology Elements Common Agile Methodology Elements Overview Project (Product; Release) Initiation Agile Planning Iteration Planning and Executing Project Initiation Project Initiation Overview Determine Project Justifications and Metrics Provide Value-Driven Delivery Write Project Vision Statement Create Project Charter Identify Stakeholders and Leader/Coach Form Project Team Agile Teams and Team Space Agile Teams and Team Space Overview Scrum Master/Coach Product Owner/Customer Team Members/Developers (XP) Trackers and Testers Other Roles Team Space Physical Space Recommendations Agile Planning Agile Planning Overview Develop Epics and Stories Create Stories Non-Customer Facing Stories Personas and Extreme Personas Story Maps Estimating Stories Prioritizing Stories Create Product Backlog Create Product Roadmap Conduct Release Planning Create Parking Lot Iterations/Sprints Iterations/Sprints Overview Velocity Determination Iteration Planning Meeting Iteration Planning Guidelines Development Testing Daily Standup Meetings Progress Tracking Velocity Tracking Interpersonal Aspects of Agile Interpersonal Aspects of Agile Overview Methodologies and Uncertainty Coach/Scrum Master Team Motivation Soft Skills Emotional Intelligence Collaboration Negotiations Active listening Conflict Resolution Speed Leas? Model of Group Conflict Conducting Retrospectives Mindsets of Agile Coaches Leadership Stages Key Coaching Responsibilities Agile Methodologies Agile Methodologies Overview XP and Scrum Terms XP Terms and Concepts XP Primary Practices XP Corollary Practices Scrum Lean Software Development Seven Principles of Lean Seven Types of Muda Responsibilities Core Beliefs of Lean-Agile Software Development Other Principles of Lean-Agile Software Development Value Stream Mapping Lean-Agile Software Development Portfolio Management Additional course details: Nexus Humans PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 4 Days 24 CPD hours This course is intended for The workshop is designed for data scientists who currently use Python or R to work with smaller datasets on a single machine and who need to scale up their analyses and machine learning models to large datasets on distributed clusters. Data engineers and developers with some knowledge of data science and machine learning may also find this workshop useful. Overview Overview of data science and machine learning at scale Overview of the Hadoop ecosystem Working with HDFS data and Hive tables using Hue Introduction to Cloudera Data Science Workbench Overview of Apache Spark 2 Reading and writing data Inspecting data quality Cleansing and transforming data Summarizing and grouping data Combining, splitting, and reshaping data Exploring data Configuring, monitoring, and troubleshooting Spark applications Overview of machine learning in Spark MLlib Extracting, transforming, and selecting features Building and evaluating regression models Building and evaluating classification models Building and evaluating clustering models Cross-validating models and tuning hyperparameters Building machine learning pipelines Deploying machine learning models Spark, Spark SQL, and Spark MLlib PySpark and sparklyr Cloudera Data Science Workbench (CDSW) Hue This workshop covers data science and machine learning workflows at scale using Apache Spark 2 and other key components of the Hadoop ecosystem. The workshop emphasizes the use of data science and machine learning methods to address real-world business challenges. Using scenarios and datasets from a fictional technology company, students discover insights to support critical business decisions and develop data products to transform the business. The material is presented through a sequence of brief lectures, interactive demonstrations, extensive hands-on exercises, and discussions. The Apache Spark demonstrations and exercises are conducted in Python (with PySpark) and R (with sparklyr) using the Cloudera Data Science Workbench (CDSW) environment. The workshop is designed for data scientists who currently use Python or R to work with smaller datasets on a single machine and who need to scale up their analyses and machine learning models to large datasets on distributed clusters. Data engineers and developers with some knowledge of data science and machine learning may also find this workshop useful. Overview of data science and machine learning at scaleOverview of the Hadoop ecosystemWorking with HDFS data and Hive tables using HueIntroduction to Cloudera Data Science WorkbenchOverview of Apache Spark 2Reading and writing dataInspecting data qualityCleansing and transforming dataSummarizing and grouping dataCombining, splitting, and reshaping dataExploring dataConfiguring, monitoring, and troubleshooting Spark applicationsOverview of machine learning in Spark MLlibExtracting, transforming, and selecting featuresBuilding and evauating regression modelsBuilding and evaluating classification modelsBuilding and evaluating clustering modelsCross-validating models and tuning hyperparametersBuilding machine learning pipelinesDeploying machine learning models Additional course details: Nexus Humans Cloudera Data Scientist Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Data Scientist Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for post-sales audiences and is aimed at channel partners, customer network engineers and administrators whose interest is focused around designing a scalable infrastructure with the FlexPod. Overview Upon completing this course, you will be able to meet these overall objectives: Describe the FlexPod data center solutions and architecture Identify FlexPod workload sizing and technical specifications Describe the FlexPod deployment and management strategies The goal of this course is to evaluate the FlexPod solution design process in regards to the contemporary data center challenges. The course provides a comprehensive understanding of the reconnaissance and analytics to assess computing solution performance characteristics and requirements. In addition this course will describe the hardware components of the FlexPod and the process for selecting proper hardware for a given set of requirements. FlexPod Data Center Solutions and Architecture Describe data center elements Identify data center business challenges Identify data center environmental challenges Identify data center technical challenges Describe the data center consolidation trend Describe the FlexPod solution Identify the benefits of FlexPod Describe FlexPod platforms Describe FlexPod validated and supported designs Identify the supported Cisco UCS components Identify the supported Cisco Nexus switch components Identify the supported NetApp storage components FlexPod Workload Sizing and Technical Specifications Describe FlexPod performance characteristics Describe server virtualization performance characteristics Describe desktop virtualization performance characteristics Describe reconnaissance and analysis tools Describe the process for deploying analysis tools Configure the Microsoft MAP Toolkit Identify FlexPod Design components Describe FlexPod Sizing considerations Employ Cisco UCS Application Sizer Employ Cisco UCS VXI Resource Comparison tool Describe NetApp Solution Builder Sizing tool FlexPod Deployment and Management Strategies Describe key FlexPod LAN features Describe key FlexPod SAN features Identify FlexPod server provisioning features List FlexPod high availability features Describe supported FlexPod SAN features Describe FlexPod virtual storage tiering features Identify Cisco FlexPod validated designs Identify FlexPod data center with VMware vSphere 5.1 Identify FlexPod data center with VMware vSphere 5.1 with Cisco Nexus 7000 Identify FlexPod data center with Microsoft Private Cloud Enterprise Design Guide Identify FlexPod Select with Cloudera's Distribution including Apache Hadoop (CDH) Identify FlexPod Cisco Nexus 7000 and NetApp MetroCluster for multisite deployment Identify data center operations and management challenges Describe FlexPod validated management solutions Describe Cisco UCS Director turnkey solutions Identify Cisco UCS Director management types Describe Cisco UCS Director automation Describe self-service provisioning and reporting Identify the customer challenges and goals Describe the workload analysis Describe the component selection process Review the selected component Analyze the solution Additional course details: Nexus Humans Cisco Designing the FlexPod Solution (FPDESIGN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing the FlexPod Solution (FPDESIGN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students looking to establish a foundational understanding of Access, including the skills necessary to create a new database, construct data tables, design forms and reports, and create queries. Overview In this course, you will create and manage an Access database. You will: Navigate within the Access application environment, create a simple database, and customize Access configuration options. Organize and manage data stored within Access tables. Use queries to join, sort, and filter data from different tables. Use forms to make it easier to view, access, and input data. Create and format custom reports. Data is everywhere. Most job roles today involve some form of data management. Virtually everyone is affected in some way by the need to manage data. A relational database application such as Microsoft© Access© can help you and your organization with this task. This course is the first part of a three-course series that covers the skills needed to perform database design and development in Access. Microsoft© Access© for Office 365?: Part 1 (this course): Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports. Microsoft© Access© for Office 365?: Part 2 : Focuses on optimization of an Access database, including optimizing performance and normalizing data, data validation, usability, and advanced queries, forms, and reports. Microsoft© Access© for Office 365?: Part 3 : Focuses on managing the database and supporting complex database designs, including import and export of data, using action queries to manage data, creating complex forms and reports, macros and VBA, and tools and strategies to manage, distribute, and secure a database. This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Working with an Access Database Topic A: Launch Access and Open a Database Topic B: Use Tables to Store Data Topic C: Use Queries to Combine, Find, Filter, and Sort Data Topic D: Use Forms to View, Add, and Update Data Topic E: Use Reports to Present Data Topic F: Get Help and Configure Options in Access Lesson 2: Creating Tables Topic A: Plan an Access Database Topic B: Start a New Access Database Topic C: Create a New Table Topic D: Establish Table Relationships Lesson 3: Creating Queries Topic A: Create Basic Queries Topic B: Add Calculated Columns in a Query Topic C: Sort and Filter Data in a Query Lesson 4: Creating Forms Topic A: Start a New Form Topic B: Enhance a Form Lesson 5: Creating Reports Topic A: Start a New Report Topic B: Enhance Report Layout Additional course details: Nexus Humans Microsoft Access for Office 365: Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Access for Office 365: Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of common vSphere log files Identify networking issues based on reported symptoms Validate and troubleshoot the reported networking issue Identify the root cause of networking issue Implement the appropriate resolution to recover from networking problems Analyze storage failure scenarios using a logical troubleshooting methodology identify the root cause of storage failure Apply the appropriate resolution to resolve storage failure problems Troubleshoot vSphere cluster failure scenarios Analyze possible vSphere cluster failure causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXiTM host and VMware vCenter problems Analyze failure scenarios of ESXi host and vCenter problems Select the correct resolution for the failure of ESXi host and vCenter problems Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems. Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Discuss the various methods to run commands Discuss the various ways to access ESXi Shell Use commands to view, configure, and manage your vSphere components Use the vSphere CLI Use ESXCLI commands from the vSphere CLI Use Data Center CLI commands Identify the best tool for command-line interface troubleshooting Identify important log files for troubleshooting vCenter Server and ESXi Describe the benefits and capabilities of VMware SkylineTM Explain how VMware Skyline works Describe VMware SkylineTM Health Describe VMware Skyline AdvisorTM Troubleshooting Virtual Networking Analyze and troubleshoot standard switch problems Analyze and troubleshoot virtual machine connectivity problems Analyze and troubleshoot management network problems Analyze and troubleshoot distributed switch problems Troubleshooting Storage Discuss the vSphere storage architecture Identify the possible causes of problems in the various types of datastores Analyze the common storage connectivity and configuration problems Discuss the possible storage problems causes Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility Review vSphere storage architecture and functionality necessary to troubleshoot storage problems Use ESXi and Linux commands to troubleshoot storage problems Analyze log file entries to identify the root cause of storage problems Investigate ESXi storage issues Troubleshoot VM snapshots Troubleshoot storage performance problems Review multipathing Identify the common causes of missing paths, including PDL and APD conditions Solve the missing path problems between hosts and storage devices Troubleshooting vSphere Clusters Identify and troubleshoot vSphere HA problems Analyze and solve vSphere vMotion problems Diagnose and troubleshoot common vSphere DRS problems Troubleshooting Virtual Machines Discuss virtual machine files and disk content IDs Identify, analyze, and solve virtual machine snapshot problems Troubleshoot virtual machine power-on problems Identify possible causes and troubleshoot virtual machine connection state problems Diagnose and recover from VMware Tools installation failures Troubleshooting vCenter Server and ESXi Analyze and solve vCenter Server service problems Diagnose and troubleshoot vCenter Server database problems Use vCenter Server Appliance shell and the Bash shell to identify and solve problems Identify and troubleshoot ESXi host problems