• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31555 Courses delivered Online

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Cisco Unified Communications Manager v12 (ACUCM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Phone Network Administrators Phone Network Engineers Data System Administrators Entry-level Network Engineers Channel Partners/Resellers, Customers, Employees Overview Describe the Cisco Unified Communications Manager network, service, and features Understand the importance of and configuration of redundancy and high availability in the enterprise network Describe user configuration and the user web interface Explain basic phone options and the use of BAT Explain the route plan and on-net/off-net calling Describe the various media resources, including conferencing and MOH Describe the basic phone features and use of hunt groups Administering Cisco Unified Communications Manager (ACUCM) v12.0 is a 3-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involves routers, switches, or Cisco IOS software configuration. Exploring IP Telephone Traditional Voice versus IP Telephony Clustering Overview Intracluster Communications Cisco Unified Communications Manager Clusters Clustering Options Platform Requirements Describing Deployment Models Single-Site Deployment Centralized Call-Processing Deployment Distributed Call-Processing Deployment Distributed Single-Cluster Call-Processing Deployment Hybrid Call-Processing Deployment New Advanced Multicluster Options Understanding Advanced Multisite Features Need for CAC Deploying AAR Survivable Remote Site Telephony SRST Failover Logging in to Cisco Unified Communications Manager Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability Logging In to Cisco Unified Operating System Administration and the DRS Navigation Menu Command-Line Interface Examining Basic Server Configuration Server Configuration?Eliminating DNS Reliance Configuring Enterprise Parameters Describing Multilevel Administration Configuring Multilevel Administration Creating End Users Creating Roles Creating User Groups Assigning Users to User Groups Configuring DRS Backup and Restore Procedures DRS Backup Procedures DRS Restore Procedures Understanding User Configuration Understanding User Management Configuring Users Using the User Web Pages Understanding the User Web Pages Using the User Web Pages Configuring System Parameter Cisco Unified CM Configuration Cisco Unified Communications Manager Group Configuration Phone NTP Configuration Date/Time Group Codecs and Regions Location Configuration Device Pool Configuration DHCP Service Configuration Device Defaults Configuration Clusterwide Parameters Licensing Supporting Cisco Unified IP Phones Cisco Unified IP Phones Overview Specialized Cisco Unified IP 7900 Series Phones Phone Button Templates Softkey Templates Exploring Phone Registration and IP Phone Communications Cisco Unified IP Phone Registration Cisco Unified IP Phone Configuration Utilizing the Bulk Administration Tool (BAT) Overview of Cisco Unified Communications Manager BAT Cisco Unified Communications Manager TAPS Implementing Dial Plan Connectivity Organizational Dial Plan Trunks Gateways Creating Route Plans Dial Plan Overview Route Pattern Overview Digit Collection Call Routing Configuring Transition Patterns and Route Filters Translation Patterns The 9.@ Pattern Route Filters Implementing Digit Manipulation Discard Digits Instruction Transformation Masks Route Plan Report Defining Class of Control Overview of Class of Control Partitions CSS Configuration PLAR Application Using Class of Control Features Call Restriction Time of Day Routing Traditional vs. Line/Device Approach Defining Media Resources Overview of Media Resources Conference Bridge Media Termination Points Transcoder Music on Hold Annunciator Exploring Media Resource Management MRG Management Configuring MRGs Configuring MRGLs Describing Basic Features Call Park Call Pickup Cisco Call Back Shared Lines with Barge and Privacy Exploring Hunt Groups Hunt Group Overview Line Group Configuration Hunt List Configuration Hunt Pilot Configuration Final Forwarding Describing Phone Services Cisco IP Phone Services Cisco Phone Services Configuration

Cisco Administering Cisco Unified Communications Manager v12 (ACUCM)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and implement Fibre Channel, zoning, and N-Port Virtualization (NPV) features on Cisco UCS Describe and implement Fibre Channel over Ethernet (FCoE) on Cisco UCS Describe Cisco UCS policies for service profiles Describe Cisco Adapter Fabric Extender (FEX) and Single Root I/O Virtualization Describe and implement Role-Based Access Control (RBAC) on Cisco UCS Describe and implement external authentication providers on Cisco UCS Manager Describe and implement key management on Cisco UCS Manager Describe Cisco UCS Director Describe and implement Cisco Intersight Describe the scripting options for Cisco UCS Manager Describe and implement monitoring on Cisco UCS Manager The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System? (Cisco UCS©) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight?; and more. Implementing Cisco UCS Storage Area Network (SAN) SAN Introduction Cisco UCS Fabric Interconnect Fibre Channels modes Named VSANs Cisco UCS Fibre Channel and FCoE Storage Connectivity Describing Cisco UCS Policies for Service Profiles Storage Policies and Profiles Basic Input Output System (BIOS) Policies Boot Policy Intelligent Platform Management Interface (IPMI) Policies Scrub Policies Maintenance Policies Describing Cisco Adapter FEX and Single Root I/O Virtualization Cisco FEX Overview Cisco Adapter FEX Single Root I/O Virtualization Implementing RBAC on Cisco UCS RBAC in Cisco UCS Users, Roles, and Privileges Functions of Organizations and Locales Effective Rights of a User Implementing External Authentication Providers Options for External Authentication Providers Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco UCS Director Cisco UCS Director Overview Policies, Virtual Data Centers, and Catalogs Cisco UCS Director Virtualization Support Managing Compute with Cisco UCS Director Cisco UCS Manager Orchestration Self-Service Portal Reporting and Monitoring in Cisco UCS Director Implementing Cisco Intersight Cisco UCS Director Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS PowerTool Cisco UCS Python Software Development Kit (SDK) Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco Intersight Cisco Intersight Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS Manager PowerTool Cisco UCS Python SDK Implementing Monitoring on Cisco UCS Manager Logging Sources in Cisco UCS Manager Port Monitoring Capabilities of Cisco UCS Manager Simple Network Management Protocol (SNMP) Security Ramifications Cisco UCS Manager Call Home Feature Lab outline Configure Pod-Specific Device Aliases Configure Zoning Configure VSANs in Cisco UCS Manager Configure Unified Ports on Cisco UCS Fabric Interconnects Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE Configure RBAC Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP) Configure a Trusted Point and Key Ring in Cisco UCS Manager Configure Cisco UCS with Cisco Intersight Configure Cisco UCS Manager Using Scripting Implement Syslog and Call Home Additional course details: Nexus Humans Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)
Delivered OnlineFlexible Dates
Price on Enquiry

F2810G IBM FileNet P8 Platform Administration (V5.5.x)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system

F2810G IBM FileNet P8 Platform Administration (V5.5.x)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Python Programming Basics (TTPS4800)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is appropriate for advanced users, system administrators and web site administrators who want to use Python to support their server installations, as well as anyone else who wants to automate or simplify common tasks with the use of Python scripts. Students can apply the course skills to use Python in basic web development projects or automate or simplify common tasks with the use of Python scripts. Overview This skills-focused course is about 50% hands-on lab to lecture ratio, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert instructor, you'll learn how to: Create working Python scripts following best practices Use python data types appropriately Read and write files with both text and binary data Search and replace text with regular expressions Work with with the standard library and its work-saving modules Create 'real-world', professional Python applications Know when to use collections such as lists, dictionaries, and sets Work with Pythonic features such as comprehensions and iterators Write robust code using exception handling Introduction to Python Programming Basics is a hands-on Python programming course that teaches you the key skills you?ll need to get started with programming in Python to a solid foundational level. The start of the course will lead you through writing and running basic Python scripts, and then guide you through how to use more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This course provides you with an excellent kick start for users new to Python and scripting, enabling you to quickly use basic Python skills on the job in a variety of ways. You?ll be able use Python in basic web development projects, or use it to automate or simplify common tasks with the use of Python scripts. The course also serves as a solid primer course / foundation for continued Python study in support for next level web development with Python, using Python in DevOps, Python for data science / machine learning or Python for systems admin or networking support. Python Quick View What is Python? Python timeline Advantages/disadvantages Installing Python Getting help The Python Environment Starting Python Using the interpreter Running a Python script Editors and IDEs Getting Started with Python Using variables Builtin functions String data Numberic data Converting types Console input/output Command line parameters Flow Control About flow control The if statement Relational and Boolean operators while loops Exiting from loops Array Types About array types Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions and generators Working with Files File overview Opening a text file Reading a text file Writing to a text file Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Returning values Parameters and arguments Variable scope Sorting The sorted() function Custom sort keys Lambda functions Sorting in reverse Using min() and max() Errors and Exception Handling Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages Creating Modules The import statement Module search path Using packages Function and module aliases Getting Started with Object Oriented Programming and Classes About object-oriented programming Defining classes Constructors Understanding self Properties Instance Methods and data Class methods and data Inheritance Additional course details: Nexus Humans Introduction to Python Programming Basics (TTPS4800) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Python Programming Basics (TTPS4800) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Python Programming Basics (TTPS4800)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere with Tanzu: Deploy and Manage [V7]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes Overview By the end of the course, you should be able to meet the following objectives: Describe vSphere with Kubernetes and use cases in on-premises environments Deploy vSphere with Kubernetes Describe the VMware NSX networking requirements for vSphere with Kubernetes. Create and manage vSphere with Kubernetes namespaces Deploy and run container applications on vSphere with Kubernetes Deploy and configure VMware Harbor Describe the VMware Tanzu™ Kubernetes Grid™ service Deploy a Tanzu Kubernetes Grid cluster Deploy and run container applications on a Tanzu Kubernetes Grid cluster Describe the vSphere with Kubernetes lifecycle Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes During this 3-day course, you focus on deploying and managing VMware vSphere© with Kubernetes. You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a VMware vSphere© environment. Course Introduction Introductions and course logistics Course objectives Introduction to Containers and Kubernetes Describe Virtual Machines and Containers Describe Container Hosts Describe Container Engines Describe Dockerfile Describe Container Images Describe Image Registry Describe the purpose and functionality of Kubernetes Describe Manifest YAML files Explain Pod YAML files Explain ReplicaSets Explain Services Explain Deployments Introduction to vSphere with Kubernetes Describe the purpose and functionality of vSphere with Kubernetes Explain the integration with VMware Tanzu? Mission Control? Describe the capabilities of vSphere with Kubernetes Describe the components of vSphere with Kubernetes Contrast vSphere with Kubernetes to traditional Kubernetes Describe the requirements for vSphere with Kubernetes Prepare a vSphere cluster for vSphere with Kubernetes Describe the NSX components required for vSphere with Kubernetes Describe the network topology of vSphere with Kubernetes Explain the networking requirements of vSphere with Kubernetes Compare NSX networking objects with Kubernetes networking objects vSphere with Kubernetes Core Services Explain the architecture of the vSphere with Kubernetes Core Services Describe the Container Service Describe the Volume Service Describe the Network Service Describe the Registry Service Describe the use cases of vSphere with Kubernetes Enable vSphere with Kubernetes Deploy VMware Harbor Registry vSphere with Kubernetes Namespaces Describe a vSphere with Kubernetes namespace Contrast a vSphere with Kubernetes namespace to a traditional Kubernetes namespace Describe Resource Quotas Explain Authentication and Authorization to vSphere with Kubernetes Explain the use cases of namespaces Create a namespace Describe kubectl Use kubectl to interact with vSphere with Kubernetes Describe using kubectl pod deployment Explain scaling a pod deployment Explain managing pod lifecycle Explain deleting pods Use kubectl to deploy a pod Use kubectl to scale a pod Use kubectl to switch between namespaces VMware Tanzu Kubernetes Grid service Explain Tanzu Kubernetes Grid service Describe the use cases for Tanzu Kubernetes Grid clusters Describe the integration with Tanzu Mission Control Explain the lifecycle of Tanzu Kubernetes Grid clusters Deploy Tanzu Kubernetes Grid cluster Deploy pods to a Tanzu Kubernetes Grid cluster Monitoring and Troubleshooting Describe the monitoring tools for vSphere with Kubernetes Describe the troubleshooting tools for vSphere with Kubernetes Explain cluster, node, and namespace health Explain usage and capacity monitoring Describe vCenter Server events Describe vSphere with Kubernetes events Gather support information vSphere with Kubernetes Lifecycle Describe the vSphere with Kubernetes lifecycle Describe the Tanzu Kubernetes Grid lifecycle Describe scaling a vSphere with Kubernetes cluster Update vSphere with Kubernetes Update Tanzu Kubernetes Grid clusters Remove vSphere with Kubernetes Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere with Tanzu: Deploy and Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere with Tanzu: Deploy and Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere with Tanzu: Deploy and Manage [V7]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry