• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31808 Courses delivered Online

CE131 IBM DB2 SQL Workshop for Experienced Users

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CE131 IBM DB2 SQL Workshop for Experienced Users
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Network administrators Network operators Network architects System installers System integrators System administrators Overview After taking this course, you should be able to: Explain the advantages of CNC for service lifecycle functions Describe the architecture of the Cisco Crosswork Network Controller and its components Describe the main operations features and capabilities of CNC Perform the installation and initial configuration of the Cisco Crosswork Network Controller Onboard network devices in CNC Enable data collection in CNC using Crosswork Data Gateway Provision traffic engineering policies to be used by network services Explore network topology and inventory details by using the available visualizing tools Optimize a network service instance for bandwidth utilization during the lifetime of service instances Bind newly provisioned Layer 2 and Layer 3 VPN service instances to traffic engineering policies Develop custom Layer 2 and Layer 3 Multiprotocol Label Switching (MPLS) VPN service definitions Configure Key Performance Indicators (KPIs) to monitor the health of devices Develop plays and playbooks for closed loop automation Automate network operations and maintenance tasks Explore closed loop workflows Use northbound application programing interfaces to integrate other systems with CNC Send alerts to northbound systems Configure the collection and exporting of data to external endpoints Manage the Crosswork cluster Deploy CNC for optimal availability, scalability, and performance Troubleshoot CNC issues The Implementing Cisco Crosswork Network Controller (SPCNCI) v1.0 course introduces you to the Cisco© Crosswork Network Controller (CNC) and its installation. Through a series of lectures and labs you will learn to use Cisco CNC to streamline, manage, and automate service lifecycle functions spanning across service provisioning, visualization, monitoring, and optimization. You will also get an overview of Cisco CNC as an IP transport network controller platform, of its components, and of its utility in various use-cases such as boosting operational agility, improving intent-based service delivery, and reducing the cost of operations.This course will also teach you about creating custom service definitions, tactical traffic engineering policies, automated provisioning of services, and real-time traffic optimization. Additionally, you will learn about implementing closed loop automation workflows for remediation, optimization, and maintenance. Finally, this course will teach you to understand APIs to help interface with other systems, as well as best practices, including sizing guidelines across components of the CNC meant to meet scalability and high-availability requirements. Course Outline Introducing Cisco CNC Exploring Cisco CNC Architecture Describing Cisco CNC Unified Functions Installing and Configuring Cisco CNC Onboarding Network Devices Setting Up Data Collection Provisioning Traffic Engineering Policies Visualizing and Exploring Network Topology and Inventory Details Optimizing Networks Using Closed-Loop Automation Orchestrating VPN Services Developing Custom L2VPN and L3VPN Service Definitions Configuring KPIs to Monitor Device Health Automating Maintenance and Closed Loop Remediation Automating Network Maintenance Tasks Exploring Closed Loop Workflows Exploring Northbound APIs for External System Integration Managing System Alerts Collecting and Exporting Data to External Endpoints Operating a Cisco Crosswork Cluster Implementing CNC for High Availability, Scalability, and Performance Troubleshooting Cisco CNC Additional course details: Nexus Humans Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI)
Delivered OnlineFlexible Dates
Price on Enquiry

WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Describe the benefits of implementing a decision management solution with Operational Decision Manager.Identify the key user roles that are involved in designing and developing a decision management solution, and the tasks that are associated with each role.Describe the development process of building a business rule application and the collaboration between business and development teams.Set up and customize the Business Object Model (BOM) and vocabulary for rule authoring. Implement the Execution Object Model (XOM) that enables rule execution.Orchestrate rule execution through ruleflows. Author rule artifacts to implement business policies.Debug business rule applications to ensure that the implemented business logic is error-free.Set up and customize testing and simulation for business users.Package and deploy decision services to test and production environments.Integrate decision services for managed execution within an enterprise environment.Monitor and audit execution of decision services.Work with Operational Decision Manager features that support decision governance. This course introduces developers to IBM Operational Decision Manager V8.9.2. It teaches participants the concepts and skills required to design, develop, and integrate a business rule solution with Operational Decision Manager. This course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development. Through instructor-led presentations and hands-on lab exercises, participants learn about the core features of Decision Server, which is the primary working environment for developers. Participants design decision services and work with the object models that are required to author and execute rule artifacts. Participants gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, students become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. Participants also learn how to use Operational Decision Manager features to support decision governance. Introducing IBM Operational Decision Manager Exercise: Operational Decision Manager in action Developing decision services Exercise: Setting up decision services Programming with business rules and developing object models Exercise: Working with the BOM Exercise: Refactoring Orchestrating ruleset execution Exercise: Working with ruleflows Authoring rules Exercise: Exploring action rules Exercise: Authoring action rules Exercise: Authoring decision tables Customizing rule vocabulary with categories and domains Exercise: Working with static domains Exercise: Working with dynamic domains Working with queries Exercise: Working with queries Debugging rules Exercise: Executing rules locally Exercise: Debugging a ruleset Enabling tests and simulations Exercise: Enabling rule validation Managing deployment Exercise: Managing deployment Exercise: Using Build Command to build RuleApps Executing rules with Rule Execution Server Exercise: Exploring the Rule Execution Server console Auditing and monitoring ruleset execution Exercise: Auditing ruleset execution through Decision Warehouse Working with the REST API Exercise: Executing rules as a hosted transparent decision service (HTDS) Additional course details: Nexus Humans WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: What's New [V8]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. Course Introduction Introductions and course logistics Course objectives Artificial Intelligence and Machine Learning Describe how device groups support AI and ML in vSphere 8 Describe how device virtualization extensions support AI and ML in vSphere 8 vSphere Distributed Services Engine Describe the benefits of Distributed Services Engine Explain how Distributed Services Engine works Recognize use cases for Distributed Services Engine Install ESXi on a host equipped with a DPU View DPU information in vSphere Client Add an ESXi host equipped with a DPU to a cluster Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager Create a vSphere Distributed Switch for network offloads Add a host with a DPU to the vSphere Distributed Switch Configure a VM to use Uniform Passthrough Mode vSphere and vCenter Management Review the improvements to the communication between vCenter and ESXi hosts Review the enhancements to the vCenter recovery process ESXi Enhancements Describe the function of the central configuration store in ESXi Explain how ConfigStore affects your interaction with ESXi configuration files Recognize the supported system storage partition configuration on ESXi 8.0 Identify devices supported for system storage on ESXi 8.0 Configure an RDMA host local device on ESXi vSphere Storage Describe the vSAN Express Storage Architecture Recognize the benefits of using vSAN Express Storage Architecture Describe the benefits of using NVMe Recognize the support for NVMe devices in vSphere Guest OS and Workloads Review the enhancements of the latest virtual hardware versions Describe the features introduced with virtual hardware version 20 Create a snapshot of a VM with an NVDIMM device Resource Management View energy and carbon emission metrics in vRealize Operations Manager Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality Describe how vMMR enhances the performance of vSphere DRS Security and Compliance Describe how to handle vTPM secrets when cloning a VM Manage OVF templates for VMs that are configured with vTPM Deploy an OVF template with vTPM Describe the enhancements to trusted binary enforcement in ESXi Describe ESXi 8 enhanced security features vSphere Lifecycle Manager Describe the enhancements to life cycle management of standalone ESXi hosts Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager Use Auto Deploy to boot a host with the desired image and configuration specifications Upgrade multiple ESXi hosts in a cluster in parallel Stage an ESXi host image prior to remediation Auto Deploy Manage custom host certificates using Auto Deploy vSphere with Tanzu Describe the features of the Tanzu Kubernetes Grid 2.0 offering Announcing vSphere+ Describe the functionality and benefits of vSphere+

VMware vSphere: What's New [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system. This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: AFM Overview AFM Overview AFM Availability AFM and the BIG-IP Security Menu Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Module 3: Network Firewall AFM Firewalls Contexts Modes Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Configuring Network Firewall Network Firewall Rules and Policies Network Firewall Rule Creation Identifying Traffic by Region with Geolocation Identifying Redundant and Conflicting Rules Identifying Stale Rules Prebuilding Firewall Rules with Lists and Schedules Rule Lists Address Lists Port Lists Schedules Network Firewall Policies Policy Status and Management Other Rule Actions Redirecting Traffic with Send to Virtual Checking Rule Processing with Packet Tester Examining Connections with Flow Inspector Module 4: Logs Event Logs Logging Profiles Limiting Log Messages with Log Throttling Enabling Logging in Firewall Rules BIG-IP Logging Mechanisms Log Publisher Log Destination Filtering Logs with the Custom Search Facility Logging Global Rule Events Log Configuration Changes QKView and Log Files SNMP MIB SNMP Traps Module 5: IP Intelligence Overview Feature 1 Dynamic White and Black Lists Black List Categories Feed Lists IP Intelligence Policies IP Intelligence Log Profile IP Intelligence Reporting Troubleshooting IP Intelligence Lists Feature 2 IP Intelligence Database Licensing Installation Configuration Troubleshooting IP Intelligence iRule Module 6: DoS Protection Denial of Service and DoS Protection Overview Device DoS Protection Configuring Device DoS Protection Variant 1 DoS Vectors Variant 2 DoS Vectors Automatic Threshold Configuration Variant 3 DoS Vectors Device DoS Profiles DoS Protection Profile Dynamic Signatures Dynamic Signatures Configuration DoS iRules Module 7: Reports AFM Reporting Facilities Overview Examining the Status of Particular AFM Features Exporting the Data Managing the Reporting Settings Scheduling Reports Examining AFM Status at High Level Mini Reporting Windows (Widgets) Building Custom Widgets Deleting and Restoring Widgets Dashboards Module 8: DoS White Lists Bypassing DoS Checks with White Lists Configuring DoS White Lists tmsh options Per Profile Whitelist Address List Module 9: DoS Sweep Flood Protection Isolating Bad Clients with Sweep Flood Configuring Sweep Flood Module 10: IP Intelligence Shun Overview Manual Configuration Dynamic Configuration IP Intelligence Policy tmsh options Extending the Shun Feature Route this Traffic to Nowhere - Remotely Triggered Black Hole Route this Traffic for Further Processing - Scrubber Module 11: DNS Firewall Filtering DNS Traffic with DNS Firewall Configuring DNS Firewall DNS Query Types DNS Opcode Types Logging DNS Firewall Events Troubleshooting Module 12: DNS DoS Overview DNS DoS Configuring DNS DoS DoS Protection Profile Device DoS and DNS Module 13: SIP DoS Session Initiation Protocol (SIP) Transactions and Dialogs SIP DoS Configuration DoS Protection Profile Device DoS and SIP Module 14: Port Misuse Overview Port Misuse and Service Policies Building a Port Misuse Policy Attaching a Service Policy Creating a Log Profile Module 15: Network Firewall iRules Overview iRule Events Configuration When to use iRules More Information Module 16: Recap BIG-IP Architecture and Traffic Flow AFM Packet Processing Overview

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager
Delivered OnlineFlexible Dates
Price on Enquiry

AutoCAD Level 1 - Essentials

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Navigate the AutoCAD user interfacesUse the fundamental features of AutoCADUse the precision drafting tools in AutoCAD to develop accurate technical drawingsPresent drawings in a detailed and visually impressive way In this course, you will learn to navigate the AutoCAD user interfaces and use the fundamental features of AutoCAD. You will learn to use the precision drafting tools in AutoCAD to develop accurate technical drawings. Getting Started with AutoCAD Starting the Software User Interface Working with Commands Cartesian Workspace Opening an Existing Drawing File Viewing Your Drawing Saving Your Work Basic Drawing & Editing Commands Drawing Lines Erasing Objects Drawing Lines with Polar Tracking Drawing Rectangles Drawing Circles Undo and Redo Actions Projects - Creating a Simple Drawing Create a Simple Drawing Create Simple Shapes Drawing Precision in AutoCAD Using Running Object Snaps Using Object Snap Overrides Polar Tracking at Angles Object Snap Tracking Drawing with Snap and Grid (Optional) Making Changes in Your Drawing Selecting Objects for Editing Moving Objects Copying Objects Rotating Objects Scaling Objects Mirroring Objects Editing with Grips Projects - Making Your Drawing More Precise Schematic Project: Electronics Diagram Architectural Project: Landscape Mechanical Project (with Polar & Tracking) Mechanical Project: Surge Protector Mechanical Project: Satellite Organizing Your Drawing with Layers Creating New Drawings With Templates What are Layers? Layer States Changing an Object's Layer Advanced Object Types Drawing Arcs Drawing Polylines Editing Polylines Drawing Polygons Drawing Ellipses Analzying Model and Object Properties Working with Object Properties Measuring Objects Projects - Drawing Organization & Information Architectural Project Mechanical Project Civil Project Advanced Editing Commands Trimming and Extending Objects Stretching Objects Creating Fillets and Chamfers Creating Arrays of Objects Inserting Blocks What are Blocks? Working with Dynamic Blocks Inserting Blocks Inserting Blocks using the Tool Palettes Inserting Blocks using the DesignCenter Inserting Blocks using the Content Explorer Projects - Creating More Complex Objects Mechanical Project 1 - Plate Mechanical Project 2 - Gasket Mechanical Project 3 - Plate Mechanical Project 4 - Rocker Arm Architectural Project 1 - Floor Plan Architectural Project 2 - Floor Plan Civil Project - Parking Lot Setting Up a Layout Printing Concepts Working in Layouts Creating Layouts Creating Layout Viewports Guidelines for Layouts Printing Your Drawing Printing Layouts Print and Plot Settings Projects - Preparing to Print Mechanical Project Architectural Project Text Working with Annotations Adding Text in a Drawing Modifying Multiline Text Formatting Multiline Text Adding Notes with Leaders to Your Drawing Creating Tables Modifying Tables Hatching Hatching Editing Hatches Adding Dimensions Dimensioning Concepts Adding Linear Dimensions Adding Radial and Angular Dimensions Editing Dimensions Projects - Annotating Your Drawing Mechanical Project Architectural Project 1 Architectural Project 2 Civil Project Additional course details: Nexus Humans AutoCAD Level 1 - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AutoCAD Level 1 - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AutoCAD Level 1 - Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Business Soft Skills

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge communicating, etiquette, professionalism and time management for the office environment. Overview Upon successful completion of this course, students will be able to communicate, be professional and manage their time effectively in a business environment. In this course, students will learn how to communicate, act and manage time effective in a business environment. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives The Big Picture What is Communication? How Do We Communicate? Other Factors in Communication Understanding Communication Barriers An Overview of Common Barriers Language Barriers Cultural Barriers Differences in Time and Place Paraverbal Communication Skills The Power of Pitch The Truth about Tone The Strength of Speed Non-Verbal Communication Understanding the Mehrabian Study All About Body Language Interpreting Gestures Speaking like a Star S = Situation T = Task A = Action R = Result Summary Listening Skills Seven Ways to Listen Better Today Understanding Active Listening Sending Good Signals to Others Asking Good Questions Open Questions Closed Questions Probing Questions Appreciative Inquiry The Purpose of AI The Four Stages Examples and Case Studies Mastering the Art of Conversation Level One: Discussing General Topics Level Two: Sharing Ideas and Perspectives Level Three: Sharing Personal Experiences Our Top Networking Tips Advanced Communication Skills Understanding Precipitating Factors Establishing Common Ground Using ?I? Messages Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Principles of Professional Behavior Always be Your Best Meeting and Greeting Sending Social Invitations to Business Associates Interview Etiquette Interviewing Before the Interview In the Waiting Room During the Interview After the Interview Job Fair Interviews Planning & Attending Business Meetings Office Meetings Meal Meetings Electronic Etiquette Voicemail Cell Phones Email Multiculture Etiquette Defining the Challenge Five Steps to Dealing with Diversity Guidelines for Managing Diverse Relationships Time Management Concepts Benefits of better time utilization Who controls your schedule? Your Job: What You Are Responsible for Accomplishing? Your job responsibilities Setting objectives Setting priorities How to Use Your Time Gathering data-the time log Analyzing the data Delegation: Working Through Others Why some people don't delegate Levels of delegation How to delegate Benefits of delegation Getting started Planning: Keys to Achievement Planning: Keys to Achievement Coping with Common Time Wasters Coping with self-generated time wasters Coping with environmental time wasters Personal Needs that Get in the Way of Effective Time Utilization Needs profile analysis Self-assessment questionnaire Applying needs assessment results Planning for Improvement Six tips for effective time management Planning for improved time utilization Follow-Up: Staying on Track Time savings progress report Time savings progress chart Time management progress survey Additional course details: Nexus Humans Business Soft Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Soft Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Soft Skills
Delivered OnlineFlexible Dates
Price on Enquiry

Writing Analytical Queries for Business Intelligence

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. Module 1: Introduction to TSQL for Business Intelligence Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Module 2: Turning Table Columns into Variables for Analysis: SELECT List Expressions, WHERE, and ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Module 3: Combining Columns from Multiple Tables into a Single Dataset: The JOIN Operators Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNERJOIN Understanding Joins, Part 3: The OUTERJOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTERJOINs Combining JOIN Operations with WHERE and ORDER BY Module 4: Creating an Appropriate Aggregation Level Using GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Module 5: Subqueries, Derived Tables and Common Table Expressions Non-correlated and correlated subqueries Derived tables Common table expressions Module 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Module 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Additional course details: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Writing Analytical Queries for Business Intelligence
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Site Recovery Manager - Install, Configure, Manage [v8.2]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication™ functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager protection groups based on vSphere Replication Build, edit, execute, test, and remove a recovery plan Perform a planned migration Perform reprotect and failback using Site Recovery Manager and vSphere Replication This hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.2. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Outline the necessary information to effectively undertake this course Identify resources for additional information Overview and Architecture Discuss Site Recovery Manager architecture Examine disaster recovery options with Site Recovery Manager Describe Site Recovery Manager integration with VMware vSphere© ClientTM Discuss Site Recovery Manager features Analyze Site Recovery Manager storage policies and integration options Discuss how Site Recovery Manager supports several disaster recovery topologies identify use cases for Site Recovery Manager across various scenarios Describe how VMware Site Recovery? for VMware Cloud? on AWS integrates with Site Recovery Manager. Deploy & Configure Site Recovery Manager Identify the requirements to deploy Site Recovery Manager Discuss the benefits of the Site Recovery Manager appliance Explore vSphere deployment models Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration user interface Describe the process to register Site Recovery Manager with VMware vCenter Server© Configure site pairing Identify how to perform updates to the Site Recovery Manager appliance Configuring Inventory Mappings Outline the importance of inventory mappings Examine configuration options for inventory mappings Outline the importance of placeholders Using Array-based Replication Describe array-based replication Discuss the role of the Storage Replication Adapter (SRA) Explore the relationship between devices, consistency groups and datastore groups Configure array pairs vSphere Replication Explore vSphere Replication architecture Examine vSphere Replication functionality Formulate use cases for vSphere Replication Deploy a vSphere Replication appliance Configure vSphere Replication appliance settings Configure a vSphere Replication appliance connection Deploy a vSphere Replication server Register a vSphere Replication server Replicating Virtual Machines with vSphere Replication Configure vSphere Replication for virtual machines Explain the importance of datastore mappings Describe vSphere Replication recovery point objective scheduling Describe the vSphere Replication disk transfer protocol Building Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and storage profile protection groups Create a protection group Discuss protection group settings Remove protection from a virtual machine Create a storage profile protection group Building Recovery Plans Discuss recovery plan concepts List recovery plan steps Discuss network planning Discuss customization options in recovery planning Outline how to implement a recovery plan Investigate recovery plan options Testing and Running a Recovery Plan Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Discuss the importance of VMware vSphere© VMFS resignaturing Examine Site Recovery Manager integration with various vSphere technologies Outline how to conduct a recovery plan test Perform recovery plan test execution Identify the effects on the storage layer during recovery steps Explain a recovery plan execution in planned migration or disaster recovery mode Understand storage layer changes for plan execution types Identify the recovery steps for each execution type Describe how to reprotect a data center Examine failback steps Monitoring and Troubleshooting Discuss Site Recovery Manager alarms Explore Site Recovery Manager history reports Configuring advanced Site Recovery Manager settings Describe how to modify logging levels Explain how to collect log bundles Identify key log locations

VMware Site Recovery Manager - Install, Configure, Manage [v8.2]
Delivered OnlineFlexible Dates
Price on Enquiry

ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN
Delivered OnlineFlexible Dates
Price on Enquiry