• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31797 Courses delivered Online

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c PL/SQL Fundamentals (TTOR12019)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is geared for anyone needing to interface with an Oracle database such as end users, business analysts, application developers and database administrators / DBAs. Overview Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course participants will explore: Using PL/SQL programming language for database applications and development incorporating PL/SQL modules within the application architecture from the initial design and planning phase The essentials of building executable PL/SQL program units Each of the major segments of a working program and how these interact with each other during program execution Important error or exception handling capabilities of the language. How database-resident program units can be used as part of the overall database application architecture Applying these new skills to the development of PL/SQL packages. Advanced database programming capabilities and benefits How database triggers can be used as part of an advanced database application design Oracle 19c PL/SQL Fundamentals is a three-day, hands-on course that introduces Oracle database programming using the PL/SQL programming language. Throughout the course students will explore the core syntax, structure and features of the language. This course will also lay the foundation for the entire Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. The course also explores applying the newly learned skills to the development of database applications. Participants will learn how to use database-resident stored program units such as procedures, functions, packages and database triggers. Students will also learn about the latest features in Oracle 19c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL *Plus Setup JDeveloper About BIND and Substitution Variables Using SQL Developer Using SQL *Plus Choosing a Database Programming Language What is Database Programming PL/SQL Programming PL/SQL Performance Advantages Integration with Other Languages PL/SQL Language Essentials PL/SQL Program Structure Language Syntax Rules Embedding SQL Writing Readable Code Generating Readable Code Generating Database Output SQL * Plus Input of Program Block DECLARE Section About the Declare Section Declare Primitive Types Declaration Options Not Null Constant Data Dictionary Integration % Type Declare Simple User-Defined Types Type ? Table Type ? Record Extended User Defined Types BEGIN Section About the Begin Section Manipulating Program Data Logic Control & Braching GOTO LOOP IF-THEN-ELSE CASE EXCEPTION Section About the Exception Section Isolating the Specific Exception Pragma Exception_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT & Select ? Into Beyond the Basics : Explicit Cursors About Explicit Cursors Extend Cursor Techniques For Update of Clause Where Current of Clause Using for ? Loop Cursors Introduction Database Resident Programming Units About Database ? Resident Programs Physical Storage & Execution Types of Stored Program Units Stored Program Unit Advantages Modular Design Principles Creating Stored Procedures and Functions Stored Procedures & Functions Create Procedure / Create Function Creating Procedures & Functions Raise_Salary() Procedure Salary_Valid() function The Parameter Specification Default Clause System & Object Privileges Using the Development Tools Executing Stored Procedures and Functions Calling Procedures & Functions Unit Testing with Execute Anonymous Block Unit Testing Specifying a Parameter Notation SQL Worksheet Unit Testing Calling Functions from SQL Maintaining Stored Programming Units Recompiling Programs Mass Recompilation Using UTL_RECOMP() Dropping Procedures & Functions Drop Procedures & Functions Drop Procedure / Function Data Dictionary Metadata Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies Dependency Internals Tracking Dependencies The Dependency Tracking Utility SQL Developer Dependency Info Dependency Strategy Checklists Creating & Maintaining About Packages Creating Packages Maintaining Packages Performance Considerations Advanced Package Capabilities Definer & Invoker Rights White Lists & Accessible By Persistent Global Objects Defining Initilization Logic Object Orientation Support Advanced Cursor Techniques Using Cursor Variables Using SYS_REFCURSOR Using Cursor Expressions Using System Supplied Packages DBMS_OUTPUT() UTL_FILE() FOPEN() Example Database Trigger Concepts About Database Triggers DML Event Trigger Sub-Types Database Trigger Scenario Trigger Exhaustion Mechanisms Trigger within SQL Worksheet Creating Database Triggers Statement Level Triggers Using Raise Application_Error() Row-Level Triggers Examples of Triggers Employee_Salary_Check Example Employee_Journal Example Budget_Event Example Instead of Triggers Triggers within and Application Maintaining Database Triggers Call Syntax Trigger Maintenance Tasks Show Errors Trigger Drop Trigger Alter Trigger Multiple Triggers for a Table Handling Mutating Table Issues Implementing System Event Triggers What are System Event Triggers Defining the Scope Available System Events System Event Attributes

Oracle 19c PL/SQL Fundamentals (TTOR12019)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Premiere Pro

By Nexus Human

Duration 3 Days 18 CPD hours There are good reasons Adobe Premiere Pro is such a popular post-production video editing software application. It excels for a wide variety of uses; tapeless and DSLR footage; cross-platforms, open workflows for easy collaboration, powerful metadata features for greater editing and production efficiency, plus real-time 3D editing and Virtual Reality. This four-day course is ideal for beginners, as well as Final Cut Pro and Avid editors - or for anyone who is involved in a content creation environment. Adobe Premiere Interface Performing Nonlinear Editing in Premiere Pro Looking at the Standard Digital Video Workflow Enhancing the Workflow with Premiere Pro Expanding the Workflow Incorporating other Components into the Editing Workflow Adobe Creative Cloud Video Workflow Touring the Premiere Pro Workspace Looking at the Workspace Layout Customizing the Workspace Introducing Preferences Keyboard Shortcuts Moving, Backing up, and Syncing User Settings Setting up a Project Setting up a Sequence Setting up the Timeline Importing Media Importing Assets Working with ingest Options and Proxy Media Working with the Media Browser Importing Images Using Adobe Stock Customizing the Media Cache Recording a Voice-over Organizing Media Project Panel Working with Bins Monitoring Footage Modifying Clips Mastering the Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential Editing Commands Working with Clips and Markers Using Program Monitor Controls Setting the Playback Resolution Playing back VR Video Using Markers Using Sync Lock and Track Lock Finding Gaps in the Timeline Selecting Clips Moving Clips Extracting and Deleting Segments Adding Transitions Understanding Transitions Edit points and Handles Adding Video Transitions Using A/B mode to Fine-tune a Transition Adding Audio Transitions Performing Advanced Editing Techniques Performing Three or Four-point Editing Changing Playback Speed Replacing Clips and Footage Nesting Sequences Performing Regular Trimming Performing Advanced Trimming Trimming in the Program Monitor Putting Clips in Motion Adjusting the Motion Effect Changing Clip Position, Size, and Rotation Working with Keyframe Interpolation Using other Motion-related Effects Multi-camera Editing Following the Multi-camera Process Creating a Multi-camera Sequence Switching Multiple Cameras Finalizing Multi-camera Editing Editing and Mixing Audio Setting up the Interface to Work with Audio Examining Audio Characteristics Creating a Voice-over Scratch Track Adjusting Audio Volume Normalizing Audio Creating a Split Edit Adjusting Audio Levels for a Clip Sweetening Sound Sweetening Sound with Audio Effects Adjusting EQ Cleaning up Noisy Audio Fading Audio with Essential Sounds Adding Video Effects Working with Effects Master Clip Effects Masking and Tracking Visual Effects Keyframing Effects Effect Presets Frequently Used Effects Improving Clips with Color Correction and Grading Following a Color-oriented Workflow An overview of Color-oriented Effects Fixing Exposure Problems Fixing Color Balance Using Special Color Effects Creating a Look Exploring Compositing Techniques Understanding an Alpha Channel Making Compositing Part of Your Projects Working with the Opacity Effect Working with Alpha-channel Transparencies Color Keying a Green Screen Shot Using Mattes Creating Titles An Overview of Shapes & Type Loading in Graphics Using the Essentials Graphic Panel Browsing Templates Saving Templates Mastering Video Typography Essentials Creating Titles Stylizing Text Making Text Roll and Crawl Introducing Captions Managing Your Projects Using the File menu Using the Project Manager Performing the Final Project Management Steps Importing Projects or Sequences Managing Collaboration Using the Libraries Panel Managing Your Hard Drives Exporting Frames, Clips, and Sequences Overview of Export Options Exporting Single Frames Exporting a Master Copy Working with Adobe Media Encoder Uploading to Social Media Exchanging with Other Editing Applications Additional course details: Nexus Humans Adobe Premiere Pro training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Premiere Pro course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Adobe Premiere Pro
Delivered OnlineFlexible Dates
Price on Enquiry

Python With Data Science

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Audience: Data Scientists, Software Developers, IT Architects, and Technical Managers. Participants should have the general knowledge of statistics and programming Also familiar with Python Overview ? NumPy, pandas, Matplotlib, scikit-learn ? Python REPLs ? Jupyter Notebooks ? Data analytics life-cycle phases ? Data repairing and normalizing ? Data aggregation and grouping ? Data visualization ? Data science algorithms for supervised and unsupervised machine learning Covers theoretical and technical aspects of using Python in Applied Data Science projects and Data Logistics use cases. Python for Data Science ? Using Modules ? Listing Methods in a Module ? Creating Your Own Modules ? List Comprehension ? Dictionary Comprehension ? String Comprehension ? Python 2 vs Python 3 ? Sets (Python 3+) ? Python Idioms ? Python Data Science ?Ecosystem? ? NumPy ? NumPy Arrays ? NumPy Idioms ? pandas ? Data Wrangling with pandas' DataFrame ? SciPy ? Scikit-learn ? SciPy or scikit-learn? ? Matplotlib ? Python vs R ? Python on Apache Spark ? Python Dev Tools and REPLs ? Anaconda ? IPython ? Visual Studio Code ? Jupyter ? Jupyter Basic Commands ? Summary Applied Data Science ? What is Data Science? ? Data Science Ecosystem ? Data Mining vs. Data Science ? Business Analytics vs. Data Science ? Data Science, Machine Learning, AI? ? Who is a Data Scientist? ? Data Science Skill Sets Venn Diagram ? Data Scientists at Work ? Examples of Data Science Projects ? An Example of a Data Product ? Applied Data Science at Google ? Data Science Gotchas ? Summary Data Analytics Life-cycle Phases ? Big Data Analytics Pipeline ? Data Discovery Phase ? Data Harvesting Phase ? Data Priming Phase ? Data Logistics and Data Governance ? Exploratory Data Analysis ? Model Planning Phase ? Model Building Phase ? Communicating the Results ? Production Roll-out ? Summary Repairing and Normalizing Data ? Repairing and Normalizing Data ? Dealing with the Missing Data ? Sample Data Set ? Getting Info on Null Data ? Dropping a Column ? Interpolating Missing Data in pandas ? Replacing the Missing Values with the Mean Value ? Scaling (Normalizing) the Data ? Data Preprocessing with scikit-learn ? Scaling with the scale() Function ? The MinMaxScaler Object ? Summary Descriptive Statistics Computing Features in Python ? Descriptive Statistics ? Non-uniformity of a Probability Distribution ? Using NumPy for Calculating Descriptive Statistics Measures ? Finding Min and Max in NumPy ? Using pandas for Calculating Descriptive Statistics Measures ? Correlation ? Regression and Correlation ? Covariance ? Getting Pairwise Correlation and Covariance Measures ? Finding Min and Max in pandas DataFrame ? Summary Data Aggregation and Grouping ? Data Aggregation and Grouping ? Sample Data Set ? The pandas.core.groupby.SeriesGroupBy Object ? Grouping by Two or More Columns ? Emulating the SQL's WHERE Clause ? The Pivot Tables ? Cross-Tabulation ? Summary Data Visualization with matplotlib ? Data Visualization ? What is matplotlib? ? Getting Started with matplotlib ? The Plotting Window ? The Figure Options ? The matplotlib.pyplot.plot() Function ? The matplotlib.pyplot.bar() Function ? The matplotlib.pyplot.pie () Function ? Subplots ? Using the matplotlib.gridspec.GridSpec Object ? The matplotlib.pyplot.subplot() Function ? Hands-on Exercise ? Figures ? Saving Figures to File ? Visualization with pandas ? Working with matplotlib in Jupyter Notebooks ? Summary Data Science and ML Algorithms in scikit-learn ? Data Science, Machine Learning, AI? ? Types of Machine Learning ? Terminology: Features and Observations ? Continuous and Categorical Features (Variables) ? Terminology: Axis ? The scikit-learn Package ? scikit-learn Estimators ? Models, Estimators, and Predictors ? Common Distance Metrics ? The Euclidean Metric ? The LIBSVM format ? Scaling of the Features ? The Curse of Dimensionality ? Supervised vs Unsupervised Machine Learning ? Supervised Machine Learning Algorithms ? Unsupervised Machine Learning Algorithms ? Choose the Right Algorithm ? Life-cycles of Machine Learning Development ? Data Split for Training and Test Data Sets ? Data Splitting in scikit-learn ? Hands-on Exercise ? Classification Examples ? Classifying with k-Nearest Neighbors (SL) ? k-Nearest Neighbors Algorithm ? k-Nearest Neighbors Algorithm ? The Error Rate ? Hands-on Exercise ? Dimensionality Reduction ? The Advantages of Dimensionality Reduction ? Principal component analysis (PCA) ? Hands-on Exercise ? Data Blending ? Decision Trees (SL) ? Decision Tree Terminology ? Decision Tree Classification in Context of Information Theory ? Information Entropy Defined ? The Shannon Entropy Formula ? The Simplified Decision Tree Algorithm ? Using Decision Trees ? Random Forests ? SVM ? Naive Bayes Classifier (SL) ? Naive Bayesian Probabilistic Model in a Nutshell ? Bayes Formula ? Classification of Documents with Naive Bayes ? Unsupervised Learning Type: Clustering ? Clustering Examples ? k-Means Clustering (UL) ? k-Means Clustering in a Nutshell ? k-Means Characteristics ? Regression Analysis ? Simple Linear Regression Model ? Linear vs Non-Linear Regression ? Linear Regression Illustration ? Major Underlying Assumptions for Regression Analysis ? Least-Squares Method (LSM) ? Locally Weighted Linear Regression ? Regression Models in Excel ? Multiple Regression Analysis ? Logistic Regression ? Regression vs Classification ? Time-Series Analysis ? Decomposing Time-Series ? Summary Lab Exercises Lab 1 - Learning the Lab Environment Lab 2 - Using Jupyter Notebook Lab 3 - Repairing and Normalizing Data Lab 4 - Computing Descriptive Statistics Lab 5 - Data Grouping and Aggregation Lab 6 - Data Visualization with matplotlib Lab 7 - Data Splitting Lab 8 - k-Nearest Neighbors Algorithm Lab 9 - The k-means Algorithm Lab 10 - The Random Forest Algorithm

Python With Data Science
Delivered OnlineFlexible Dates
Price on Enquiry

Understanding Cisco Data Center Foundations (DCFNDU) v1.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data center administrators Data center engineers Systems engineers Server administrators Network managers Cisco integrators and partners Data center designers Technical solutions architects Network architects Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco FEX connectivity Describe Ethernet port channels and vPCs Introduce switch virtualization, machine virtualization, and describe network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe NPV and NPIV Describe data center Ethernet enhancements that provide a lossless fabric Describe FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.1 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several CCNP and other professional-level data center courses and exams. Describing the Data Center Network Architectures Cisco Data Center Architecture Overview Three-Tier Network: Core, Aggregation, and Access Spine-and-Leaf Network Two-Tier Storage Network Describing the Cisco Nexus Family and Cisco NX-OS Software Cisco Nexus Data Center Product Overview Cisco NX-OS Software Architecture Cisco NX-OS Software CLI Tools Cisco NX-OS Virtual Routing and Forwarding Describing Layer 3 First-Hop Redundancy Default Gateway Redundancy Hot Standby Router Protocol Virtual Router Redundancy Protocol Gateway Load Balancing Protocol Describing Cisco FEX Server Deployment Models Cisco FEX Technology Cisco FEX Traffic Forwarding Cisco Adapter FEX Describing Port Channels and vPCs Ethernet Port Channels Virtual Port Channels Supported vPC Topologies Describing Switch Virtualization Cisco Nexus Switch Basic Components Virtual Routing and Forwarding Cisco Nexus 7000 VDCs VDC Types VDC Resource Allocation VDC Management Describing Machine Virtualization Virtual Machines Hypervisor VM Manager Describing Network Virtualization Overlay Network Protocols VXLAN Overlay VXLAN BGP EVPN Control Plane VXLAN Data Plane Cisco Nexus 1000VE Series Virtual Switch VMware vSphere Virtual Switches Introducing Basic Data Center Storage Concepts Storage Connectivity Options in the Data Center Fibre Channel Storage Networking VSAN Configuration and Verification Describing Fibre Channel Communication Between the Initiator Server and the Target Storage Fibre Channel Layered Model FLOGI Process Fibre Channel Flow Control Describing Fibre Channel Zone Types and Their Uses Fibre Channel Zoning Zoning Configuration Zoning Management Describing Cisco NPV Mode and NPIV Cisco NPV Mode NPIV Mode Describing Data Center Ethernet Enhancements IEEE Data Center Bridging Priority Flow Control Enhanced Transmission Selection DCBX Protocol Congestion Notification Describing FCoE Cisco Unified Fabric FCoE Architecture FCoE Initialization Protocol FCoE Adapters Describing Cisco UCS Components Physical Cisco UCS Components Cisco Fabric Interconnect Product Overview Cisco IOM Product Overview Cisco UCS Mini Cisco IMC Supervisor Cisco Intersight Describing Cisco UCS Manager Cisco UCS Manager Overview Identity and Resource Pools for Hardware Abstraction Service Profiles and Service Profile Templates Cisco UCS Central Overview Cisco HyperFlex Overview Using APIs Common Programmability Protocols and Methods How to Choose Models and Processes Describing Cisco ACI Cisco ACI Overview Multitier Applications in Cisco ACI Cisco ACI Features VXLAN in Cisco ACI Unicast Traffic in Cisco ACI Multicast Traffic in Cisco ACI Cisco ACI Programmability Common Programming Tools and Orchestration Options Describing Cloud Computing Cloud Computing Overview Cloud Deployment Models Cloud Computing Services Lab outline Explore the Cisco NX-OS CLI Explore Topology Discovery Configure HSRP Configure vPCs Configure VRF Explore the VDC Elements Install ESXi and vCenter Configure VSANs Validate FLOGI and FCNS Configure Zoning Configure Unified Ports on a Cisco Nexus Switch and Implement FCoE Explore the Cisco UCS Server Environment Configure a Cisco UCS Service Profile Configure Cisco NX-OS with APIs Explore the Cisco UCS Manager XML API Management Information Tree Explore Cisco ACI

Understanding Cisco Data Center Foundations (DCFNDU) v1.1
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry

Android Studio Development Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who want to learn how to program Android applications using the Java Programming Language. Overview Upon successful completion of this course, students will have an understanding of basic application Android development. This course will teach the basics of Android Development using the Java Programming Language and Android Studio. Introduction and Setup Android Studio Development Essentials Introduction Setting up an Android Studio Development Environment Creating an Example Android App in Android Studio A Tour of the Android Studio User Interface Creating an Android Virtual Device (AVD) in Android Studio Using and Configuring the Android Studio AVD Emulator Testing Android Studio Apps on a Physical Android Device The Basics of the Android Studio Code Editor Android Architecture and State Changes An Overview of the Android Architecture The Anatomy of an Android Application Understanding Android Application and Activity Lifecycles Handling Android Activity State Changes Android Activity State Changes by Example Saving and Restoring the State of an Android Activity Views and Layouts Understanding Android Views, View Groups and Layouts in Android Studio A Guide to the Android Studio Layout Editor Tool A Guide to the Android ConstraintLayout A Guide to using ConstraintLayout in Android Studio An Android Studio Layout Editor ConstraintLayout Tutorial Manual XML Layout Design in Android Studio Creating an Android User Interface in Java Code Event Handling An Overview and Example of Android Event Handling A Guide to using Instant Run in Android Studio Android Touch and Multi-touch Event Handling Detecting Common Gestures using Android Studio and the Gesture Detector Class Implementing Custom Gesture and Pinch Recognition on Android Advanced Layout and Transitions An Introduction Android Fragments Using Fragments in Android Studio - An Example Creating and Managing Overflow Menus on Android Animating User Interfaces with the Android Transitions Framework An Android Transition Tutorial using beginDelayedTransition Implementing Android Scene Transitions ? A Tutorial Working with the Floating Action Button and Snackbar Creating a Tabbed Interface using the TabLayout Component Working with the RecyclerView and CardView Widgets An Android RecyclerView and CardView Tutorial Working with the AppBar and Collapsing Toolbar Layouts Implementing an Android Navigation Drawer An Android Studio Master/Detail Flow Tutorial Intents, Threads, Services, and Notifications An Overview of Android Intents Android Explicit Intents ? A Worked Example Android Implicit Intents ? A Worked Example Android Broadcast Intents and Broadcast Receivers A Basic Overview of Threads and Thread Handlers An Overview of Android Started and Bound Services Implementing an Android Started Service - A Worked Example Android Local Bound Services - A Worked Example Android Remote Bound Services - A Worked Example An Android 7 Notifications Tutorial An Android 7 Direct Reply Notification Tutorial Data Access and Storage Integrating Firebase Support into an Android Studio Project An Android 7 Firebase Remote Notification Tutorial An Introduction to Android 7 Multi-Window Support An Android Studio Multi-Window Split-Screen and Freeform Tutorial An Overview of Android SQLite Databases in Android Studio An Android TableLayout and TableRow Tutorial An Android SQLite Database Tutorial Understanding Android Content Providers Implementing an Android Studio Content Provider in Android Studio Accessing Cloud Storage using the Android Storage Access Framework An Android Storage Access Framework Example Multimedia, Maps and Printing Video Playback on Android VideoView and MediaController Classes Video Recording and Image Capture using Camera Intents Making Runtime Permission Requests in Android Android Audio Recording and Playback using MediaPlayer and MediaRecorder Working with the Google Maps Android API in Android Studio Printing with the Android Printing Framework An Android HTML and Web Content Printing Example A Guide to Android Custom Document Printing Final Build An Android Fingerprint Authentication Tutorial Handling Different Android Devices and Displays Signing and Preparing an Android Application for Release Integrating Google Play In-app Billing into an Android Application An Overview of Gradle in Android Studio An Android Studio Gradle Build Variants Example Additional course details: Nexus Humans Android Studio Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Studio Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Android Studio Development Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry