Duration 3 Days 18 CPD hours This course is intended for Experienced software developers who are already familiar with AWS services Overview In this course, you will learn how to: Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture Recommend the appropriate AWS services to develop a microservices based cloud-native application Use the AWS API, CLI, and SDKs to monitor and manage AWS services Migrate a monolithic application to a microservices application using the 6 Rs of migration Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture. This three-day advanced course covers advanced development topics such as architecting for a cloud-native environment; deconstructing on-premises, legacy applications and repackaging them into cloud-based, cloud-native architectures; and applying the tenets of the Twelve-Factor Application methodology. Module 1: The cloud journey Common off-cloud architecture Introduction to Cloud Air Monolithic architecture Migration to the cloud Guardrails The six R?s of migration The Twelve-Factor Application Methodology Architectural styles and patterns Overview of AWS Services Interfacing with AWS Services Authentication Infrastructure as code and Elastic Beanstalk Demonstration: Walk through creating base infrastructure with AWS CloudFormation in the AWS console Hands-on lab 1: Deploy your monolith application using AWS Elastic Beanstalk Module 2: Gaining Agility DevOps CI/CD Application configuration Secrets management CI/CD Services in AWS Demonstration: Demo AWS Secrets Manager Module 3: Monolith to MicroServices Microservices Serverless A look at Cloud Air Microservices using Lambda and API Gateway SAM Strangling the Monolith Hands-on lab: Using AWS Lambda to develop microservices Module 4: Polyglot Persistence & Distributed Complexity Polyglot persistence DynamoDB best practices Distributed complexity Steps functions Module 5: Resilience and Scale Decentralized data stores Amazon SQS Amazon SNS Amazon Kinesis Streams AWS IoT Message Broker Serverless event bus Event sourcing and CQRS Designing for resilience in the cloud Hands-on lab: Exploring the AWS messaging options Module 6: Security and Observability Serverless Compute with AWS Lambda Authentication with Amazon Cognito Debugging and traceability Hands-on lab: Developing microservices on AWS Additional course details: Nexus Humans Advanced Developing on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Developing on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Business Analysis principles and techniques. Key areas are: The breath of the role of a Business Analyst The processes and techniques of strategy analysis Investigation of an organization's business systems Techniques used within stakeholder analysis and the need for analyzing perspectives Conceptual modelling and business activity models Business improvements through gap analysis The Business case within the business change lifecycle The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The course provides in-depth knowledge and practice in Business Analysis Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Practice Exam Details Business Analysis Certification Scheme Rationale for Business Analysis The role of the BA throughout the stages of the Business change lifecycle The scope of the BA role within the context of the range of analysis activities Three areas of competencies Understanding the Strategic Context Techniques in practice: MOST Resource audit PESTLE Porter's Five Forces SWOT analysis CSF, KPI and Performance target Balanced Business Score Card Understanding the Current Situation Identification of stakeholder categories Identification of relevant investigation techniques The rationale for taking a holistic view Rich pictures, Mind Maps and Fishbone diagrams Stakeholder Analysis and Management Power/interest and level of interest Appropriate stakeholder management strategy Stakeholder perspectives and CATWOE technique Analysing and Modelling Business Activities Conceptual models of a business situation Five types of high level activity Planning activities Enabling activities Doing activities Monitoring and control activities Three types of business events The consensus business activity model Identifying Potential Solutions Different categories of business rules Gap analysis (through conceptual business activity model and as-is business situation) Components of a new business model Building the Business Case Rationale for the development of a business case Contents of a business case Identification of tangible/intangible costs and benefits, risks and impacts Rationale for the financial case and appraisal techniques Business case review in the business change lifecycle Additional course details: Nexus Humans Business Analysis - Practice training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Practice course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Anyone who works with IBM SPSS Statistics and wants to learn advanced statistical procedures to be able to better answer research questions. Overview Introduction to advanced statistical analysis Group variables: Factor Analysis and Principal Components Analysis Group similar cases: Cluster Analysis Predict categorical targets with Nearest Neighbor Analysis Predict categorical targets with Discriminant Analysis Predict categorical targets with Logistic Regression Predict categorical targets with Decision Trees Introduction to Survival Analysis Introduction to Generalized Linear Models Introduction to Linear Mixed Models This course provides an application-oriented introduction to advanced statistical methods available in IBM SPSS Statistics. Students will review a variety of advanced statistical techniques and discuss situations in which each technique would be used, the assumptions made by each method, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for predicting variables, as well as methods to cluster variables and cases. Introduction to advanced statistical analysis Taxonomy of models Overview of supervised models Overview of models to create natural groupings Group variables: Factor Analysis and Principal Components Analysis Factor Analysis basics Principal Components basics Assumptions of Factor Analysis Key issues in Factor Analysis Improve the interpretability Use Factor and component scores Group similar cases: Cluster Analysis Cluster Analysis basics Key issues in Cluster Analysis K-Means Cluster Analysis Assumptions of K-Means Cluster Analysis TwoStep Cluster Analysis Assumptions of TwoStep Cluster Analysis Predict categorical targets with Nearest Neighbor Analysis Nearest Neighbor Analysis basics Key issues in Nearest Neighbor Analysis Assess model fit Predict categorical targets with Discriminant Analysis Discriminant Analysis basics The Discriminant Analysis model Core concepts of Discriminant Analysis Classification of cases Assumptions of Discriminant Analysis Validate the solution Predict categorical targets with Logistic Regression Binary Logistic Regression basics The Binary Logistic Regression model Multinomial Logistic Regression basics Assumptions of Logistic Regression procedures Testing hypotheses Predict categorical targets with Decision Trees Decision Trees basics Validate the solution Explore CHAID Explore CRT Comparing Decision Trees methods Introduction to Survival Analysis Survival Analysis basics Kaplan-Meier Analysis Assumptions of Kaplan-Meier Analysis Cox Regression Assumptions of Cox Regression Introduction to Generalized Linear Models Generalized Linear Models basics Available distributions Available link functions Introduction to Linear Mixed Models Linear Mixed Models basics Hierachical Linear Models Modeling strategy Assumptions of Linear Mixed Models Additional course details: Nexus Humans 0G09A IBM Advanced Statistical Analysis Using IBM SPSS Statistics (v25) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G09A IBM Advanced Statistical Analysis Using IBM SPSS Statistics (v25) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Sales engineers Account managers Networking engineers Technical and non-technical audiences Overview After taking this course, you should be able to: Understand the role that programmable infrastructure is having on the transition to the digital enterprise Describe Cisco DNA, its components and benefits, and explain a few use cases Describe the different technologies and solutions within the Cisco programmable infrastructure portfolio Describe Cisco DNA Center REST APIs Understand the functionality provided by Cisco WebEx Teams Describe Cisco CMX, services, and related APIs Describe the importance of DevOps culture within network operations in the shift to becoming a digital enterprise The Programming Use Cases for Cisco Digital Network Architecture (DNAPUC) v1.0 course highlights the shift toward the digital enterprise and examines the components, benefits, and use cases of Cisco Digital Network Architecture (Cisco DNA?) in an enterprise environment. You will learning about key platforms including Cisco© DNA Center, Cisco WebEx Teams?, Cisco Connected Mobile Experiences (CMX), and their related APIs. This course also covers open standards, tools, and network APIs that you can use to complement the Cisco DNA software portfolio, including Python, JavaScript Object Notation (JSON), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Next Generation (YANG). Understanding Programmable Infrastructure Digital Enterprise Four Pillars of Digitization Network Programmability and Automation What Should Be Automated? Quantifying Programmability and Automation for the Business Network Programmability and Automation Use Cases Introducing Cisco DNA Cisco DNA Overview Cisco DNA Components Benefits of Cisco DNA Cisco DNA Use Cases Describing Programmable Infrastructure Cisco Programmability Options Data Center Infrastructure Enterprise Network Programmability Streaming Telemetry Collaboration Management, Monitoring, and Analytics Describing Network APIs How APIs Enable Business Automation API Overview Data Encoding with JSON and XML RESTful APIs RESTCONF and NETCONF Overview Data Modeling with YANG Describing Cisco DNA Center APIs Cisco DNA Center Overview Cisco DNA Center Automation Enterprise Benefits Cisco DNA Center Applications and Use Cases Cisco DNA Center REST API Overview Case Study: Network Automation at Symantec Describing Cisco Collaboration APIs Cisco Webex Teams Overview Cisco Webex Teams Business Benefits Cisco Webex Teams API Overview Describing Cisco Mobility APIs Cisco CMX Overview Cisco CMX Programmability Business Benefits Cisco CMX Mobility Services API Overview Case Study: Victoria University and Cisco CMX Implementing DevOps Culture Within Network Operations Transition to DevOps CALMS Model (Culture, Automation, Lean, Measurement, Sharing) Role of Cisco Technology in the Transition to DevOps Additional course details: Nexus Humans Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Java Developers with a minimum of 2 years of experience and individuals who want to become application security engineers/analysts/testers Individuals involved in the role of developing, testing, managing, or protecting wide area of applications. Overview In-depth understanding of secure SDLC and secure SDLC models Knowledge of OWASP Top 10, threat modelling, SAST and DAST Capturing security requirements of an application in development Defining, maintaining, and enforcing application security best practices The Certified Application Security Engineer (CASE) training and certification program provides a comprehensive application security approach which encompasses security activities involved in all the phases of Software Development Lifecycle (SDLC). Understanding Application Security, Threats, and AttacksSecurity Requirements GatheringSecure Application Design and ArchitectureSecure Coding Practices for Input ValidationSecure Coding Practices for Authentication and AuthorizationSecure Coding Practices for CryptographySecure Coding Practices for Session ManagementSecure Coding Practices for Error HandlingStatic and Dynamic Application Security Testing (SAST & DAST)Secure Deployment and Maintenance
Duration 5 Days 30 CPD hours This course is intended for Administrator Developer System Integrator Systems Administrator Overview Install WebLogic Server 12c Deploy applications to WebLogic Server Deploy share libraries and application that use them to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Configure WebLogic Server's authentication provider This Oracle WebLogic Server 12c: Administration I training teaches you how to perform the most important Oracle WebLogic Server 12c administrative tasks., and gives an overview of the architecture and concepts of Oracle WebLogic Server 12c. WebLogic Server OverviewInstalling and Patching WebLogic ServerCreating DomainsStarting ServersUsing the Administration ConsoleConfiguring JDBCMonitoring a DomainNode ManagerDeploying ApplicationsShared Java EE LibrariesNetwork Channels and Virtual HostsClusters: Overview, Create, & ConfigClusters: Proxies & SessionsClusters: Communication, Planning & TroubleshootingTransactionsWebLogic Server SecurityBacking Up a Domain and Upgrading WebLogic Server
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course are as follows: Technical professionals, including system engineers, technical support personnel, channel partners, and resellers, who need to know how to deploy Cisco ASR 9000 Series routers in their network environment Overview Upon completing this course, the learner will be able to meet these overall objectives: Major features and benefits of a Cisco ASR 9000 Series router Major features and benefits of the Cisco IOS XR Software operating system Data flow through the Cisco ASR 9000 Series router Configure the Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration Install the Cisco IOS XR operating system, package information envelopes (PIEs), and software maintenance updates (SMUs) Enable multicast routing on a Cisco ASR 9000 Series router Configure Multiprotocol Label Switch-Traffic Engineering (MPLS-TE) on a Cisco ASR 9000 Series router Configure Layer 3 VPN services Configure Ethernet link bundles Configure local E-Line L2VPN Configure Ethernet over MPLS E-Line L2VPN Configure EoMPLS with pseudowire backup Configure local E-LAN L2VPN Configure link-based Ethernet operations, administration, and maintenance (E-OAM) Configure virtual private LAN service (VPLS) L2VPN Configure VPLS with Border Gateway Protocol (BGP) autodiscover Configure service-based connectivity fault management (CFM) Multiple Spanning Tree-Access Gateway (MST-AG) Configure Layer 2 multicast features Basic QoS implementation How to configure and verify network virtualization (nV) on the ASR 9000 series In this 4-day course, Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE), you will learn about the features and functions of the Cisco ASR 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware; software; Layer 2 and Layer 3 services; Layer 2 and Layer 3 multicast; operations, administration, and management (OAM); quality of service (QoS) features; and network virtualization. Course Outline Introduction to the Cisco ASR 9000 Aggregation Series Cisco ASR 9000 Hardware Cisco IOS XR Software Overview Cisco IOS XR Software Basics Cisco IOS XR Software Installation Cisco IOS XR Software Operations Cisco IOS XR Routing Protocols Layer 3 Multicast Cisco IOS XR MPLS Cisco IOS XR Layer 3 VPN Cisco ASR 9000 Layer 2 Architecture Cisco ASR 9000 Point-to-Point Layer 2 Services Cisco ASR 9000 Multipoint Layer 2 Services Cisco ASR 9000 Operations, Administration, and Maintenance Cisco ASR 9000 Layer 2 Multicast Cisco ASR 9000 QoS Cisco ASR 9000 Network Virtualization Additional course details: Nexus Humans Cisco ASR 9000 Aggregation Services Router Series Essentials v6.1 (ASR9KE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ASR 9000 Aggregation Services Router Series Essentials v6.1 (ASR9KE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for experienced integration specialists and senior-level developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of IBM App Connect Enterprise Develop, deploy, and test message flow applications Generate message flow applications from predefined patterns Use the IBM App Connect Enterprise Toolkit problem determination aids to diagnose and solve development and runtime errors Describe the function and appropriate use of IBM App Connect Enterprise processing nodes Write basic Extended Structured Query Language and Java programs to transform data Use the IBM Graphical Data Mapping editor to transform data Define, use, and test simple XML and Data Format Description Language (DFDL) data models Describe supported transport protocols and how to call them in message flows IBM App Connect Enterprise provides connectivity and universal data transformation in heterogeneous IT environments. It enables businesses of any size to eliminate point-to-point connections and batch processing, regardless of operating system, protocol, and data format. This course teaches you how to use IBM App Connect Enterprise to develop, deploy, and support message flow applications. These applications use various messaging topologies to transport messages between service requesters and service providers, and allow the messages to be routed, transformed, and enriched during processing. In this course, you learn how to construct applications to transport and transform data. The course explores how to control the flow of data by using various processing nodes, and how to use databases and maps to transform and enrich data during processing. You also learn how to construct data models by using the Data Format Description Language (DFDL) Course Outline Introduction to IBM App Connect Enterprise Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Additional course details: Nexus Humans WM668G IBM App Connect Enterprise V11 Application Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM668G IBM App Connect Enterprise V11 Application Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.