• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

39890 Courses delivered Online

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware HCX: Management and Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System administrators System engineers Migration engineers Migration architects Overview By the end of the course, you should be able to meet the following objectives: Describe core VMware HCX use cases and common triggers for mobility Describe the core components and features of VMware HCX Describe a real-life example of a VMware HCX project Identify all major Cloud Providers offering and supporting VMware HCX Describe the features of VMware HCX services Explain the different deployment types for VMware HCX and choose the correct components to deploy for a particular use case Understand the resource, network, and VMware ESXi™ and VMware vCenter requirements for VMware HCX Install and configure VMware HCX Understand, deploy, and manage the HCX Service Mesh Understand Network Extension and Traffic Engineering Create Network Extension and enable Mobility Optimized Networking Understand WAN Optimization Understand the different migration types and be able to choose the best one for different applications and workloads Incorporate VMware HCX into a disaster recovery strategy Design a VMware HCX deployment for different use cases Manage the lifecycle of VMware HCX This four-day course gives you knowledge and practical exercises sufficient to manage VMware HCX© and to migrate virtual machines using VMware HCX. The course focuses on configuration and management of VMware HCX. The course equips system administrators with the knowledge, skills, and abilities to achieve competence in migrating virtual machines. Course Introduction Introductions and course logistics Course objectives Introduction to VMware HCX Describe workload mobility challenges that VMware HCX addresses Recognize use cases for VMware HCX Identify all major Cloud providers offering and supporting VMware HCX HCX Services and Deployment Types Describe the functions of VMware HCX components Recognize the services provided by VMware HCX Recognize when to use different deployment types for VMware HCX Be able to choose which components to install and configure for a different VMware HCX service HCX Deployment Identify the resource, network, and ESXi/VMware vCenter server requirements for VMware HCX Understand the VMware vCenter user roles and access requirements Describe the installation workflow Install, activate, and configure VMware HCX manager Understand the compute and network profile requirements for VMware HCX and its services Create site pair, compute, and network profiles Describe and manage the HCX Service Mesh Create and configure a HCX Service Mesh Network Extension Describe network extension use case and benefits Compare the HCX-Network extension service with other solutions Examine Network Extension capabilities and topology Create a Network Extension Describe network traffic packet flow Describe Mobility Optimized Networking Enable Mobility Optimized Networking Describe the TCP Flow Conditioning and Application path resiliency feature of VMware HCX Recognize the key benefits of TCP flow conditioning and Application path resiliency Describe WAN optimization Workload Mobility Describe different migration types Recognize the limitation of each migration method and consideration when planning a migration Understand Bulk and Replication Assisted VMware HCX© vMotion© migration methods Migrate a VM using Bulk migration Describe cold and vMotion migration method Migrate a VM using HCX vMotion migration Examine non VMware vSphere© workload migration Migrate a VM using an OS assisted migration method Business Continuity and Disaster Recovery Examine disaster recovery concepts Describe disaster recovery networks Plan and create disaster recovery networks Describe VM protection operations Protect, recover, and test recovery and reverse replication of a VM Understand VMware HCX and SRM integration and value HCX Lifecycle Management Backup and restore the VMware HCX manager Locate and access VMware HCX logs Troubleshoot VMware HCX Plan for VMware HCX manager and component updates Customer Design Scenarios Design a VMware HCX deployment Choose workload mobility methods for the migration Discuss customer requirements and proposed design Discuss components, services, and migration methods for the scenario

VMware HCX: Management and Operations
Delivered OnlineFlexible Dates
Price on Enquiry

iPhone Mobile App Development

By Nexus Human

Duration 5 Days 30 CPD hours The iPhone combines technologies of smartphones and personal computing. With a multitouch screen, built-in accelerometer and virtual keyboard, the iPhone also requires the mobile application developer to adopt a vastly different software design philosophy. With over a billion mobile apps sold, iPhone Programming is a critical part of the future of mobile technology. This five day course teaches the attendee all aspects of iOS mobile app development Introduction and Setup Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement Overview of Swift Functions The Basics of Object Oriented Programming in Swift Swift Subclassing and Extensions Arrays and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, and Storyboards Creating an Interactive iOS App Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Size Classes to Design Adaptable Universal iOS User Interfaces Using Storyboards in Xcode Organizing Scenes over Multiple Xcode Storyboard Files Using Xcode Storyboards to Create an iOS Tab Bar Application Working with the iOS Stack View Class iOS Stack View Tutorial iOS Split View Master-Detail Example Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController iOS UIPageViewController Application Data Storage with Files, iCloud, and Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS iOS Directory Handling and File I/O in Swift Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite SQLite based iOS Application using Swift and FMDB Working with iOS Databases using Core Data iOS Core Data Introduction to CloudKit Data Storage on iOS iOS CloudKit Example iOS CloudKit Subscription Example Touch, Taps, and Gestures An Overview of iOS Multitouch, Taps and Gestures iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS Gesture Recognition iOS 3D Touch Force Handling iOS 3D Touch Quick Actions iOS 3D Touch Peek and Pop Advanced View Options Basic iOS Animation using Core Animation iOS UIKit Dynamics ? An Overview Introduction to iOS Sprite Kit Programming iOS Sprite Kit Level Editor Game iOS Sprite Kit Collision Handling Extensions Introduction to Extensions in iOS iOS Today Extension Widget Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Multimedia, Facebook, and Twitter Accessing the iOS Camera and Photo Library iOS Camera Application iOS Video Playback using AVPlayer and AVPlayerViewController iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder The App Store Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iPhone Mobile App Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPhone Mobile App Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

iPhone Mobile App Development
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build Application Architect Expertise (ARC901)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Application Architect Expertise (ARC901)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Troubleshooting [V8.6]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and cloud administrators who are already familiar with vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Learn installation best practices and troubleshoot installation failures Verify the correct DNS configuration Examine main logs and collect log bundles Examine the Kubernetes pods in the vRealize Automation architecture Troubleshoot common errors that prevent successful deployments Troubleshoot YAML code errors in VMware cloud templates Troubleshoot cloudConfig code errors in VMware cloud templates Troubleshoot VMware Identity Manager™ configuration errors Troubleshoot common errors in VMware vRealize Orchestrator™ workflows Use the vRealize Orchestrator debugger Use log outputs from vRealize Orchestrator Troubleshoot problems in custom resources Troubleshoot problems in resource actions Troubleshoot action-based extensibility (ABX) actions Integrate vRealize Automation with VMware vRealize Log Insight™ Integrate vRealize Automation with VMware vRealize Operations Manager™ Use VMware vRealize Lifecycle Manager™ to troubleshoot vRealize Automation problems with licenses and certificates Configure and replace certificates This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in troubleshooting VMware vRealize Automation™. vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. This course will enable you to troubleshoot common problems with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives Troubleshooting vRealize Automation Installation Issues vRealize Automation installation overview vRealize Automation installation best practices Troubleshooting installation failures vRealize Automation General Troubleshooting Verifying the DNS configuration settings in vRealize Automation and vSphere Examining the main logs in the user interface Collecting a log bundle Using vracli commands Examining the pods in the vRealize Automation Kubernetes architecture Dumping a log from a vRealize Automation Kubernetes pod Stopping and restarting a vRealize Automation Kubernetes pod vRealize Automation Cloud Templates and Deployment Troubleshooting Overview of provisioning and placement workflows Examining a deployment history Troubleshooting deployment issues Using deployment Dev mode Troubleshooting YAML code Troubleshooting problems with cloudConfig vRealize Automation Identity Manager Architecture and Cluster Architecture Authentication workflow in vRealize Automation Connector high availability for the authentication Architecture of a VMware Identity Manager cluster Key VMware Identity Manager commands and log files Troubleshooting a VMware Identity Manager problem Key vRealize Automation components Architecture of the vRealize Automation cluster vRealize Automation node failover scenario vRealize Automation cluster shutdown and startup process Virtual machine provisioning workflow Troubleshooting vRealize Orchestrator Workflows Overview of vRealize Orchestrator and vRealize Automation communications Using the vRealize Orchestrator debugger Using vRealize Orchestrator log output Troubleshooting vRealize Orchestrator binding errors Troubleshooting vRealize Orchestrator logic errors Troubleshooting vRealize Orchestrator payload errors Troubleshooting custom resource errors Troubleshooting resource action errors Troubleshooting Action Based Extensibility (ABX) Actions Overview of ABX actions Troubleshooting ABX actions vRealize Automation Integration with vRealize Tools Integrating vRealize Automation and vRealize Log Insight Integrating vRealize Automation and vRealize Operations Manager Using vRealize Operations Manager to monitor vRealize Automation vRealize Automation Certificate Management Managing vRealize Automation certificates Creating certificate requests with vRealize Lifecycle Manager Using Microsoft Certificate Services to create vRealize Automation certificates Replacing vRealize Automation certificates Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Automation: Troubleshooting [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Automation: Troubleshooting [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Automation: Troubleshooting [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction Perl Programming Essentials (TT4925)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files

Introduction Perl Programming Essentials (TT4925)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Tuning (TTOR21519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate-level course requires students have incoming experience working with Oracle Database 18 or higher. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore: The Oracle Database Architecture Query Optimizer Tuning Container Databases and Pluggable Databases Oracle 19c Tuning features Evaluating Execution Plans Oracle Tuning Tools Using Automatic Workload Repository Join Types AWR Using Baselines Additional AWR performance tools Optimizer Statistics Monitoring a Service Bind Variables and database parameters Oracle's Real Application Testing (RAT) SQL Tuning Advisor Automatic Sql Tuning Sql Plan Management Shared Pool Tuning Tuning the database buffer cache Tuning the PGA (Program Global Area) Automatic Memory Management (AMM) Tuning Segment Space Utilization (ASSM) Automatic Storage Management Oracle 19C Database Tuning is an intermediate level course for Oracle database experienced attendees that explores core tuning skills such as Database parameters, SQL Tuning Advisor, SQL Access Advisor, Adaptive SQL plans and more. Overview Oracle Database Architecture Instance Definition Define SGA Define Background Processes Datafile Definition Query Optimizer SQL Parsing Optimizing Terms Optimizing Methods Query Plan Generation Query Plan Control Tuning Container Databases and Pluggable Databases Pluggable tuning parameters Define Container tuning structure Using PDB$SEED Create a new PDB Plug and unplug a PDB Oracle 12c Tuning features Identifying and Using Oracle's Heat Map 12c Compression Levels and Types Evaluating Execution Plans Defining SQL execution plans Automatic Workload Repository Reading execution plans Oracle Tuning Tools Monitoring tools overview Enterprise Manager Dynamic Performance Views Automatic Workload Repository Automatic Database Diagnostic Monitor Sql Tuning Advisor SQL Access Advisor Sql Access Advisor DB operation Tuning DB operation Active Reporting Using Automatic Workload Repository Defining AWR AWR Settings Creating AWR Baselines Metrics, Alerts, and Thresholds Defining Metrics Setting Alerts Setting Corrective Actions User Defined Metrics Metric Dynamic Views Join Types Nested Loops Join Sort Merge join Hash Join and Cartesian Join Equijoins and Nonequijoins Outer Joins Semijoins AWR Using Baselines Creating AWR baselines Creating AWR Repeating baselines Moving Window Baseline Additional AWR performance tools Automatic Maintenance Tasks Segment Advisor Statistics Gathering Automatic Tuning Optimizer Automatic Database Diagnostic Monitor Active Session History (ASH) Optimizer Statistics Optimizer Statistics Overview Table and Index Statistics Statistic Preferences Statistics Gathering e) Locking Statistics, Export/Import Statistics Pending and published statistics Optimizer Hints Optimizer Paths Cost Base Optimization Monitoring a Service Overview of what is an Oracle Service Creating an Oracle Service for Single instance and RAC Monitoring a Service Resource Management and a Service Enterprise Manager and a Service Bind Variables and database parameters Bind variable definition Cursor_sharing parameter Adaptive Cursor Sharing Oracle's Real Application Testing (RAT) Sql Performance Analyzer overview Sql Performance Analyzer Options Database Parameter changes Database version changes Creating SQL Tuning Sets Database Replay Overview Database Replay Configuration Database Replay Options SQL Tuning Advisor SQL Tuning Advisor: Overview SQL Tuning Advisor Limited Mode Sql Tuning Advisor Comprehensive mode Sql Tuning Profiles SQL Access Advisor SQL Access Advisor: Overview Sql Access Advisor options SQL Access Advisor and Sql Tuning Sets Sql Access Advisor and AWR Results and Implementation Automatic Sql Tuning Automatic Sql Tuning Maintenance Task Automatic Tuning Optimization implementation(ATO) Automatic Tuning Optimization Results Enable/Disable Automatic Tuning Optimization Sql Plan Management Sql plan Management and baseline overview Enable sql plan management Loading Sql Plan baselines into the SGA Adaptive plan management Shared Pool Tuning Shared pool architecture Shared pool parameters Library Cache Dictionary cache Large pool considerations and contents Tuning the database buffer cache Database buffer cache overview Database buffer cache parameters Oracle and Dirty reads and writes Automatic Shared Memory Management (ASMM) Buffer Cache goals and responsibility Buffer Cache pools Tuning the PGA (Program Global Area) PGA Overview PGA Database Parameters Temporary Segments Temporary Tablespace Sizing the PGA Automatic Memory Management (AMM) Oracle's Automatic Memory Management Overview Database Auto-tuned Parameters Database Non Auto-tuned Parameters Automatic Memory Management Hints and Sizing suggestions AMM versus ASMM Tuning Segment Space Utilization (ASSM) Overview of Automatic Segment Space Management Defining the DB_BLOCK_SIZE Defining DB_nk_CACHE_SIZE parameter The DB_BLOCK_SIZE Parameter Overview of table compression, block chaining, and block migration Automatic Storage Management Overview of ASM Definition of Grid Infrastructure ASM Instance ASM Diskgroups ASM Diskgroup parameters and templates ASMCMD

Oracle 19c Database Tuning (TTOR21519)
Delivered OnlineFlexible Dates
Price on Enquiry

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)
Delivered OnlineFlexible Dates
Price on Enquiry

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. What is Robotic Process Automation? Scope and techniques of automation Robotic process automation About UiPath The future of automation Record and Play UiPath stack Downloading and installing UiPath Studio Learning UiPath Studio Task recorder Step-by-step examples using the recorder Sequence, Flowchart, and Control Flow Sequencing the workflow Activities Control flow, various types of loops, and decision making Step-by-step example using Sequence and Flowchart Step-by-step example using Sequence and Control flow Data Manipulation Variables and scope Collections Arguments ? Purpose and use Data table usage with examples Clipboard management File operation with step-by-step example CSV/Excel to data table and vice versa (with a step-by-step example) Taking Control of the Controls Finding and attaching windows Finding the control Techniques for waiting for a control Act on controls ? mouse and keyboard activities Working with UiExplorer Handling events Revisit recorder Screen Scraping When to use OCR Types of OCR available How to use OCR Avoiding typical failure points Tame that Application with Plugins and Extensions Terminal plugin SAP automation Java plugin Citrix automation Mail plugin PDF plugin Web integration Excel and Word plugins Credential management Extensions ? Java, Chrome, Firefox, and Silverlight Handling User Events and Assistant Bots What are assistant bots? Monitoring system event triggers Monitoring image and element triggers Launching an assistant bot on a keyboard event Exception Handling, Debugging, and Logging Exception handling Common exceptions and ways to handle them Logging and taking screenshots Debugging techniques Collecting crash dumps Error reporting Managing and Maintaining the Code Project organization Nesting workflows Reusability of workflows Commenting techniques State Machine When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file Integrating a TFS server Deploying and Maintaining the Bot Publishing using publish utility Overview of Orchestration Server Using Orchestration Server to control bots Using Orchestration Server to deploy bots License management Publishing and managing updates

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry