Duration 1 Days 6 CPD hours This course is intended for This course is intended for data warehouse engineers, data platform engineers, and architects and operators who build and manage data analytics pipelines. Completed either AWS Technical Essentials or Architecting on AWS Completed Building Data Lakes on AWS Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a data warehouse analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service. The course focuses on the data collection, ingestion, cataloging, storage, and processing components of the analytics pipeline. You will learn to integrate Amazon Redshift with a data lake to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon Redshift. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Using Amazon Redshift in the Data Analytics Pipeline Why Amazon Redshift for data warehousing? Overview of Amazon Redshift Module 2: Introduction to Amazon Redshift Amazon Redshift architecture Interactive Demo 1: Touring the Amazon Redshift console Amazon Redshift features Practice Lab 1: Load and query data in an Amazon Redshift cluster Module 3: Ingestion and Storage Ingestion Interactive Demo 2: Connecting your Amazon Redshift cluster using a Jupyter notebook with Data API Data distribution and storage Interactive Demo 3: Analyzing semi-structured data using the SUPER data type Querying data in Amazon Redshift Practice Lab 2: Data analytics using Amazon Redshift Spectrum Module 4: Processing and Optimizing Data Data transformation Advanced querying Practice Lab 3: Data transformation and querying in Amazon Redshift Resource management Interactive Demo 4: Applying mixed workload management on Amazon Redshift Automation and optimization Interactive demo 5: Amazon Redshift cluster resizing from the dc2.large to ra3.xlplus cluster Module 5: Security and Monitoring of Amazon Redshift Clusters Securing the Amazon Redshift cluster Monitoring and troubleshooting Amazon Redshift clusters Module 6: Designing Data Warehouse Analytics Solutions Data warehouse use case review Activity: Designing a data warehouse analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures
Duration 4 Days 24 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow. The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks Build incident layouts that enable analysts to triage and investigate incidents efficiently Identify how to categorize event information and map that information to display fields Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration This class is powered by Cloud Harmonics. Course Outline Module 1 - Core Functionality and Feature Sets Module 2 - Enabling and Configuring Integrations Module 3 - Playbook Development Module 4 - Classification and Mapping Module 5 - Layout Builder Module 6 - Solution Architecture Module 7 - Docker Module 8 - Automation Development and Debugging Module 9 - The Marketplace and Content Management Module 10 - Indicators and Threat Intelligence Management Module 11 - Jobs and Job Scheduling Module 12 - Users and Role-Based Access Controls (RBAC) Module 13 - Integration Development Additional course details: Nexus Humans Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for anyone with system administrative duties implementing and managing an AIX operating system in a multiuser POWER (System p) partitioned environment. Overview Install and the AIX operating system, filesets, and RedHat Package Manager (RPM) packages Perform system startup and shutdown Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX Manage physical and logical devices Discuss the purpose of the logical volume manager Perform logical volume, paging space and file system management Create and manage user administration Manage AIX user security including enhanced RBAC and implement customized access of file and directories Perform and restore system backups Utilize administrative subsystems, including cron to schedule system tasks Configure TCP/IP networking Define and run basic Workload Partitions (WPAR) Learn to install, customize, and administer the AIX operating system in a POWER (System p) partitioned environment. This course is based on AIX 7.1 running on a Power7 system managed by HMC version 7. Day 1 Introduction to IBM POWER systems, AIX and system administration AIX system management tools System startup and shutdown AIX installation Day 2 AIX software installation and maintenance System configuration and devices System storage overview Working with the Logical Volume Manager Day 3 File systems administration Paging space Backup and restore Day 4 Security and user administration: Part 1 Security and user administration: Part 2 Scheduling and time TCP/IP networking Day 5 TCP/IP networking (continued) Introduction to workload partitions Additional course details: Nexus Humans AN12 IBM Power Systems for AIX II - AIX Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN12 IBM Power Systems for AIX II - AIX Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Users new to Tableau who will be administering a Tableau Server installation, including managing content, users, and permissions. Overview This skills-focused course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: User interactions with Tableau Server Tableau Server components Single-server installation Content administration Authorization and permissions Users, groups, and sites Data sources and extracts Schedules, tasks, and subscriptions Monitoring server status Command-line utilities and REST API Upgrading a single-server installation to a new version Modifying the authentication method This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions. Tableau Server Overview Tableau Product Line End-User Abilities Tableau Server Architecture Component Functions Server Diagrams Single Server Installation Technical Specifications Tableau Server Installation Checklist Configuration Options Resolutions for Common Installation Issues Installing Tableau Server Software User Experience Content Navigation, Searching, and Filtering Exploring Server Content Types and Objects Updating Account Settings Setting the Start Page Viewing Version Information Renaming a Project Adding a Workbook Description Authorization and Permissions Administrator Settings Authorization Overview Functional Security Model Site Roles Content Ownership and Permissions Permission Rules and Capabilities Permissions and the Default Project Creating Projects, Local Groups, and a Local User Importing Users and Adding Users to Groups Granting Permissions to Projects Creating a Project Leader Publishing and Changing Ownership of a Workbook Moving a Workbook Site Administration Data Sources, Extracts, Schedules, and Subscriptions Creating, Publishing, and Connecting to a Data Source Data Engine and File Store Creating and Publishing Extracts Backgrounder Schedules Subscriptions Enabling Subscriptions and Alerts Automating Server Tasks Automating and Programming Server Tasks Tabadmin Tabcmd Using the REST API Monitoring Server Viewing Server Status Admin Alerts Viewing Email Alerts and Admin Views Enabling Access to the Repository Custom Admin Views Licensing Information Performance Recording Upgrading Tableau Server Preparing to Upgrade Upgrading Software on the Same Machine Modifying the Authentication Method Importing AD Groups Log Files Administration Overview of Log Files Archiving Log Files Data Security Controlling What Users Can See User Filters
Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Use the applications to group objects Create the logical groups of objects in the vRealize Operations environment Create and design advanced dashboards Discuss about widget and its settings Define a vRealize Operations policy Outline the components of a vRealize Operations policy Create the custom alerts Describe the troubleshooting workbench Review the advanced capacity concepts Discuss the what-if analysis scenarios Describe how to integrate vRealize Operations with VMware vRealize© Suite products Import the VMware vRealize© Network Insight? applications Describe the super metrics use cases Outline the vRealize Operations REST API architecture Discuss the vRealize Operations traversal spec Create and query objects using the REST API This two-day hands-on training course provides advanced knowledge, skills, and tools to achieve competency in operating VMware vRealize© Operations? 8.X. This course explains the design and creation of advanced dashboards, capacity concepts, and the REST API with real-world use cases. Course Introduction Introduction and course logistics Course objectives Custom Groups and Applications Outline the use cases for custom groups Create the custom groups Assign the objects to custom groups Identify the use cases for applications Create the custom applications Identify the vRealize Network Insight applications Custom Dashboard Design Design the dashboards Discuss the types of widgets and widget?s settings Select the widgets based on the scenario Explain the advanced dashboards Discuss the use cases of dashboards Custom Policies Outline the components of a vRealize Operations policy Review the policies applied to the objects in vRealize Operations Outline how the policy hierarchy is implemented Design a vRealize Operations Policy Understand how a policy supports the business objectives Alerts, Symptoms and Troubleshooting workbench Identify the use case for custom alerts and symptoms Create the custom alerts and symptoms Access the troubleshooting workbench feature Use the troubleshooting workbench feature to identify problems Outline the metric correlation options in vRealize Operations Capacity Models and What-if Scenarios Review the capacity planning concepts Describe the demand based and allocation-based model Discuss the use cases of capacity models Discuss the use cases of what-if analysis scenarios vRealize Operations integration Integrate vRealize Operations with products in vRealize Suite Identify the advantages of integrating vRealize Operations with vRealize Log Insight Import the vRealize Network Insight applications Configure the integration with vRealize Automation Super Metrics Create super metrics Explain the depth value Discuss the use cases of super metrics vRealize Operations REST API Outline the REST API architecture Navigate the REST API landing page Discuss the Swagger response codes Explain the vRealize Operations traversal specification Create and query objects using the REST API Discuss some of the examples of the REST API
Duration 3 Days 18 CPD hours This course is intended for This course is for computer professionals involved with security compliance using CCS 11.0. Overview At the completion of the course, you will be able to: Describe current security risk and compliance challenges. Define methods of proactive security. Describe CCS 11 and how it helps meet security and compliance needs. Describe general CCS 11.0 pre-deployment considerations. Install CCS 11. Perform initial CCS configuration tasks. Import assets and common fields. Describe how to install CCS Agents. Perform data collection and evaluation. Describe the components of standards. Copy and edit standards. Evaluate collected data in terms of a standard. Describe compliance and risk scores. Manage exceptions. Create, edit, and map control statements. Use Controls Studio to eliminate duplication of controls. Describe mandates, policies, and control statements. Build queries to gather data quickly from assets. Add external data integration and configure data connectors. Use CCS reporting features. Create, edit, and manage dashboards. Investigate contingencies using a ?what if?? analysis in dynamic dashboards. This course focuses on defining security controls that govern the enterprise, assess compliance with standards and other mandates, and create reports and dashboards to demonstrate compliance and show deficiencies to multiple audiences. Introduction to CCS 11.0 Overview of Security and Compliance Proactive Security Into to CCS11 Implementing Security and Compliance with CCS 11.0 Installing the CCS Suite General pre-deployment considerations Pre-installation requirements Installation tasks Initial configuration Getting started tasks Preparing for data collection Getting started with CCS 11.0 Importing assets Installing a UNIX Agent Collecting and evaluating data Standards Manager/CVSS and Risk Score Working with standards Assessing compliance with standards Managing exceptions Controls Studio About Controls Studio Working with Controls Studio Ad hoc queries Query building Querying your enterprise External data integration Connecting to external data sources Overview of third-party connectors Reporting and dashboards Reporting overview Working with dynamic dashboards Additional course details: Nexus Humans Symantec Control Compliance Suite (CCS) 11.0 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Control Compliance Suite (CCS) 11.0 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Architects and operators who build and manage data analytics pipelines Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a batch data analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service. You will learn how Amazon EMR integrates with open-source projects such as Apache Hive, Hue, and HBase, and with AWS services such as AWS Glue and AWS Lake Formation. The course addresses data collection, ingestion, cataloging, storage, and processing components in the context of Spark and Hadoop. You will learn to use EMR Notebooks to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon EMR. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Introduction to Amazon EMR Using Amazon EMR in analytics solutions Amazon EMR cluster architecture Interactive Demo 1: Launching an Amazon EMR cluster Cost management strategies Module 2: Data Analytics Pipeline Using Amazon EMR: Ingestion and Storage Storage optimization with Amazon EMR Data ingestion techniques Module 3: High-Performance Batch Data Analytics Using Apache Spark on Amazon EMR Apache Spark on Amazon EMR use cases Why Apache Spark on Amazon EMR Spark concepts Interactive Demo 2: Connect to an EMR cluster and perform Scala commands using the Spark shell Transformation, processing, and analytics Using notebooks with Amazon EMR Practice Lab 1: Low-latency data analytics using Apache Spark on Amazon EMR Module 4: Processing and Analyzing Batch Data with Amazon EMR and Apache Hive Using Amazon EMR with Hive to process batch data Transformation, processing, and analytics Practice Lab 2: Batch data processing using Amazon EMR with Hive Introduction to Apache HBase on Amazon EMR Module 5: Serverless Data Processing Serverless data processing, transformation, and analytics Using AWS Glue with Amazon EMR workloads Practice Lab 3: Orchestrate data processing in Spark using AWS Step Functions Module 6: Security and Monitoring of Amazon EMR Clusters Securing EMR clusters Interactive Demo 3: Client-side encryption with EMRFS Monitoring and troubleshooting Amazon EMR clusters Demo: Reviewing Apache Spark cluster history Module 7: Designing Batch Data Analytics Solutions Batch data analytics use cases Activity: Designing a batch data analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This Introductory-level course is targeted for aspiring web developers who have software development experience or background. The course can also be adjusted for non-developers upon request. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Introduction to HTML5/ CSS3 and Responsive Design Basics is a hands-on basic web development course geared for developers who need to understand what the latest in web technologies and responsive design practices that are central to targeting the entire spectrum of user platforms and browsers. This comprehensive course provides a balanced mixture of theory and practical labs designed to take students through HTML5 and CSS3. Students who attend this course will leave this course armed with the new skills to design, implement, and deploy robust, flexible, and safe web applications. HTML Define HTML and review its history Look at XHTML and its relationship to HTML Identify HTML limitations and improvements HTML5 HTML5 Overview HTML5 Semantic Structure HTML5 Forms HTML5 Media Delivery CSS Learn the basics of CSS Meaning of cascading in CSS Declaring CSS within your HTML page Creating styles in an external CSS file Control how to display and position HTML elements Overriding standard tag behavior Adding new classes Using custom classes in your page CSS3 Overview What is new in CSS3 The Advantages of CSS3 Browser Support for CSS3 CSS3 Advanced Selectors Selecting Using Attributes Selecting Using DOM Structure Complex Selecting using Pseudo-Classes Selecting Using UI Components and State CSS3 Visual Effects Font Options, Opacity, and Color Distributing Content Across Columns Working with Borders and Boxes Working with Vendor Prefixes Functional Techniques HTML5 JavaScript API Cross-Domain Messaging Working with Web Storage Offline with Application Cache Geolocation: What, Why, and How Responsive Web Design (RWD) Adapting to Varying Screen Sizes Scaling Page and Text Content Scaling and Adapting for Media Options for Adjusting Media Additional course details: Nexus Humans Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This intermediate course is designed for integration specialists and senior-level developers with experience in IBM Integration Bus application development. Overview After completing this course, you should be able to:Use event driven message processing to control the flow of messages by using message aggregation, message collections, message sequences, and time-sensitive nodesTransform data by using Microsoft .NET and XML stylesheetsAnalyze and filter information in complex XML documentsExtend DFDL message modelsUse message sets and the Message Repository Manager (MRM) parserProvide a message flow application as a web serviceRequest a web service from within a message flowDescribe how to implement WS-Addressing and WS-Security standards in IBM Integration BusCreate an integration serviceCreate and implement an IBM MQ request and response service definitionCreate and implement a database service definitionConfigure security-enabled message processing nodesCreate a decision service that implements business rules to provide routing, validation, and transformationExpose a set of integrations as a RESTful web serviceUse a global cache to store static dataRecord and replay data that a message flow application processesImplement publish and subscribe with IBM Integration BusDescribe the workload management options for adjusting the message processing speed, and controlling the actions that are taken on unresponsive flows and threadsConstruct user-defined patternsDescribe how IBM Integration Bus integrates with other IBM products such as IBM WebSphere Enterprise Service Bus and IBM DataPower Appliances This course focuses on using IBM Integration Bus to develop, deploy, and support platform-independent message flow applications and integration services. Course Outline Course introduction Using event driven processing nodes Exercise: Implementing message aggregation Transforming data with Microsoft .NET Transforming data with XSL stylesheets Analyzing XML documents Modeling complex data with DFDL Exercise: Extending a DFDL model Working with message sets and the MRM domain Supporting web services Exercise: Implementing web services Developing integration solutions by using integration services Exercise: Creating an integration service Connecting a database by using a discovered service Connecting IBM MQ by using a discovered service Exercise: Creating IBM MQ and database services Creating a decision service Exercise: Creating a decision service Developing integration solutions by using a REST API Using the global cache Implementing message flow security Exercise: Implementing IBM Integration Bus runtime security Implementing publish/subscribe Monitoring message flow events Exercise: Recording and replaying message flow data Managing the workload Creating patterns for reusability Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM676 IBM Integration Bus V10 Application Development II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM676 IBM Integration Bus V10 Application Development II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.