Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Fundamental concepts and workflows for creating 3D models using AutoCAD, Represent a design by creating solid primitives, solid or surface models from cross-sectional geometry, or composite models from multiple solid models, Complete a solid model design by adding the necessary features to detail, duplicate, and position 3D models, Convert 2D objects to 3D objects, Document a 3D design by creating 2D drawings for production and visualization, Communicate design ideas using visual styles, lights, model walk-through tools, and renderings. In this course, you will learn the fundamental concepts and workflows for creating 3D models using AutoCAD. IntroductionAdvanced Text Objects Annotation Scale Overview Using Fields Controlling the Draw Order Working with Tables Working with Linked Tables Creating Table Styles Projects - Advanced AnnotationDynamic Blocks Working with Dynamic Blocks Creating Dynamic Block Definitions Dynamic Block Authoring Tools Additional Visibility Options Attributes Inserting Blocks with Attributes Editing Attribute Values Defining Attributes Redefining Blocks with Attributes Extracting Attributes Projects - Advanced Blocks & AttributesOutput and Publishing Output For Electronic Review Autodesk Design Review Publishing Drawing Sets Other Tools for Collaboration eTransmit Hyperlinks Cloud Collaboration and 2D Automation Connecting to the Cloud Sharing Drawings in the Cloud Attach Navisworks Files Attach BIM 360 Glue Models Introduction to Sheet Sets Overview of Sheet Sets Creating Sheet Sets Creating Sheets in Sheet Sets Adding Views to Sheets Importing Layouts to Sheet Sets Publishing & Customizing Sheet Sets Transmitting and Archiving Sheet Sets Publishing Sheet Sets Customizing Sheet Sets Custom Blocks for Sheet Sets Projects - Sheet SetsManaging Layers Working in the Layer Properties Manager Creating Layer Filters Setting Layer States CAD Standards CAD Standards Concepts Configuring Standards Checking Standards Layer Translator System Setup Options Dialog Box System Variables Dynamic Input Settings Drawing Utilities Managing Plotters Plot Styles Introduction to Customization Why Customize? Creating a Custom Workspace Customizing the User Interface Using the Customize User Interface (CUI) Dialog Box Customizing the Ribbon Customizing the Quick Access Toolbar Customizing Menus Keyboard Shortcuts Macros & Custom Routines Custom Commands & Macros Running Scripts Action Recorder Editing Action Macros Loading Custom Routines
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Architecture and course review Post course knowledge check Architecture review Course review
Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized. The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies. Overview Understand Data Platform Modernization Choose the right tools for Data Migration Migrate SQL Workloads to Azure Virtual Machines Migrate SQL Workloads to Azure SQL Databases Migrate SQL Workloads to Azure SQL Database Managed Instance In this course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. Students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications, so that they can make best use of modern data platforms in Azure. Introducing Data Platform Modernization Understand Data Platform Modernization Understanding the stages of migration Data Migration Paths Choose the right tools for Data Migration Discover the Database Migration Guide Build your data estate inventory using Map Toolkit Identify Migration candidates using Data Migration Assistant Evaluate a Data workload using Database Experimentation Assistant Data Migration using Azure Database Migration Service Migrate non-SQL Server workloads to Azure using SQL Migration Assistant Migrating SQL Workloads to Azure Virtual Machines Considerations of SQL Server to Azure VM Migrations SQL Workloads to Azure VM Migration Options Implementing High Availability and Disaster Recovery Scenarios Migrate SQL Workloads to Azure SQL Databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL DB offline Migrate SQL Server to Azure SQL DB online Load and Move data to Azure SQL Database Migrate SQL Workloads to Azure SQL Database Managed Instance Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed instance Load and Move data to SQL Database Managed instance Application Configuration and Optimization
Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course
Duration 5 Days 30 CPD hours This course is intended for The Messaging Administrator deploys, configures, manages, and troubleshoots recipients, permissions, mail protection, mail flow, and public folders in both on-premises and cloud enterprise environments. Responsibilities include managing message hygiene, messaging infrastructure, and hybrid configuration and migration. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with the Security Administrator and Microsoft 365 Enterprise Administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications. Overview After completing this course, students will be able to: Configure and manage the transport pipeline Manage and troubleshoot mail flow and transport issues Manage message hygiene and compliance Manage authentication for messaging Configure organizational settings and sharing Manage mobile devices Manage role-based permissions Create and manage recipient objects and resources Plan, implement, and troubleshoot public folders Plan a hybrid environment Perform mailbox migrations Deploy and troubleshoot a hybrid environment This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization. Managing the Transport Pipeline Overview of Transport Services Configuring Message Transport Managing Transport Rules Managing and Troubleshooting Mail Flow Managing Mail Flow Troubleshooting Mail Flow Troubleshooting Transport Issues Troubleshooting with Logs Managing Message Hygiene Planning for Message Hygiene Managing Anti-Malware and Anti-Spam Policies Managing Advanced Threat Protection Managing Compliance Messaging Compliance in the SCC Messaging Compliance in Exchange Managing Exchange Online Archiving and Auditing Managing Content Search Managing Organizational Settings Managing Authentication for Messaging Configuring Organizational Settings Configuring Organizational Sharing Managing Mobile Devices Mobile Device Mailbox Policies Managing Mobile Device Access Managing Role-Based Permissions Managing Admin Roles Managing User Roles Exchange Setup - RBAC and AD Split Permission Managing Recipient Objects and Resources Exchange Recipients Creating and Managing Exchange Recipients Managing Email Addresses, Lists, and Resources Managing Public Folders Planning the Public Folder Hierarchy Implementing and Managing Public Folders Troubleshooting Public Folders Planning a Hybrid Environment Exchange Hybrid Deployment Requirements Planning to Run the Hybrid Configuration Wizard Performing Mailbox Migrations Planning Mailbox Migrations Performing IMAP Migrations Performing Cutover and Staged Migrations Performing Advanced Migrations Deploying and Troubleshooting a Hybrid Environment Deploying and Managing an Edge Transport Server Configuring a Hybrid Deployment using the HCW Implementing Advanced Hybrid Functionality Troubleshooting Hybrid Deployments
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices. Overview Understand the functionalities and capabilities of Citrix ADC How to obtain, install, and manage Citrix ADC licenses Comprehend basic ADC network architecture Understand how SSL is used to secure Citrix ADC Optimize the ADC system for traffic handling and management Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching. Module 1: Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Module 2: Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists Module 3: ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX Module 4: High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Module 5: Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting Module 6: SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Module 7: Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Module 8: Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Module 9: Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings AppExpert Additional Features Module 10: Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Module 11: Content Switching Content Switching Overview Content Switching Configuration Module 12: Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Module 13: Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.