• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

40 Courses delivered Online

B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data Modelers Overview Please refer to course overview This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Framework Manager Model data and identifying related data Define requirements and modeling strategies Overview of IBM Cognos Framework Manager Create a baseline project Extend a model Prepare reusable metadata Model for predictable results in IBM Cognos Framework Manager Identify query issues Identify reporting traps Model virtual star schemas Use query subjects, modify relationships, and consolidate metadata using virtual objects Create calculations, filter data, and customize metadata for runtime Implement a time dimension and specify determinants Model for presentation in IBM Cognos Framework Manager Create a presentation view Examine data source query subject types and stored procedure query subject types Specify data security and package security Specify object security and dynamic data security Create analysis objects Manage OLAP data sources Advanced capabilities in IBM Cognos Framework Manager Explore SQL generation and the use of governors Examine the use of IBM Cognos SQL and generated SQL for DMR data Other query considerations Use session parameters, prompt macros, and security macro functions Use materialized views, minimize SQL, and enable Dynamic Query Mode (DQM) DQM, CQM, caching metadata, query processing, aggregate calculation, and other ways to improve performance Extended capabilities in IBM Cognos Framework Manager (Optional) Perform basic maintenance and management on a model Remap metadata to another source and import and link additional data sources Run scripts to automate or update a model and report on a model Segment a project, link a project, and branch a model Nest packages and specify package languages and functions Explore additional modeling techniques and customize metadata for a multilingual audience Additional course details: Nexus Humans B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x
Delivered OnlineFlexible Dates
Price on Enquiry

VMware SD-WAN by VeloCloud: Design and Deploy [v3.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Any Managed Service Provider who is designing VMware SD-WAN solutions or managing SD-WAN networks for their customers. Overview By the end of this course, you should be able to meet the following objectives: Explain VMware SD-WAN architecture Outline VMware SD-WAN key components Discuss various Managed Service Provider (MSP) use cases and deployment options Deploy VMware SD-WAN Gateway, and VMware SD-WAN Edge Manage VMware SD-WAN Cloud VPN Design VMware SD-WAN for performance and scalability Configure the Partner Gateway handoff Customers demand a scalable, secure, and manageable VMware SD-WAN? by VeloCloud©. To deliver a successful solution you must understand VMware SD-WAN architecture, know how the features can solve customer use cases, and be able to design a VMware SD-WAN that can be easily deployed, managed, and expanded. Course Introduction Introductions and course logistics Course objectives Architecture and Core Features Evaluate the current state of the enterprise WAN and limitations for growth Describe the key components and features of the VMware SD-WAN architecture Explain VMware SD-WAN component placement and interactions between components List VMware SD-WAN core value differentiators Describe VMware SD-WAN core features Evaluate the effect of VMware SD-WAN differentiators on a SD-WAN site deployment VMware SD-WAN MSP use Cases, Deployment Models, and License Models Compare VMware SD-WAN use cases List VMware SD-WAN deployment models Describe each VMware SD-WAN license model Zero Touch Provisioning Provision VMware SD-WAN Edges Describe the workflow of a VMware SD-WAN Edge activation. Provision a VMware SD-WAN Virtual Edge on VMware ESXi VMware SD-WAN Cloud VPN Configure the VMware SD-WAN Cloud VPN Consider the availability settings when deploying a Cloud VPN Describe the packet flow in a Cloud VPN Routing and Branch Design Control SD-WAN overlay and underlay route advertisement Overlay flow control Describe best practices when designing VMware SD-WAN with BGP Evaluate branch design options VMware SD-WAN Security Explain VMware SD-WAN security architecture Describe VMware SD-WAN Edge security capabilities High Availability Designs Distinguish between Standard and Enhanced High Availability (HA) and Virtual Router Redundancy Protocol (VRRP) Designing for Performance and Scale List the SD-WAN factors that influence scalability and performance Describe VMware SD-WAN Edge Clustering Standing up a Partner Gateway Describe VMware SD-WAN Gateway functionality and roles Provision a VMware SD-WAN Gateway from VMware SD-WAN Orchestrator Demonstrate the procedure to install a VMware SD-WAN Gateway on ESXi Describe how BGP works together with a Partner Gateway hand-off MSP Operations and Version Management Identify the appropriate documentation Demonstrate account management Describe the VMware SD-WAN upgrade sequence Demonstrate a VMware SD-WAN Edge and VMware SD-WAN Gateway upgrade

VMware SD-WAN by VeloCloud: Design and Deploy [v3.x]
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Configuring BIG-IP APM - Access Policy Manager v13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Configuring BIG-IP APM - Access Policy Manager v13.x
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators Network professionals who have experience working with VMware NSX Advanced Load Balancer (Avi) and are responsible for troubleshooting and operating Application Delivery Controllers solutions Overview By the end of the course, you should be able to meet the following objectives: Become familiar with NSX Advanced Load Balancer (Avi) troubleshooting tools and steps to solve the problems. Establish and apply a structured troubleshooting approach and methodology Understand built-in mechanisms available for NSX Advanced Load Balancer (Avi) monitoring Identify, analyze, and troubleshoot problems related to the NSX Advanced Load Balancer infrastructure, including control and data plane components Identify, analyze, and troubleshoot problems related to application components such as Virtual Services, Pools, and related components This 3-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competence in operating and troubleshooting the VMware NSX© Advanced Load Balancer? (Avi) solutions. In this course, you are introduced to several operational, management, and troubleshooting tools. You will be presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and functions Events and Alerts Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities leveraging SNMP, Syslog, and email Introduction to NSX Advanced Load Balancer Troubleshooting Explain NSX Advanced Load Balancer troubleshooting concepts Describe and leverage Virtual Service Traffic Logs Describe and leverage Virtual Service Security Insights Understand and utilize Health Score concepts Explain and leverage application metrics and analytics Explain and leverage packet capture and CLI utilities for application troubleshooting Leverage UI, CLI, and useful log files to perform control plane troubleshooting Infrastructure Troubleshooting Describe and perform general VMware Cloud Connector troubleshooting Describe and analyze VMware Cloud Connector state Leverage case studies to troubleshoot VMware Cloud Connector Describe and troubleshoot NSX-T Cloud Connector integration Leverage case studies to troubleshoot NSX-T Cloud Connector Describe and troubleshoot Linux Server Cloud Connector integration Describe and troubleshoot OpenStack Cloud Connector integration Leverage case studies to troubleshoot OpenStack Cloud Connector Describe and troubleshoot AWS and Azure Cloud Connector integrations Troubleshooting NSX Advanced Load Balancer Service Engines and Advanced Troubleshooting Explain general Service Engine infrastructure Explain and leverage analytics, health score, and metrics for Service Engine troubleshooting Explain and leverage Events and Alerts for Service Engine troubleshooting Leverage CLI for accessing Service Engine Analyze Service Engine logs offline with Tech Support utility and collecting core dumps Leverage CLI and useful log files for Service Engine Data Plane troubleshooting Leverage CLI to capture packets for advanced datapath analysis Monitoring NSX Advanced Load Balancer Explain and configure SNMP-based monitoring Explain and configure REST API-based monitoring Describe and leverage 3rd-party integration with monitoring tools like Splunk Leverage 3rd-party REST API monitoring extensions like Prometheus Describe and leverage VMware integrations like VMware vRealize© Network Insight? for monitoring Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (802.1X)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security architects Design engineers Network engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks. Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications. Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation. Describe how to configure access for non-supplicant devices in an 802.1X deployment. Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X. The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco© Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X?based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. Describing Cisco Identity-Based Networking Services Cisco IBNS Overview Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS Compare Cisco IBNS and Cisco ISE Solutions Explore Cisco IBNS Architecture Components Explore Cisco TrustSec Describing 802.1X EAP Authentication Explore the IEEE 802.1X Standard Explore 802.1X and EAP Explain EAP Methods Describe the Role of RADIUS in EAP Communications Configuring Devices for 802.1X Operation Identify 802.1X Components and Topologies Configure Cisco Catalyst Switch for 802.1X Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch Configure Cisco WLC for 802.1X Configure Cisco ISE for 802.1X Configure Supplicants for 802.1X Operation Configuring Access for Non-Supplicant Devices Configure Cisco IBNS for Non-Supplicant Devices Explore IBNS 2.0 for Non-Supplicant Devices Configure Cisco Central Web Authentication for Guests Designing Cisco IBNS Networks with Cisco ISE and 802.1X Cisco ISE Architectural Components Introducing the Cisco ISE Bring Your Own Device (BYOD) Process Identify Cisco ISE Deployment Options Identify Component Compatibilities with 802.1X Review 802.1X Design Considerations

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (802.1X)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Cisco Partner Sales Engineers and Field engineers supporting customers with 802.1x solutions. The primary audience for this course is Cisco Channel Partner SEs and FEs that are seeking to meet the education requirements to attain ATP authorization to sell Cisco ISE. The secondary audience for this course is security architects, design engineers, and others seeking hands-on experience with Cisco TrustSec 802.1X deployments with Cisco ISE Overview Upon completing this course, students will be able to meet these objectives:- Describe identity-based networking concepts and components - Define the components and processes of port-based authentication - Identify the 802.1X components and their interrelation at a high level - Identify requirements and options for non-supplicant devices - Position individual components of an 802.1X network and identify compatibilities Students will gain the foundational knowledge of IEEE 802.1X protocol; the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation; hands-on experience configuring a network for 802.1X-based network services. Cisco TrustSec Surveying Cisco TrustSec Surveying Cisco TrustSec Architecture Components Port-Based Authentication Surveying the IEEE 802.1X Standard Surveying 802.1X and EAP Surveying 802.1X and EAP Configure Devices for 802.1X Operation Identifying 802.1X Components and Topologies Identifying 802.1X Components and Topologies Configuring Network Devices for 802.1X Configuring Supplicants for 802.1X Operation Configure Guest Access Configuring Cisco TrustSec for Non-Supplicant Devices Configuring Cisco WebAuth for Non-Supplicant Devices Design Cisco TrustSec Networks with Cisco ISE and 802.1X Identifying Component Compatibilities with 802.1X Reviewing 802.1X Design Considerations that Impact Implementation Reviewing Scalable 802.1X Architectures Additional course details: Nexus Humans Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)
Delivered OnlineFlexible Dates
Price on Enquiry

O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for analysts, developers, and administrators of IBM Watson Explorer Deep Analytics Edition oneWEX. Overview Identify oneWEX platformsIdentify the process and data flows of oneWEX projectsExplore the oneWEX user interfaceExplain ingestion and conversionUtilize Content MinerDefine enrichmentIdentify advanced features of oneWEX This course is designed to teach students core concepts of IBM Watson Explorer Deep Analytics Edition oneWEX. Students will learn to identify the oneWEX platforms as well as the process flow and data flow of oneWEX projects. Students will explore oneWEX tools, such as Content Miner and the Admin Console, while gaining hands-on experience in data acquisition and enrichment. Finally, students will be exposed to more advanced topics, such as Application Builder, Content Analytics Studio, and API usage. Overview of oneWEX Introduction to oneWEX Explore oneWEX architecture Identify installation options Navigation in oneWEX Explore the Admin Console Explore navigation using Content Miner The Collection detail view The REST API Data flow Explore the data flow of oneWEX Search and Analytics collection templates Identify data acquisition Data ingestion Work with datasets Work with crawlers Use an importer Explore conversion Data ingestion log files Analysis using oneWEX Content Miner Explore analysis using Content Miner The Guided Analysis Experience The Guided Analysis view Explore Annotators Enrichment using Annotators Annotator types Enrichment using Labeler Identify enrichment Identify document classification Classify using training data Classification versus clustering The document classification process Enrichment using Ranker Identify enrichment using Ranker The ranking process Migrate annotators from Content Analytics Studio Migrate Content Analytics Studio annotators Identify the UIMA pipeline configuration for oneWEX Update annotators Using Application Builder with oneWEX Application Builder and user roles Explore Application Builder Set up a oneWEX data source Functionality for oneWEX data sources Additional course details: Nexus Humans O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x)
Delivered OnlineFlexible Dates
Price on Enquiry

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM Maximo Asset Management Overview This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. Tivoli Process Automation Engine This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. Architecture and components This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. Foundation Data This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. Security Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. Database architecture This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. Work Management Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. Customizing an application This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. Automation This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. Workflow This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. Reporting This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. Integration Framework In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. Budget Monitoring This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. Inspection Tools and Tasks This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. Troubleshooting This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. Additional course details: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: Deploy and Manage plus UEM Troubleshooting Fast Track [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify

VMware Workspace ONE: Deploy and Manage plus UEM Troubleshooting Fast Track [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Educators matching "V2X"

Show all 1
Cenex (Centre of Excellence for Low Carbon & Fuel Cell Technologies)

cenex (centre of excellence for low carbon & fuel cell technologies)

Loughborough

Cenex was established as the UK’s first Centre of Excellence for Low Carbon and Fuel Cell technologies in 2005. Today, Cenex focuses on low emission transport & associated energy infrastructure and operates as an independent, not-for-profit research technology organisation (RTO) and consultancy, specialising in project delivery, innovation support and market development. We also organise Cenex-EXPO, the UK’s premier low carbon vehicle event, to showcase the latest technology and innovation in the industry. Our independence ensures impartial, trustworthy advice, and, as a not-for-profit, we are driven by the outcomes that are right for you, your industry and your environment, not by the work which pays the most or favours one technology. Finally, as trusted advisors with expert knowledge, we are the go-to source of guidance and support for public and private sector organisations along their transition to a zero-carbon future and will always provide you with the insights and solutions that reduce pollution, increase efficiency and lower costs. Together, we can lower your emissions through innovation in transport and energy infrastructure. View our projects and case studies [https://www.cenex.co.uk/projects-case-studies/] to see more of the work we do. INDEPENDENT: Truly impartial advice you can trust, based on in-house findings rather than manufacturer calculations. NOT-FOR-PROFIT: Driven to reduce the environmental impact of transport, energy and infrastructure, not by profits or returns-on-investment. EXPERTS: Access the best possible low emission solutions supported by evidence-based research, consultancy and models.