Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Users new to Tableau who will be administering a Tableau Server installation, including managing content, users, and permissions. Overview This skills-focused course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: User interactions with Tableau Server Tableau Server components Single-server installation Content administration Authorization and permissions Users, groups, and sites Data sources and extracts Schedules, tasks, and subscriptions Monitoring server status Command-line utilities and REST API Upgrading a single-server installation to a new version Modifying the authentication method This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions. Tableau Server Overview Tableau Product Line End-User Abilities Tableau Server Architecture Component Functions Server Diagrams Single Server Installation Technical Specifications Tableau Server Installation Checklist Configuration Options Resolutions for Common Installation Issues Installing Tableau Server Software User Experience Content Navigation, Searching, and Filtering Exploring Server Content Types and Objects Updating Account Settings Setting the Start Page Viewing Version Information Renaming a Project Adding a Workbook Description Authorization and Permissions Administrator Settings Authorization Overview Functional Security Model Site Roles Content Ownership and Permissions Permission Rules and Capabilities Permissions and the Default Project Creating Projects, Local Groups, and a Local User Importing Users and Adding Users to Groups Granting Permissions to Projects Creating a Project Leader Publishing and Changing Ownership of a Workbook Moving a Workbook Site Administration Data Sources, Extracts, Schedules, and Subscriptions Creating, Publishing, and Connecting to a Data Source Data Engine and File Store Creating and Publishing Extracts Backgrounder Schedules Subscriptions Enabling Subscriptions and Alerts Automating Server Tasks Automating and Programming Server Tasks Tabadmin Tabcmd Using the REST API Monitoring Server Viewing Server Status Admin Alerts Viewing Email Alerts and Admin Views Enabling Access to the Repository Custom Admin Views Licensing Information Performance Recording Upgrading Tableau Server Preparing to Upgrade Upgrading Software on the Same Machine Modifying the Authentication Method Importing AD Groups Log Files Administration Overview of Log Files Archiving Log Files Data Security Controlling What Users Can See User Filters
Duration 3 Days 18 CPD hours This course is intended for This lecture and exercise-based course is for individuals who want to understand how to install, configure, and manage an IBM Spectrum Scale storage cluster. Overview After completing this course, you should be able to: Summarize the key features of IBM Spectrum Scale Describe IBM ESS and Spectrum Scale RAID Install IBM Spectrum Scale and configure a cluster Manage a cluster Implement information lifecycle management (ILM) Configure IBM Spectrum Scale high availability features Back up critical cluster data This course is intended for IT professionals tasked with administering an IBM Spectrum Scale storage cluster in environments running Linux and AIX nodes. The course includes information on installing, configuring, and monitoring an IBM Spectrum Scale cluster. Many Spectrum Scale features are described in lecture materials and then implemented in lab exercises. These features include: Storage management, high availability options, cluster management, and information lifecycle management (ILM) tools. Note: Although the lab environment is running the Linux operating system, the differences in Spectrum Scale compared with an AIX environment are minor. Therefore, the skills acquired during the course can be applied in both Linux and AIX environments. Welcome and course overview Unit 1 - IBM Spectrum Scale overview Exercise 1 - Cluster node preparation Unit 2 - Installation and cluster configuration Exercise 2 - Installation and cluster configuration Unit 3 - Cluster management Exercise 3 - Cluster management and configuration Unit 4 - Information Lifecycle Management (ILM) Exercise 4 - Storage pools, filesets, and policies Unit 5 - High availability and cluster data backups Exercise 5 - Replication and snapshots Course wrap-up and evaluation
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers System Administrators Architects Channel Partners Overview Upon completing this course, the learner should be able to meet these overall objectives: Describe Cisco Webex Teams Comprehend Cisco Webex Meetings Understand Cisco Webex Messaging Recognize Cisco Webex Teams Calling Appreciate Cisco Webex Teams Care Explain Cisco Webex teams Management and Administration Describe Cisco Webex Teams Service Availability, Ordering, and Support Understand Cisco Webex Teams Board Cisco Webex Teams is an app-centric, cloud-based service that provides a complete collaboration suite for teams to create, meet, message, call, care, whiteboard, and share, regardless of whether they?re together or apart?in one continuous work stream before, during, and after meetings. Being able to understand how this works and what the features are is the key focus of this 2-day course. NterOne?s Webex Teams Collaboration Workshop should be taken by students who have a working understanding of Cisco Collaboration Products. This Cisco Webex Teams Workshop enables learners to describe Cisco Webex Teams, comprehend Cisco Webex Teams Meetings, and grasp Cisco Webex Teams Messaging, among much more. This workshop is intended to be taken by system engineers, system administrators, architects, and channel partners. Learn more below. Cisco Webex Teams Overview What is Cisco Webex Teams Webex Teams Delivery Webex Teams Security Webex Teams Collaboration Webex Teams API Meetings Messaging Calling Cisco Webex Teams Spaces Cisco Webex Teams Hybrid Services Cisco Webex Teams Benefits Cisco Webex Team Meetings Basic Meetings Instant Messages Schedule Meetings Cisco Webex Teams Advanced Meetings Overview Webex Integration Personal Room Cisco Webex Teams Desk and Room Devices and the Cisco Smart Board Cisco Webex Teams Conferencing Cisco Webex Teams Board and Room Device Setup and Use Three ways to enable pairing Cisco WebEx Teams Messaging Cisco Webex Teams Messaging Overview Key Benefits of Cisco Webex Teams Messaging Cisco Webex Teams Messaging Features Cisco Webex teams (feature in the app) Use Cases Cisco Webex Teams Board Advanced Interactive Whiteboard No Network, Bluetooth needed Microphones Voice-Tracking Technology Webex Teams Board Application Suite Camera Webex Teams APIs Any Board, anywhere Messaging Setup Cisco Webex Teams Calling Overview Traditional Calling Features in Cisco Webex Teams Features and Benefits of Cisco Webex Teams Calling Benefits of Mobility and Collaboration Features of Cisco Webex Teams PSTN Calling Phone Support Use Cases Cisco Webex Teams Care Overview Embedding Experience Cisco Webex Teams Management and Administration Overview Cisco Cloud Collaboration Management Features and Benefits Management Security Portal Cisco Webex Teams Service Availability, Ordering, and Support Country Availability Language Support Ordering Support Cisco Capital
Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime
Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection
Duration 5 Days 30 CPD hours
Duration 1 Days 6 CPD hours This course is intended for This basic course is for: Business Analyst Systems Engineer Software Engineer Requirements Engineer Requirements Manager Requirements Team Leader Overview Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data This course builds on the content learned in the IBM Engineering Requirements Management DOORS V9.6 Foundation course. It is designed for those who will be in the role of team lead or project manager, or who want to learn more about advanced DOORS end-user functionality. It discusses creating and structuring DOORS projects, defining linking relationships and attributes, setting access permissions, and managing change. It also discusses external linking, working with spreadsheets, and applying configuration management strategies to DOORS data. Course Outline Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data
Duration 2 Days 12 CPD hours This two-day course provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interactive discussions and hands-on exercises guide students through the configuration, management, and supervision of iOS devices. Students? knowledge and skills are tested and reinforced by working through real-world scenarios The Role of MDM, VPP, and DEP How to successfully deploy iOS devices Identify and respond to challenges when deploying and managing devices without MDM Apple IDs Explain what an Apple ID is and identify when it?s needed Security How security is relevant in the context of a given deployment scenario Design and implement a deployment solution for a given scenario DEP Devices Configure DEP registered devices for Over-the-Air Enrollment Configure and manage settings, apps, and content on user-owned and company-owned devicesPrerequisites Manual Configuration Explore the challenges and inconsistencies when manually configuring multiple devices. Creating Configuration profiles using Apple Configurator to view and edit a configuration profile. Learn how profiles ensure consistency across multiple devices Manage Settings The iOS MDM protocol How a MDM solution is used to configure and manage devices over-the-air with consistency and accountability Apps and Content Introduce and define VPP Assign apps and content to their user and then configure and test managed 'open in' functionality Company-Owned (Personalized and Shared) Configure settings to enable Over-the-Air Enrollment and supervision and learn how users can personalize company-owned devices. Configure and test shared (shared) device scenarios and how Apps and content are distributed to the devices Workshop Real-world deployment scenarios Design a deployment that meets your scenario?s needs
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)
Duration 5 Days 30 CPD hours This course is intended for This class is designed for experienced BizTalk Server Developers who have at least one year of hands-on experience developing BizTalk Server applications. Overview In this 5-day course, you will learn how to apply best practices and design patterns to build smarter BizTalk Server applications. Furthermore, this course provides extensive coverage of BizTalk Server's extensibility, including such topics as: custom functoids, custom pipeline components, and invoking external .NET methods. This course is designed specifically for experienced BizTalk Server developers and focuses on best practices & pattern-based design while pulling back the curtain on some of BizTalk Server's eccentricities. Review of BizTalk Server Fundamentals The BizTalk Server Architecture Inner Workings of the Messaging Engine Messaging Engine Deep Dive Two-way Messaging Without Orchestrations Designing and Testing Schemas Schema Design Enabling Unit Testing for BizTalk Projects Data Translation and Transformation Custom Data Transformation Creating Custom Pipeline Components Working with Message Interchanges Debatching Message Interchanges Advanced Concepts of WCF Adapters Connecting to External Systems Using WCF LOB Adapters in BizTalk Server Publishing and Consuming WCF and RESTful Services Overview of Service Integration Using WCF Implementing WCF Services Preprocessing Messages with IIS Modules Consuming Services Advanced Orchestration Communication Patterns Orchestration Engine Deep Dive Splitting and Aggregating Messages using Orchestrations Orchestration Communication Bridging the Synchronous/Asynchronous Gap Across Multiple Channels Correlating Messages in Orchestration Instances Building Convoy Orchestrations Handling Orchestration Faults and Exceptions Exception Handling in Orchestrations Implementing Transactions and Compensation Creating Transactional Processes Designing Custom Tracking Models for BizTalk Applications Introduction to Business Activity Monitoring Enabling Business Activity Monitoring Extending BAM Beyond BizTalk Building Declarative Logic Using the Business Rules Engine Concepts of Declarative Logic Fundamentals of BizTalk BRE Integrating Policies with BizTalk Advanced Concepts of the Business Rules Engine Advanced Business Rule Concepts Working with Advanced Facts Integrating Across Business Boundaries Using Parties, Roles, and EDI Port Binding Option Review Role-Based Integration What is EDI? Enabling EDI-Based Messaging