Duration 4 Days 24 CPD hours This course is intended for This course is aimed at IT professionals who support Windows 11 desktops, devices, users, and associated network and security resources. The secondary audience for this course is Desktop/Device Support Technicians (DSTs) who provide Tier 2 support to users with computers that are running the Windows 11 operating system (OS) in a on-premises environment. Overview After completing this course, you will be able to: Install and configure Windows 11 desktops and devices in a Windows Server domain corporate environment Install and customize Windows 11 operating systems and apps Configure local and remote network connectivity and storage Configure data security, device security, and network security Maintain, update, and recover Windows 11. This is a 4-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. Module 1: Installing Windows 11 Introducing Windows 11 Installing Windows 11 Module 2: Upgrading and updating Windows 11 Upgrading to Windows 11 Migrating user state Managing Windows 11 updates Module 3: Configuring Windows 11 devices Local configuration tools in Windows 11 Using Windows Admin Center Using Windows PowerShell Implementing Remote Management Module 4: Configuring network connectivity Configuring network connectivity Implementing name resolution Implementing remote access Module 5: Managing storage Overview of storage options Managing local storage Managing Storage Spaces Module 6: Managing resources Configuring and managing file access Configuring and managing shared folders Implementing Work Folders Managing printers Module 7: Managing apps in Windows 11 Deploying apps Managing access to the Microsoft Store Configuring Microsoft Edge Module 8: Implementing and managing security Managing user and group accounts Configuring User Account Control Implementing BitLocker Implementing Windows 11 security features Securing against network threats Module 9: Monitoring Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Module 10: Troubleshooting Windows 11 Managing Windows 11 startup Recovering Windows 11 Managing devices and drivers Understanding the registry Recovering files
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview In this course, you will learn to: Recognize the AWS services that support the different phases of Operational Excellence, a WellArchitected Framework pillar. Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM). Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config. Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment. Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog. Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches. Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance. Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand. Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment. Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config. Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service. State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment. Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier. Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report. This course teaches systems operators and anyone performing system operations functions how to install, configure, automate, monitor, secure, maintain and troubleshoot the services, networks, and systems on AWS necessary to support business applications. The course also covers specific AWS features, tools, andbest practices related to these functions. Module 1: Introduction to System Operations on AWS Systems operations AWS Well-Architected Framework AWS Well-Architected Tool Module 2a: Access Management Access management Resources, accounts, and AWS Organizations Module 2b: System Discovery Methods to interact with AWS services Introduction to monitoring services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Troubleshooting scenario Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config Module 3: Deploying and Updating Resources Systems operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower Troubleshooting scenario Module 4: Automating Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Troubleshooting scenario Hands-On Lab: Infrastructure as Code Module 5: Manage Resources AWS Systems Manager Troubleshooting scenario Hands-On Lab: Operations as Code Module 6a: Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 Module 6b: Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager Troubleshooting scenario Module 7: Monitor and Maintaining System Health Monitoring and maintaining healthy workloads Monitoring distributed applications Monitoring AWS infrastructure Monitoring your AWS account Troubleshooting scenario Hands-On Lab: Monitoring Applications and Infrastructure Module 8: Data Security and System Auditing Maintain a strong identity and access foundation Implement detection mechanisms Automate incident remediation Troubleshooting scenario Hands-On Lab: Securing the Environment Module 9: Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC Troubleshooting scenario Module 10a : Mountable Storage Configuring Amazon Elastic Block Storage (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Module 10b: Object Storage Deploying Amazon Simple Storage Service (Amazon S3) with Access Logs, Cross-Region Replication, and S3 Intelligent-Tiering Hands-On Lab: Automating with AWS Backup for Archiving and Recovery Module 11: Cost Reporting, Alerts, and Optimization Gain AWS expenditure awareness Use control mechanisms for cost management Optimize your AWS spend and usage Hands-On Lab: Capstone lab for SysOps Additional course details: Nexus Humans Systems Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Systems Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek techniques for working with complex types of data resources. Overview Use Connector stages to read from and write to database tables Handle SQL errors in Connector stages Use Connector stages with multiple input links Use the File Connector stage to access Hadoop HDFS data Optimize jobs that write to database tables Use the Unstructured Data stage to extract data from Excel spreadsheets Use the Data Masking stage to mask sensitive data processed within a DataStage job Use the Hierarchical stage to parse, compose, and transform XML data Use the Schema Library Manager to import and manage XML schemas Use the Data Rules stage to validate fields of data within a DataStage job Create custom data rules for validating data Design a job that processes a star schema data warehouse with Type 1 and Type 2 slowly changing dimensions This course is designed to introduce you to advanced parallel job data processing techniques in DataStage v11.5. In this course you will develop data techniques for processing different types of complex data resources including relational data, unstructured data (Excel spreadsheets), and XML data. In addition, you will learn advanced techniques for processing data, including techniques for masking data and techniques for validating data using data rules. Finally, you will learn techniques for updating data in a star schema data warehouse using the DataStage SCD (Slowly Changing Dimensions) stage. Even if you are not working with all of these specific types of data, you will benefit from this course by learning advanced DataStage job design techniques, techniques that go beyond those utilized in the DataStage Essentials course. Accessing databases Connector stage overview - Use Connector stages to read from and write to relational tables - Working with the Connector stage properties Connector stage functionality - Before / After SQL - Sparse lookups - Optimize insert/update performance Error handling in Connector stages - Reject links - Reject conditions Multiple input links - Designing jobs using Connector stages with multiple input links - Ordering records across multiple input links File Connector stage - Read and write data to Hadoop file systems Demonstration 1: Handling database errors Demonstration 2: Parallel jobs with multiple Connector input links Demonstration 3: Using the File Connector stage to read and write HDFS files Processing unstructured data Using the Unstructured Data stage in DataStage jobs - Extract data from an Excel spreadsheet - Specify a data range for data extraction in an Unstructured Data stage - Specify document properties for data extraction. Demonstration 1: Processing unstructured data Data masking Using the Data Masking stage in DataStage jobs - Data masking techniques - Data masking policies - Applying policies for masquerading context-aware data types - Applying policies for masquerading generic data types - Repeatable replacement - Using reference tables - Creating custom reference tables Demonstration 1: Data masking Using data rules Introduction to data rules - Using the Data Rules Editor - Selecting data rules - Binding data rule variables - Output link constraints - Adding statistics and attributes to the output information Use the Data Rules stage to valid foreign key references in source data Create custom data rules Demonstration 1: Using data rules Processing XML data Introduction to the Hierarchical stage - Hierarchical stage Assembly editor - Use the Schema Library Manager to import and manage XML schemas Composing XML data - Using the HJoin step to create parent-child relationships between input lists - Using the Composer step Writing Hierarchical data to a relational table Using the Regroup step Consuming XML data - Using the XML Parser step - Propagating columns Topic 6: Transforming XML data - Using the Aggregate step - Using the Sort step - Using the Switch step - Using the H-Pivot step Demonstration 1: Importing XML schemas Demonstration 2: Compose hierarchical data Demonstration 3: Consume hierarchical data Demonstration 4: Transform hierarchical data Updating a star schema database Surrogate keys - Design a job that creates and updates a surrogate key source key file from a dimension table Slowly Changing Dimensions (SCD) stage - Star schema databases - SCD stage Fast Path pages - Specifying purpose codes - Dimension update specification - Design a job that processes a star schema database with Type 1 and Type 2 slowly changing dimensions Demonstration 1: Build a parallel job that updates a star schema database with two dimensions Additional course details: Nexus Humans KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This SQL training course is designed for students new to writing SQL queries. Overview Upon successful completion of this course, students will be able to: - Understand how relational databases work - Use SQL to output reports - Write queries to obtain data from multiple tables. Students will learn SQL to build applications or to generate business reports.The SQL learned in the course is applicable to all major databases. Relational Database Basics Brief History of SQL Relational Databases Popular Databases SQL Statements Simple SELECTs Introduction to the Northwind Database Some Basics SELECTing All Columns in All Rows Exploring the Tables SELECTing Specific Columns Sorting Records The WHERE Clause and Operator Symbols Using the WHERE clause to check for equality or inequality Using the WHERE clause to check for greater or less than Checking for NULL Using WHERE and ORDER BY Together The WHERE Clause and Operator Words More SELECTs with WHERE Checking Multiple Conditions Writing SELECTs with Multiple Conditions Advanced SELECTs Calculated Fields Calculating Fields Aggregate Functions and Grouping Working with Aggregate Functions Built-in Data Manipulation Functions Data Manipulation Functions Subqueries, Joins and Unions Subqueries Joins Using Joins Outer Joins Unions Working with Unions If time allows, one or more of the following may be covered: Conditional Processing with CASE INSERT, UPDATE, DELETE Student Challenges - Design your own reports
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, and Solution Architects. Overview Become familiar with detailed information about the functions of the global availability check in the SAP SCM solution in the context of sales and distribution. In this course, students learn in detail the different standard & advanced availability check capabilities of the integrated SAP APO Global-Available to Promise component, embedded in corresponding business scenarios & along with the relevant settings. Overview of Global Available-to-Promise (Global ATP) Outlining the Functionality of Global Available-to-Promise (Global ATP) Integration of Global Available-to-Promise (Global ATP) Explaining the Use of Core Interface (CIF) Integration with Global Available-to-Promise (Global ATP) Check Method Selection in Global Available-to-Promise (Global ATP) Explaining Availability Check Methods Product Availability Check in Global Available-to-Promise (Global ATP) Checking Product Availability in Global Available-to-Promise (Global ATP) Checking Scope in Global Available-to-Promise (Global ATP) Setting the Checking Horizon in Global Available-to-Promise (Global ATP) Evaluating Logic in the Available-to-Promise (ATP) Check in Global Available-to-Promise (Global ATP) Product Allocation in Global Available-to-Promise (Global ATP) Setting Up Single Level Product Allocation in Global Available- to-Promise (Global ATP) Setting Up Multilevel Product Allocation in Global Available-to- Promise (Global ATP) Check Against the Forecast in Global Available-to-Promise (Global ATP) Setting Up the Check Against Forecast in Global Available-to- Promise (Global ATP) Rules-Based Availability Check in Global Available-to-Promise (Global ATP) Setting Up Rules-Based Availability Check in Global Available-to- Promise (Global ATP) Configuring Rule Determination Based on the Condition Technique in Global Available-to-Promise (Global ATP) Setting Up a Consolidation Location in Rules-Based Available-to- Promise (ATP) Check Using the Multi-Item Single Delivery Location (MISL) Function in Global Available-to-Promise (Global ATP) Using the Exclusive Rule Strategy in Global Available-to-Promise (Global ATP) Configuring Product Interchangeability Master Data in Global Available-to-Promise (Global ATP) Production Within the ATP Check in Global Available-to-Promise (Global ATP) Configuring the Capable-to-Promise (CTP) Procedure in Global Available-to-Promise (Global ATP) Configuring the Multilevel ATP Check (MATP) Procedure in Global Available-to-Promise (Global ATP) Backorder Processing in Global Available-to-Promise (Global ATP) Executing Backorder Processing in Global Available-to-Promise (Global ATP) Using Enhanced Interactive Backorder Processing in Global Available-to-Promise (Global ATP) Configuring Event-Driven Quantity Assignment in Global Available- to-Promise (Global ATP) Setting Up Reassignment of Order Confirmations in Global Available-to-Promise (Global ATP) Transportation and Shipment Scheduling in Global Available-to- Promise (Global ATP) Scheduling Transportation and Shipment Using Master Data in Global Available-to-Promise (Global ATP) Scheduling Transportation and Shipment Using the Condition Technique in Global Available-to-Promise (Global ATP) Scheduling Transportation and Shipment Using Configuration in Global Available-to-Promise (Global ATP) Scheduling Transportation and Shipment Scheduling using Configuration and Calendars in Global Available-to-Promise (Global ATP) Additional course details: Nexus Humans SCM670 SAP Global Available-to-Promise training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM670 SAP Global Available-to-Promise course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview Configure Red Hat Virtualization Configure networking and storage for use with Red Hat Virtualization Manage user accounts and access to the Red Hat Virtualization environment Install and manage virtual machines in Red Hat Virtualization Use templates for rapid virtual machine deployment Manage virtual machine snapshots and images Migrate virtual machines and explore high-availability options Deploy, configure, manage, and migrate virtual environments Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam. This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6. 1 - Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. 2 - Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. 3 - Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. 4 - Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. 5 - Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. 6 - Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. 7 - Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. 8 - Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. 9 - Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. 10 - Migrate virtual machines Migrate and control automatic migration of virtual machines. 11 - Manage virtual machine images Manage virtual machine snapshots and disk images. 12 - Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. 13 - Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. 14 - Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. 15 - Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization. Additional course details: Nexus Humans Red Hat Virtualization (RH318) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Virtualization (RH318) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.875 Days 11.25 CPD hours This course is intended for The job roles best suited to the material in this course are: team leaders, project managers, managers of scrum teams, teams transitioning to scrum, professionals intending to pursue the scrum master certification. Overview How to use the Scrum Framework to deliver products and services faster and with higher quality. How to leverage lean principles to identify waste in a system, process, or organization. Techniques and metics Scrum Masters use to improve. team happiness and performance. The patterns and practices of high-performing teams. How the Scrum Master role scales in an Agile implementation. This course is an adaptive, repeatable process that equips individuals and organizations in how to thrive in a world where change is the only constant. From Fortune 100 companies (Google, Amazon, Apple, etc) to nonprofits. Scrum has a proven record of reducing burnout, doubling throughput in half the time, and increase employee happiness. Core Scrum The Scrum Framework The Origins of Scrum (Optional) The Scrum Team Developers Scrum Master Leadership/Management Scrum Events The Sprint Product Backlog Re1nement Estimation Sprint Planning Sprint Review Sprint Retrospective Daily Scrum Scrum Artifacts Lean Principles Describe a Kaizen mindset and explain how small, iterative changes can lead to revolutionary leaps. Describe the three pillars of Scrum ? Transparency, Inspection, and Adaptation,? which implement the work of Ogunnaike and Ray. Explain the importance of reducing and eliminating waste in the system. Perform a root-cause analysis (e.g., using the ?5 Whys? technique). Assess the Process EZciency of their Scrum Team and recall that the de1nition of Lean is a Process EZciency of 25% or higher. Explain how the work of Takeuchi and Nonaka on Lean and the Toyota Production System paved the way for Scrum. Describe the origins of the name ?Scrum? from Takeuchi and Nonaka?s ?New New Product Development Game. Recognize that a Lean mindset suggests that you address a defect immediately after it is identi1ed as opposed to a mindset where defects are stored to be 1xed later. Agile Manifesto Recognize the four values of the Agile Manifesto and their signi1cance in the context of complex adaptive systems. Identify the 12 principles of the Agile Manifesto and describe their function in guiding practices that support teams in implementing and executing with agility. Explain that Scrum is one of the driving forces that gave rise to the Agile movement and predates the Agile Manifesto. Explain why the majority of ?Agile? teams are late, over-budget, and with unhappy customers (i.e., not agile) and explain what needs to be done to 1x that. Patterns of High Performing Teams Yesterday?s Weather Happiness Metric Teams that Finish Early Accelerate Faster Stable Teams Swarming Interrupt Buffer Good Housekeeping (formerly Daily Clean Code) Scrum Emergency Procedure Scrum@Scale Descaling Scaling the Scrum Master Registered Scrum Master Credential Access and complete the Registered Scrum Master by Scrum Inc. exam. Download their Registered Scrum Master Credential (upon successful completion of the exam). Be Recognized in the International Registry of Agile ProfesstionalsTM State the renewal process. Additional course details: Nexus Humans Agile Scrum training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Agile Scrum course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network administrators Solutions designers System installers System integrators System administrators Overview After completing this course, you should be able to: Explain the transactional service activation and how it relates to business requirements Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Understand the support for candidate configuration and confirmed commit support Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the YANG service model structure Design a real-world usable service Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain how to implement action with use of config-templates in NSO package Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components Describe the use of feature components and function packs Define and explain the ETSI MANO principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures Describe Cisco NSO 5.3 new features and changes in NSO The NSO Essentials for Programmers and Network Architects (NSO201) v4.1 course introduces you to Cisco Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution as well as introducing you to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Course Outline Introducing Service Orchestration with Cisco NSO Exploring Cisco NSO Architecture Orchestrating Network Solutions Describing Cisco NSO Operation Installing Cisco NSO Exploring the Advantages of NETCONF Managing Devices Using the Device Manager Creating YANG Models Using Services Implementing Services with Model-to-Model Mapping Designing Services in Cisco NSO Managing the Service Lifecycle Programming with Python in Cisco NSO Configuring and Troubleshooting System Settings Discovering Cisco NSO Northbound APIs Managing Alarms and Reporting Configuring Cisco NSO for Scalability and Performance Describing Cisco NSO VNF Manager and Function Packs
Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone currently working on Agile-based projects or having experience with other forms of project management experience and want to add Agile PM skills and knowledge to their portfolio. Anyone with any experience in project-based work, either from the customer or supplier side can benefit from this course, including but not limited to: project manager, team leaders and managers or project employees. Overview AgilePM ⢠certification is the result of collaboration between APMG-International and the DSDM Consortium. DSDM (Dynamic Systems Development Method) is the longest existing Agile method and the only Agile method aimed at managing Agile projects. It Has evolved over the years into a Project Framework, and AgilePM is a subset tailored to the Agile project manager. Students will be explained how the model is set up, how the different project activities and project roles are connected and how AgilePM handles project management. This course provides preparation for the Foundation exam of APMG. Training Day 1 - AgilePM Foundation Topics What is Agile? Choosing an appropriate Agile approach philosophy, principles and project variables preparing for success The DSDM Process Training Day 2 - AgilePM Foundation Topics The People ? DSDM Roles and Responsibilities The DSDM Products Key practices ? prioritization and timeboxes Training Day 3 - AgilePM Foundation Topics Planning and control throughout the lifecycle Other practices: facilitated workshops, modeling and iterative development