Duration 4 Days 24 CPD hours This course is intended for This course is for consultants, project team members, and administrators who want to learn how to implement data provisioning and data transformation for their SAP HANA project. In this course, students will learn the essential techniques and tools of data provisioning and data transformation for SAP HANA. This course will help students identify the most effective data provisioning solutions for their SAP HANA project. Course Outline Trigger-based replication with SAP Landscape Transformation ETL based data provisioning using SAP Data Services Connecting SAP HANA to data sources using SAP HANA Smart Data Access Real-time data loading using Smart Data Streaming ETL based loading using Smart Data Integration and Smart Data Quality SAP HANA Direct Extractor Connection Fundamentals of SAP Replication Server Additional course details: Nexus Humans HA350 SAP HANA - Data Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA350 SAP HANA - Data Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM
Duration 2 Days 12 CPD hours This course is intended for This course is aimed at anyone currently working with data who is interested in using data visualisation to more effectively communicate their results. Overview At completion, delegates will understand how data visualisations can be best used to communicate actionable insights from data and be competent with the tools required to do it. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. Course Outline The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to horse breeding. The companies doing this most successfully understand that using sophisticated analytics approaches to unlock insights from data is only half the job. Communicating these insights to all of the different parts of an organisation is just as important as doing the actual analysis. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. To attend this course delegates should be competent in the use of data analysis tools such as reporting tools, spreadsheet software or business intelligence tools. The course will explore the following topics through a series of interactive workshop sessions: Fundamentals of data visualisation Data characteristics & dimensions Mapping visual encodings to data dimensions Colour theory Graphical perception & communication Interaction design Visualisation different characteristics of data: trends, comparisons, correlations, maps, networks, hierarchies, text Designing effective dashboards
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both organizations that would like to improve the corporate communications of their employees and individuals, who take the role of Project Managers, Business Analysts, Team Leaders, Scrum Masters, Product Owners, Managers, Employees, and anyone who would like to improve their communications skills both in the personal and professional aspects. Overview Upon successful completion of this course, students will learn: what effective communications are. why they are important. how by improving communications you will be able to improve the overall execution of projects and your results in general. the specifics of online remote teamwork communications. Your employees will be equipped with knowledge of different communication techniques and styles, which will save them time to adapt to the communication style of the interlocutor and allow them to have more effective conversations both with business partners and customers, and with colleagues at work. Also, they will master the art of active listening and thus win more customers and partners. This course can be adapted to the specific needs of your organization. This course represents highly effective training on developing communication skills and teaches students how to ask correct questions and get the most from one discussion. Also, students will learn how to resolve and/or avoid conflict situations. Course Outline What is the process of effective communications? How to ask good questions and reach clear agreements? Why is listening important and how to listen actively? How to give and receive feedback? How to prepare and conduct effective meetings? Each topic includes discussions and exercises.
Duration 5 Days 30 CPD hours This course is intended for Database and system administrators Overview Manage physical data replacement and storageCreate, backup and restore databasesCreate and manage multiple temporary databases In this course, students learn how to manage physical data replacement and storage, create, backup and restore databases, and create and manage multiple temporary databases. SAP Adaptive Server Enterprise (ASE) Explaining SAP ASE Describing the Database Architecture Using Query Editors Installation Installing Servers Identifying Installation Parameters Starting and Stopping SAP ASE Connecting Clients to the Server Database Server Configuration Explaining the Server Configuration File Modifying the Server Configuration File Explaining Memory Mechanisms Configuring Memory Configuring the Size of Caches Space Management Creating Devices Managing Devices Mirroring Devices Creating Databases Managing Databases Managing Disk Resources Managing Temporary Databases Security Managing Roles Creating Logins Managing Logins Managing Database Users Managing Creation Permissions Managing Object Permissions Creating Groups Creating Roles Maintenance Using SAP ASE Extraction Utilities Using the Bulk Copy Utility Explaining Automatic Recovery Ensuring Database Consistency Setting Up the High Speed Consistency Checker Backup Planning for Backups Executing Database Backups Restoring Database Backups Performing Transaction Log Backups Using Advanced Backup Techniques Monitoring Using SAP DB Control Center Monitoring SAP ASE Additional course details: Nexus Humans EDB358 SAP System and Database Administration - Adaptive Server Enterprise training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EDB358 SAP System and Database Administration - Adaptive Server Enterprise course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB. Overview Building Globally Distributed Applications with Cosmos DB Migrate MongoDB Workloads to Cosmos DB Migrate Cassandra DB Workloads to Cosmos DB This course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB. Building Globally Distributed Applications with Cosmos DB Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Migrate MongoDB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Migrate Cassandra DB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Additional course details: Nexus Humans DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for wireless engineers who work in the following roles: Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview After taking this course, you should be able to: Describe and implement a Cisco-recommended structured design methodology Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs) Describe and implement Cisco enhanced wireless features Describe and implement the wireless design process Describe and implement specific vertical designs Describe and implement site survey processes Describe and implement network validation processes The Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.1 course gives you the knowledge you need to design Cisco© wireless networks. The course covers design specifics from scenario design concepts through the installation phase and into post-deployment validation.This course, including the self-paced material, helps prepare you to take the exam, Designing Cisco Enterprise Wireless Networks (300-425 ENWLSD), which leads to to the new CCNP© Enterprise and Cisco Certified Specialist ? Enterprise Wireless Design certifications. Describing and Implementing a Structured Wireless Design Methodology Importance of Planning Wireless Design with a Structured Methodology Cisco Structured Design Model Cisco Design Guides and Cisco Validated Designs for Wireless Networks Role of the Project Manager When Designing Wireless Networks Describing and Implementing Industry Protocols and Standards Wireless Standards Bodies Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard and Amendments Wi-Fi Alliance (WFA) Certifications Relevant Internet Engineering Task Force (IETF) Wireless RFCs Practice Activity Describing and Implementing Cisco Enhanced Wireless Features Hardware and Software Choices for a Wireless Network Design Cisco Infrastructure Settings for Wireless Network Design Cisco Enhanced Wireless Features Examining Cisco Mobility and Roaming Mobility and Intercontroller Mobility in a Wireless Network Optimize Client Roaming in a Wireless Network Cisco Workgroup Bridge (WGB) and WGB Roaming in a Wireless Network Describing and Implementing the Wireless Design Process Overview of Wireless Design Process Meet with the Customer to Discuss the Wireless Network Design Customer Information Gathering for a Wireless Network Design Design the Wireless Network Deployment of the Wireless Network Validation and Final Adjustments of the Wireless Network Wireless Network Design Project Documents and Deliverables Describing and Implementing Specific Vertical Designs Designs for Wireless Applications Wireless Network Design Within the Campus Extend Wireless Networks to the Branch Sites Examining Special Considerations in Advanced Wireless Designs High-Density Designs in Wireless Networks Introducing Location and Cisco Connected Mobile Experiences (CMX) Concepts Design for Location FastLocate and HyperLocation Bridges and Mesh in a Wireless Network Design Redundancy and High Availability in a Wireless Network Describing and Implementing the Site Survey Processes Site Survey Types Special Arrangements Needed for Site Surveys Safety Aspects to be Considered During Site Surveys Site Survey Tools in Cisco Prime Infrastructure Third-Party Site Survey Software and Hardware Tools Describing and Implementing Wireless Network Validation Processes Post-installation Wireless Network Validation Making Post-installation Changes to a Wireless Network Wireless Network Handoff to the Customer Installation Report
Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover