• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7259 Courses delivered Online

WM666 IBM Integration Bus V10 Application Development I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for experienced Integration Specialists and Senior-Level Developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of the IBM Integration BusDevelop, deploy, and test message flow applicationsGenerate message flow applications from predefined patternsUse IBM Integration Bus problem determination aids to diagnose and solve development and runtime errorsDescribe the function and appropriate use of IBM Integration Bus processing nodesWrite basic Extended Structured Query Language and Java programs to transform dataUse the IBM Graphical Data Mapping editor to transform dataDefine, use, and test simple XML and Data Format Description Language (DFDL) data modelsDescribe supported transport protocols and how to call them in message flows This course teaches you how to use IBM Integration Bus to develop, deploy, and support message flow applications. Students will learn how to construct applications to transport and transform data. Course Outline Course introduction Introduction to IBM Integration Bus Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Course summary Additional course details: Nexus Humans WM666 IBM Integration Bus V10 Application Development I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM666 IBM Integration Bus V10 Application Development I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM666 IBM Integration Bus V10 Application Development I
Delivered OnlineFlexible Dates
Price on Enquiry

MB-300T00 Microsoft Finance and Operations Core

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A Dynamics 365 for Finance and Operations Functional Consultant is responsible for performing discovery, capturing requirements, engaging subject matter experts and stakeholders, translating requirements, and configuring the solution and applications. The Functional Consultant implements a solution using out of the box capabilities, codeless extensibility, application and service integrations. Overview This course provides the practical knowledge to Navigate and efficiently use search, filtering and queries Use operational workspaces Work with Business Document Management Work with record templates Integrate Power BI with Dynamics 365 Finance and Operations apps Personalize workspaces Run and analyze security reports Create and use workflow for approval Work with Organization Hierarchy and its purposes. How to use personalization feature Use Data Management workspace Create and use and entity templates Import and export data and manage data by using Office Integration Dynamics 365 Finance and Operations apps include, but are not limited to, Dynamics 365 Finance, Dynamics 365 Supply Chain Management, and Dynamics 365 Supply Chain Management, Manufacturing. This foundational course provides students with the important first steps in automating and modernizing both global financial and supply chain operations. USE COMMON FUNCTIONALITY AND IMPLEMENTATION TOOLS Introduction Identify and use common Dynamics 365 Finance and Operations apps features and functionality Describe use cases for Power Platform apps and services Module Summary CONFIGURE SECURITY, PROCESSES, AND OPTIONS Introduction Implement security Design and create workflows Configure Organization administration features Configure System administration features Module Summary MANAGE DYNAMICS 365 FINANCE AND OPERATION DATA Introduction Manage data in Dynamics 365 Finance and Operations apps Plan a migration strategy Prepare data for migration and migrate data Module Summary VALIDATE AND SUPPORT THE SOLUTION Introduction Test solutions in Dynamics 365 Finance and Operations apps Implement Lifecycle Services tools Module Summary Additional course details: Nexus Humans MB-300T00 Microsoft Dynamics 365: Core Finance and Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-300T00 Microsoft Dynamics 365: Core Finance and Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-300T00 Microsoft Finance and Operations Core
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Juniper Networks Firewall/IPSec VPN Products

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Configuring Juniper Networks Firewall/IPSec VPN Products
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network administrators Network operators Overview After taking this course, you should be able to: Explain the benefits of using Cisco DNA Center in a traditional, enterprise network Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco© Digital Network Architecture (Cisco DNA?) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. Course Outline Introducing Cisco DNA Center Assurance Monitoring Health and Performance with Cisco DNA Center Assurance Troubleshooting Issues, Observing Insights and Trends Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools Additional course details: Nexus Humans Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the Cisco IOS XR 64-Bit software architecture and Linux system fundamentals Describe the major differences between classic Cisco IOS XR software and Cisco IOS XR 64-Bit software on the ASR 9000 Series routers Migrate an ASR 9000 Series router from classic IOS XR software to Cisco IOS XR 64-Bit software Perform and explain Cisco IOS XR 64-Bit software installations Configure and describe Cisco IOS XR 64-Bit software features The Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) course covers the migration from classic 32-bit Cisco IOS© XR software to Cisco IOS XR 64-Bit software on the Cisco© ASR 9000 Series Aggregation Services Routers. This course will also examine the software architecture, boot process, and auto-provisioning of the Cisco IOS XR 64-bit software, as well as showing you how to install Cisco IOS XR and third-party software packages. In addition, it will investigate data models and show you how to implement telemetry, model-driven programmability, and application hosting services. Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 Series IOS XR 64-Bit Software vs. Classic 32-Bit Software Exploring Linux Fundamentals Creating User Profiles Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Examining the Boot Process Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Features Investigating Data Models Implementing Telemetry Exploring Model-Driven Programmability Employing Application Hosting Additional course details: Nexus Humans Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ASR9000 Series 64-bit Software Migration (IOSXR211) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco ASR9000 Series 64-bit Software Migration (IOSXR211)
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. IntroductionThe Traps? technology alternative to endpoint defenseTraps? Exploit and Malware protectionTraps? Product ArchitectureTraps? DeploymentTraps? Exploit Policy ManagementTraps? Malware Protection PoliciesTraps? ForensicsPractical Traps? Implementation considerations Additional course details: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Meeting Server Intermediate (COLLAB250)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Technical support personnel Channel partners and resellers Overview Upon completion of this course, the learner should be able to meet the following objectives: Installing a Cisco Meeting Server in a single combined deployment Installing a Cisco Meeting Server in a single split deployment Troubleshooting tools Integrating Cisco Meeting Server with Cisco TelePresence Video Communication Server (VCS), Cisco Unified Communications Manager and Microsoft Skype for Business In this course, you will learn how to install, troubleshoot, and maintain a single server and single server split deployment of Cisco Meeting Servers This course is designed to establish a minimum level of knowledge and competency among Cisco Meeting Server resale and installation partners. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Cisco Meeting Server Single Server Solution Cisco Meeting Server Solution Reviewing Authentication and Encryption Single Server Solution Preparing for Cisco Meeting Server Installation Installing Cisco Meeting Servers Configuring the Web Admin Configuring the Call Bridge Configuring the Web Bridge Module 2: Troubleshooting Tools Seven call detail record (CDR) record types and the information contained in each Capture server configuration files (.json), crash log files, media and application .dmp files. Cisco Meeting App crash files, and Cisco Meeting App diagnostic logs Employ the built-in commands to identify Cisco Meeting Server solution issues including PKI, DNS Lookup, Ping, and Service Status Common issues for end users using the Cisco Meeting Server solution Module 3: Firewall Traversal and Unified Communications Application Integration Deploying a TURN Server Deploying Firewall and NAT Traversal Integrating with UC Platforms Additional course details: Nexus Humans Cisco Meeting Server Intermediate (COLLAB250) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Meeting Server Intermediate (COLLAB250) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Meeting Server Intermediate (COLLAB250)
Delivered OnlineFlexible Dates
Price on Enquiry

BQ104 IBM QRadar SIEM Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM. Overview After completing this course, you should be able to perform the following tasks: Describe how QRadar collects data to detect suspicious activities Describe the QRadar architecture and data flows Navigate the user interface Define log sources, protocols, and event details Discover how QRadar collects and analyzes network flow information Describe the QRadar Custom Rule Engine Utilize the Use Case Manager app Discover and manage asset information Learn about a variety of QRadar apps, content extensions, and the App Framework Analyze offenses by using the QRadar UI and the Analyst Workflow app Search, filter, group, and analyze security data Use AQL for advanced searches Use QRadar to create customized reports Explore aggregated data management Define sophisticated reporting using Pulse Dashboards Discover QRadar administrative tasks IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned. Course Outline Unit 0: IBM Security QRadar 7.4 - Fundamentals Unit 1: QRadar Architecture Unit 2: QRadar UI - Overview Unit 3: QRadar - Log Source Unit 4: QRadar flows and QRadar Network Insights Unit 5: QRadar Custom Rule Engine (CRE) Unit 6: QRadar Use Case Manager app Unit 7: QRadar - Assets Unit 8: QRadar extensions Unit 9: Working with Offenses Unit 10: QRadar - Search, filtering, and AQL Unit 11: QRadar - Reporting and Dashboards Unit 12: QRadar - Admin Console Additional course details: Nexus Humans BQ104 IBM QRadar SIEM Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BQ104 IBM QRadar SIEM Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BQ104 IBM QRadar SIEM Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

ES15 IBM z/OS Facilities

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for persons who are new to the z/OS platforms but have a technical background in information technology. It is intended for those who require an in-depth understanding of z/OS. Overview Describe the system initialization process of the z/OS operating systemsState the differences between an address space, data space, and hyperspaceDescribe the process of translating a virtual address to a real addressExplain the difference between paging and swappingDefine a z/OS taskDescribe dispatching, interrupt processing, supervisor calls, cross memory services, and serializationDescribe the purpose of the Job Entry Subsystem (JES)Illustrate the flow of a job through the z/OS environmentDescribe the allocation process for data sets in the z/OS environmentsIllustrate how an I/O request is processed in a z/OS environmentDescribe how workload management is accomplished in a z/OS environmentExplain the z/OS recovery processes and list available Problem Determination ToolsDescribe z/OS storage management conceptsDescribe the UNIX System Services functions provided in the z/OS environmentsExplain the network topologies and protocol support provided in z/OSDescribe system security and network security for a z/OS environmentCreate a high-level plan for the installation and configuration of a z/OS environment This classroom course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). Day 1 Unit 1: z/OS overview Including welcome and course overview Unit 2: Storage management Day 2 Unit 3: Managing work Unit 4: Input/output processing Day 3 Unit 4: Input/output processing (continued) Unit 5: Data management Unit 6: Job management Day 4 Unit 7: IPL and system initialization Unit 8: Termination and recovery analysis Unit 9: Installing and configuring Day 5 Unit 10: Communicating Unit 11: Security in z/OS Including end-of-course summary Additional course details: Nexus Humans ES15 IBM z/OS Facilities training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES15 IBM z/OS Facilities course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ES15 IBM z/OS Facilities
Delivered OnlineFlexible Dates
Price on Enquiry