Duration 1 Days 6 CPD hours This course is intended for Software developers, system administrators, and IT professionals who are focused on Microsoft Windows Overview Configuring Microsoft Windows and Microsoft SQL Server in Google Compute Engine. Deploying ASP.NET MVC applications to Google Compute Engine. Deploying .NET Core applications to Google Compute Engine, Google Compute Engine, and Google Container Engine Learn how to create Windows virtual machines on Google Cloud so that you can deploy and run Microsoft Windows applications. In this course, you'll learn how to run SQL Server in Compute Engine, how to deploy instances across Google Cloud zones, and how to get more out of ASP.NET on Compute Engine, Google Container Engine, and App Engine. Introduction to Google Cloud Platform Scope and structure of GCP. Options for Windows deployment on GCP. GCP interfaces. Windows Workloads on Google Compute Engine Google Compute Engine virtual machine options. Integrating Active Directory with Google Compute Engine virtual machines. Options for running SQL Server in Google Compute Engine. Configuring SQL Server for high availability. Developing ASP.NET MVC applications Model-view-controller structure. Using Microsoft Visual Studio?s Web Project template to develop in ASP.NET. Deploying applications to Microsoft Internet Information Server (IIS) in GCE. Configuring Resilient Workloads Deploying instances across GCP zones. Using instance groups to create pools of virtual machines. Load balancing Windows applications. Delivering Next-Generation ASP.NET Core on GCP Understanding .NET Core and EF Core. Options for deploying ASP.NET Core applications on Google Cloud Platform. Deploying ASP.NET Core applications on Google Compute Engine. Deploying ASP.NET Core applications on Google Container Engine. Deploying ASP.NET Core applications on Google App Engine. Additional course details: Nexus Humans Develop and Deploy Windows Applications on Google Cloud Platform training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Develop and Deploy Windows Applications on Google Cloud Platform course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow. The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks Build incident layouts that enable analysts to triage and investigate incidents efficiently Identify how to categorize event information and map that information to display fields Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration This class is powered by Cloud Harmonics. Course Outline Module 1 - Core Functionality and Feature Sets Module 2 - Enabling and Configuring Integrations Module 3 - Playbook Development Module 4 - Classification and Mapping Module 5 - Layout Builder Module 6 - Solution Architecture Module 7 - Docker Module 8 - Automation Development and Debugging Module 9 - The Marketplace and Content Management Module 10 - Indicators and Threat Intelligence Management Module 11 - Jobs and Job Scheduling Module 12 - Users and Role-Based Access Controls (RBAC) Module 13 - Integration Development Additional course details: Nexus Humans Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This in an intermediate-level Java development course geared for students experienced with Java and Spring programming essentials. This course does not cover Java or Spring development basics. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core Cucumber and web testing skills, coupling the most current, effective techniques with the soundest industry practices. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will: Learn the request-response cycle of REST requests Implement a REST controller using Spring Map URLs to service endpoints Use Spring's template class to develop a REST client Bootstrap a Spring REST applications Return different media types for a service Setting the response headers Discuss Exceptions and HTTP Status codes Handle exceptions thrown by a service Spring REST focuses on providing an understanding of the fundamental principles and technologies that are used in the development of RESTful services and clients. This understanding is critical to being able to diagnose, troubleshoot, tune, and perform other lifecycle activities.Working with Spring REST is a two-day, fast-paced coding course geared for experienced developers who have prior working knowledge of Java. Throughout the course students learn the best practices for writing Restful services in Java using Spring Boot. The course provides an in-depth view of the APIs provided by Spring to develop both the REST service and the REST client. Implementing REST with Spring REST principles Introduction to RESTful Services in Spring Introduction to REST Clients in Spring Bootstrapping the REST application Content Representation Implementing the REST Service Error Handling Security and RESTful Services Securing Untrusted Input Defending RESTful Services Additional course details: Nexus Humans Working with Spring REST (TT3358) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Working with Spring REST (TT3358) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, and reseller support. Overview After successfully completing this course, you should be able to:Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations. Configure VPN redundancy. Configure dynamic routing using IPsec VPNs. Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE. Configure generic routing encapsulation (GRE) tunnels. This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. Chapter 1: Course IntroductionChapter 2: ScreenOS VPN Basics Review VPN Review Verifying Operations VPN Monitor Lab: VPN Review Chapter 3: VPN Variations Dynamic Peers Transparent Mode Overlapping Addresses Lab: VPN Variations Chapter 4: Hub-and-Spoke VPNs Concepts Policy-Based Hub-and-Spoke VPNs Route-Based Hub-and-Spoke VPNs with No Policy and NHTB Route-Based Hub-and_Spoke VPNS with Policy Centralized Control Hub-and-Spoke VPNs ACVPNs Lab: Hub-and-Spoke VPNs Chapter 5: Routing over VPNs Routing Overview Configuring RIP Configuring OSPF Case Studies Lab: Dynamic Routing Chapter 6: Using Certificates Concepts and Terminology Configuring Certificates and Certificate Support Configuring VPNs with Certificates Lab: Using Certificates Chapter 7: Redundant VPN Gateways (Optional) Redundant VPN Gateways Other Options Demonstration: Redundant VPN Gateways Chapter 8: Generic Routing Encapsulation (Optional) Configuring GRE Chapter 9: Dial-Up IPsec VPNs (Optional) Basic Dial-Up Configuration Group IKE ID XAUTH and Shared IKE ID Additional course details: Nexus Humans Advanced Juniper Networks VPN Implementations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Juniper Networks VPN Implementations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands-on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle 19c Database Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Users new to Tableau who will be administering a Tableau Server installation, including managing content, users, and permissions. Overview This skills-focused course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: User interactions with Tableau Server Tableau Server components Single-server installation Content administration Authorization and permissions Users, groups, and sites Data sources and extracts Schedules, tasks, and subscriptions Monitoring server status Command-line utilities and REST API Upgrading a single-server installation to a new version Modifying the authentication method This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions. Tableau Server Overview Tableau Product Line End-User Abilities Tableau Server Architecture Component Functions Server Diagrams Single Server Installation Technical Specifications Tableau Server Installation Checklist Configuration Options Resolutions for Common Installation Issues Installing Tableau Server Software User Experience Content Navigation, Searching, and Filtering Exploring Server Content Types and Objects Updating Account Settings Setting the Start Page Viewing Version Information Renaming a Project Adding a Workbook Description Authorization and Permissions Administrator Settings Authorization Overview Functional Security Model Site Roles Content Ownership and Permissions Permission Rules and Capabilities Permissions and the Default Project Creating Projects, Local Groups, and a Local User Importing Users and Adding Users to Groups Granting Permissions to Projects Creating a Project Leader Publishing and Changing Ownership of a Workbook Moving a Workbook Site Administration Data Sources, Extracts, Schedules, and Subscriptions Creating, Publishing, and Connecting to a Data Source Data Engine and File Store Creating and Publishing Extracts Backgrounder Schedules Subscriptions Enabling Subscriptions and Alerts Automating Server Tasks Automating and Programming Server Tasks Tabadmin Tabcmd Using the REST API Monitoring Server Viewing Server Status Admin Alerts Viewing Email Alerts and Admin Views Enabling Access to the Repository Custom Admin Views Licensing Information Performance Recording Upgrading Tableau Server Preparing to Upgrade Upgrading Software on the Same Machine Modifying the Authentication Method Importing AD Groups Log Files Administration Overview of Log Files Archiving Log Files Data Security Controlling What Users Can See User Filters
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network administrators Network operators Overview After taking this course, you should be able to: Explain the benefits of using Cisco DNA Center in a traditional, enterprise network Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco© Digital Network Architecture (Cisco DNA?) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. Course Outline Introducing Cisco DNA Center Assurance Monitoring Health and Performance with Cisco DNA Center Assurance Troubleshooting Issues, Observing Insights and Trends Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools Additional course details: Nexus Humans Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This class is designed for persons who are new to the z/OS platforms but have a technical background in information technology. It is intended for those who require an in-depth understanding of z/OS. Overview Describe the system initialization process of the z/OS operating systemsState the differences between an address space, data space, and hyperspaceDescribe the process of translating a virtual address to a real addressExplain the difference between paging and swappingDefine a z/OS taskDescribe dispatching, interrupt processing, supervisor calls, cross memory services, and serializationDescribe the purpose of the Job Entry Subsystem (JES)Illustrate the flow of a job through the z/OS environmentDescribe the allocation process for data sets in the z/OS environmentsIllustrate how an I/O request is processed in a z/OS environmentDescribe how workload management is accomplished in a z/OS environmentExplain the z/OS recovery processes and list available Problem Determination ToolsDescribe z/OS storage management conceptsDescribe the UNIX System Services functions provided in the z/OS environmentsExplain the network topologies and protocol support provided in z/OSDescribe system security and network security for a z/OS environmentCreate a high-level plan for the installation and configuration of a z/OS environment This classroom course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). Day 1 Unit 1: z/OS overview Including welcome and course overview Unit 2: Storage management Day 2 Unit 3: Managing work Unit 4: Input/output processing Day 3 Unit 4: Input/output processing (continued) Unit 5: Data management Unit 6: Job management Day 4 Unit 7: IPL and system initialization Unit 8: Termination and recovery analysis Unit 9: Installing and configuring Day 5 Unit 10: Communicating Unit 11: Security in z/OS Including end-of-course summary Additional course details: Nexus Humans ES15 IBM z/OS Facilities training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES15 IBM z/OS Facilities course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.