• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9257 Courses delivered Online

Oracle 19c Database Administration II (DBA II) (TTOR20619)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs with basic Oracle 19c skills. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs andexercises. Working in a hands-on learning environment led by our expert facilitator, students will explore: Creating CDBs and Regular PDBs Managing CDBs and PDBs Backup and Duplicate Upgrading and Transporting CDBs and Regular PDBs Backup Strategies and Terminology Restore and Recovery Concepts Using Flashback Technologies Duplicating a Database Installing Grid Infrastructure and Oracle Database Patching Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Using General Overall Database Enhancements Monitoring and Tuning Database Performance Managing Application PDBs Managing Security in Multitenant databases Recovery and Flashback Configuring and Using RMAN Diagnosing Failures Performing Recovery Transporting Data RMAN Troubleshooting and Tuning Creating an Oracle Database by using DBCA Oracle Restart Upgrading the Oracle Database Installing Grid Infrastructure for a Standalone server Using Availability Enhancements Tuning SQL Statements Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases. Creating CDBs and Regular PDBs Configure and create a CDB Create a new PDB from the CDB seed Explore the structure of PDBs Manage CDBs and PDBs Manage PDB service names and connections Manage startup, shutdown and availability of CDBs and PDBs Change the different modes and settings of PDBs Evaluate the impact of parameter value changes Performance management in CDBs and PDBs Control CDB and PDB resource usage with the Oracle Resource Manager Backup and Duplicate Perform Backup and Recover CDBs and PDBs Duplicate an active PDB Duplicate a Database Upgrading and Transporting CDBs and Regular PDBs Upgrade an Oracle Database Transport Data Backup Strategies and Terminology Perform Full and Incremental Backups and Recoveries Compress and Encrypt RMAN Backups Use a media manager Create multi-section backups of exceptionally large files Create duplexed backup sets Create archival backups Backup of recovery files Backup non database files Back up ASM meta data Restore and Recovery Concepts Employ the best Oracle Database recovery technology for your failure situation Describe and use Recovery technology for Crash, Complete, and Point-in-time recovery Using Flashback Technologies Configure your Database to support Flashback Perform flashback operations Duplicating a Database Duplicate Databases Install Grid Infrastructure and Oracle Database Install Grid Infrastructure for a Standalone server Install Oracle Database software Patching Grid Infrastructure and Oracle Database Patch Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Upgrade Oracle Grid Infrastructure Using General Overall Database Enhancements Install Oracle Database software Create, Delete and Configure Databases using DBCA Creating CDBs and Regular PDBs Use Miscellaneous 19c New Features Monitoring and Tuning Database Performance Managing Memory Components Understanding the Automatic Workload Repository (AWR) Understanding the Advisory Framework Monitoring Wait Events, Sessions, and Services Managing Metric Thresholds and Alerts Understanding and Using the Performance Tuning Methodology Performing Performance Planning Understanding the Automatic Database Diagnostic Monitor (ADDM) Manage Application PDBs Explain the purpose of application root and application seed Define and create application PDBs Install, upgrade and Patch applications Create and administer Application PDBS Clone PDBs and Application containers Plug and unplug operations with PDBs and application containers Comparing Local Undo Mode and Shared Undo Mode Manage Security in Multitenant databases Manage Security in Multitenant databases Manage PDB lockdown profiles Audit Users in CDBs and PDBs Manage other types of policies in application containers Recovery and Flashback Restore and Recovering Databases with RMAN Perform CDB and PDB flashback Configuring and Using RMAN Configure RMAN and the Database for Recoverability Configure and Using an RMAN recovery catalog Diagnosing Failures Detect and repair database and database block corruption Diagnosing Database Issues Performing Recovery Restore and Recovering Databases with RMAN Perform Non RMAN database recovery Transporting Data Transport Data RMAN Troubleshooting and Tuning Interpret the RMAN message output Diagnose RMAN performance issues Creating an Oracle Database by using DBCA Create, Delete and Configure Databases using DBCA Oracle Restart Configure and use Oracle Restart to manage components Upgrade the Oracle Database Plan for Upgrading an Oracle Database Upgrade an Oracle Database Perform Post-Upgrade tasks Install Grid Infrastructure for a Standalone server Rapid Home Provisioning Using Availability Enhancements Use an RMAN recovery catalog Use Flashback Database Tuning SQL Statements Understanding the Oracle Optimizer Using the SQL Tuning Advisor Managing Optimizer Statistics Using the SQL Access Advisor Understanding the SQL Tuning Process Additional course details: Nexus Humans Oracle 19c Database Administration II (DBA II) (TTOR20619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Administration II (DBA II) (TTOR20619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Administration II (DBA II) (TTOR20619)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Install, Configure, Manage [V8]

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture™ concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences

VMware vSAN: Install, Configure, Manage [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

BA04 - Eliciting and Writing Effective Requirements

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for beginner to intermediate business and requirements analysts who are looking to improve their elicitation and requirements writing and documentation skills. This course is also a great fit for technical writers, product and software testers, project managers, product owners who work closely with business analysts or who perform some for of business analysis themselves. Overview Understand the role of the business analyst and core competencies for performing successfully Discuss the criticality of business analysis and requirements for successful project outcomes Understand the main professional associations and standards supporting business analysts in the industry Discuss the common problems with requirements and explore approaches to address these issues Obtain a clear understanding of the various requirements types and the significance for eliciting each type Demonstrate your ability to identify stakeholders Explore various methods for understanding and analyzing stakeholders Discuss and apply good planning practices to requirements elicitation efforts Obtain knowledge and understanding of over 15 current and commonly applied elicitation techniques Understand how to progress from elicitation to analysis to documentation Write well-formed and validated requirements Gain understanding of the best practices for writing quality requirements Learn the technical writing techniques that apply directly to writing requirements documents Discuss writing pitfalls, risks that impact requirements, and how to address them Learn best practices for communicating and collaborating with stakeholders, sharing the results of elicitation and the resulting documentation Learn approaches for validating requirements Understand the difference between validating requirements and validating the solution With elicitation serving as a major component of the requirements process, it is imperative that business analysts maintain high competency levels in elicitation practices and technique use to help organizations overcome the requirements related challenges faced on projects. Regardless whether you are a practitioner just starting off your career in business analysis or whether you have been performing the role for some years, this course will provide insight into the latest thoughts on elicitation and writing effective requirements and present a number of current techniques that are being applied on projects across industries today. Review of Foundational Concepts Definition of a business analysis Definition of business analyst BA role vs. PM role Business analysis competencies Benefits of business analysis Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis core concepts Discussion: Project challenges Understanding Requirements Common problems with requirements Understand the problem first Define the business need Situation statements and moving to requirements Understanding requirement types Business requirements Stakeholder/User Requirements Solution Requirements Functional Requirements Non-Functional Requirements Assumptions and Constraints Discussions: Requirement problems, business needs, and identifying non-functional requirements Discovering Stakeholders Definition of a stakeholder Stakeholder types Identifying stakeholders Performing stakeholder analysis Stakeholders and requirements Tips for identifying stakeholders Grouping stakeholders Creating a RACI model Tips for analyzing stakeholders Documenting results of stakeholder analysis Workshop: Discovering stakeholders Preparing for Requirements Elicitation Planning for elicitation Benefits of elicitation planning What do you plan? The elicitation plan Setting objectives for elicitation Determining the scope for elicitation Establishing pre-work Determining the outputs for the session The iterative nature of elicitation Elicitation roles Elicitation planning techniques Discussions: Who to involve in elicitation, planning impacts, and unplanned elicitation Workshop: Planning for elicitation Conduct Requirements Elicitation Elicitation skillset Types of elicitation techniques Using active listening in elicitation Techniques for performing elicitation Benchmarking/Market Analysis Brainstorming Business Rules Analysis Collaborative Games Concept Modeling Data Mining Data Modeling Document Analysis Focus Groups Interface Analysis Interviews Observation Process Modeling Prototyping Survey or Questionnaire Workshops Write Effective Requirements Elicitation and Analysis Requirements related issues Implications of bad requirements Elicitation and documentation Writing skillset Documenting requirements Modeling requirements Defining the project life cycle Impact of project life cycle on documentation Requirements specifications Characteristics of good requirements Guidelines for writing textual requirements Structuring a requirement Writing pitfalls Traceability Requirements attributes Risks associated to requirements Discussions: Project Life Cycle and Correcting Poorly Written Requirements Workshops: Documenting Requirements and Identify Characteristics of Good Requirements Confirm and Communicate Elicitation Requirements Business analysis communication Requirements communication Communication skills The 7 Cs Timing of communication Planning communication Importance of Collaboration Planning collaboration Documenting communication/collaboration needs Confirming elicitation results Verify requirements Characteristics of good requirements (revisited) Requirements checklist Requirements validation Signing off on requirements Discussions: Responsibility for Communication, Eliciting Communication Needs, Validation Signoff Workshops: Communicating Requirements and Obtaining Signoff Evaluate the Solution Business analyst role in solution evaluation Why solutions under perform What we are looking for in solution evaluation When does solution evaluation occur Performing solution evaluation Planning solution evaluation Metrics that might exist Evaluating long term performance Qualitative vs. quantitative measures Tools & techniques used in solution evaluation Comparing expected to actuals When solution evaluation discovers a variance Tools/techniques for analyzing variances Proposing a recommendation Communicating results of solution evaluation Discussion: Addressing Variance Wrap up and Next Steps Useful books and links on writing effective requirements BABOK© Guide Business Analysis for Practitioners: A Practice Guide Additional course details: Nexus Humans BA04 - Eliciting and Writing Effective Requirements training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA04 - Eliciting and Writing Effective Requirements course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA04 - Eliciting and Writing Effective Requirements
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Install, Configure, Manage [V7]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager™ to automate driver and firmware installations Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure the vSAN iSCSI target Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration™ Describe how to setup a stretched and a two-node vSAN cluster Discuss vSAN cluster backup methodology Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health During this five-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail VMware HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Install, Configure, Manage [V7]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring Cisco MDS 9000 Series Switches v3.6 (DCMDS)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Technical decision makers Network architects Data center systems engineers Field engineers Overview After taking this course, you should be able to: Discover and describe the Cisco Multilayer Director Switch (MDS) platform of multilayer switches and directors Provision Cisco MDS Switches Describe key product features of the MDS platform Describe and implement automation an Cisco MDS Switches Configure and implement the Cisco MDS switches and platform features Resolve issues and troubleshoot FC domains, zones and zone merges, and switch boot and firmware upgrades The Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.6 course teaches you to implement, manage, and troubleshoot Cisco© MDS 9000 Series Switches to build highly available, scalable storage networks. Through expert instruction and extensive hands-on practice, you will learn how to deploy and utilize capabilities such as Virtual Storage Area Networks (VSANs), Role-Based Access Control (RBAC), N-Port Virtualization (NPV) fabric security, zoning, automation with NX-API, Slow Drain Analysis, SAN analytics, Fibre Channel over TCP/IP (FCIP) tunnels, and more. You will learn how to configure and implement platform features and learn troubleshooting techniques pertaining to Fibre Channel (FC) domains, firmware upgrades, zones, and zone mergers.This course helps you prepare to take the 300-625 Implementing Cisco Storage Area Networking (DCSAN) exam, which leads to CCNP Data Center and the Certified Specialist - Data Center SAN Implementation certifications. Course Outline Describing Cisco MDS Platform Provisioning Cisco MDS Switches Building the Fibre Channel Fabric with Cisco MDS Switches Automating Cisco MDS Fabric Monitoring and Reporting Cisco MDS Features Troubleshooting Common Cisco MDS Issues

Cisco Configuring Cisco MDS 9000 Series Switches v3.6 (DCMDS)
Delivered OnlineFlexible Dates
Price on Enquiry

Mac OS Support Essentials 10.15 (Catalina)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for individuals who want to learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. Overview Upon successful completion of this course, students in this course will learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes. In this course, students will be introduced to the command-line interface and mac OS Recovery. They will also manage user accounts and system resources. Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage File Vault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues

Mac OS Support Essentials 10.15 (Catalina)
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)
Delivered OnlineFlexible Dates
Price on Enquiry

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Cisco Meeting Server Overview Cisco Meeting Server Deployment Cisco Meeting Server User Licensing Cisco Meeting Server Configuration Cisco Meeting Server Configuration with Cisco Unified Communication Manager (CUCM) Cisco Meeting Server Integration VCS/Expressway Cisco Meeting Server Integration with TMS Cisco Meeting Server Configuration with Lync/Skype for Business Cisco Meeting Server Recording and Streaming Cisco Meeting Manager (CMM) Deployment Cisco Meeting Server WebRTC using Expressway Proxy Cisco Meeting Server Customization Cisco Meeting Server Troubleshooting In this course, students will install and configure a Cisco Meeting Server version 2.x. Students will configure a multimode CMS Cluster and implement all the different components of a clustered solution. Student will also integrate CMS with Unified Communications Manager and VCS/Expressway. Students will also integrate Recording and Skype/Lync. Students will use the TMS and new Cisco Meeting Manager Schedule and monitor CMS. Cisco Meeting Server Overview What is Cisco Meeting Server Cisco Meeting Server Benefits Cisco Meeting Server vs Telepresence Server vs MCU Cisco Meeting Server Functions? Cisco Meeting Server Components Cisco Meeting Server Call Bridge Cisco Meeting Server Web Bridge Cisco Meeting Server Turn Server Cisco Meeting Server XMPP Server Cisco Meeting Server Database Cisco Meeting Server Scalability On-premises and Cloud Conferencing API Integration Cisco Meeting Server Deployment MMP CLI Cisco Meeting Server Prerequisites Cisco Meeting Server 2000 Deployments Installing the server Configuring the Fabric Interconnect modules Configuring the Cisco Meeting Server 2000 through the MMP Checking the installed software Configuring the Web Admin Interface Applying a License File Cisco Meeting Server 1000/VM Deployments Installing CMM via VMware Configuring VMware Network Management Configuring the VMware Instance using vSphere client Retrieving and activating VMware Licenses Accessing the Cisco Meeting Server 1000 Console Installing CMM via Hyper-V Single combined server deployment Single Split Server Deployment Deploying a Core Server Deploying an Edge Server Certificate Guidelines for Single Split Server Deployment Scalable and Resilient Server Deployments Cisco Meeting Server User Licensing Obtaining and Entering a License File Cisco Meeting Server Licenses Cisco User Licenses Personal Multiparty Plus Licensing Shared Multiparty Plus Licensing Cisco Meeting Server Capacity Units XMPP Licensing for Cisco Meeting Apps Cisco Meeting Server Capacity Units Cisco Meeting Server Configuration Transferring the License File to the Cisco Meeting Sever Creating a Cisco Meeting Server Administrator Account Setting up the Network Interface for IPv4 Adding additional Network Interfaces Configuring the Web Admin Interface Creating the certificate for the Web Admin Interface Configuring the Web Admin Interface for HTTS Access Configuring the Web Bridge Configuring the TURN server Configuring the Databases Deploying Web Bridges Deploying multiple Web Bridges Setting up the Web Bridges? certificates Setting up the Web Bridges via the API Web Bridge call flow Cisco Meeting App and WebRTC Client Enabling HTTP redirect and the Web Bridge Deploying the TURN Servers Dial plan configuration ? Overview Dial plan rules for incoming calls and outbound calls Outbound Dial Plan Rules Inbound Dial Plan Rules Forwarding Dial Plan Rules Dial plan configuration?SIP endpoints Cisco Meeting Server (CMS) Configuration with Cisco Unified Communication Manager (CUCM) CUCM and CMS Integration Setting up Escalated ad hoc calls Configuring the Meeting Server Setup Incoming Dial Plan Setup Administrator Account with API Permission Adding the Cisco Meeting Server as a Conference Bridge Creating a Media Resource Group Creating a Media Resource List Adding the Media Resource Group to a Device Pool or Device Setting up Scheduled and Rendezvous Calls Configure Outbound Dial Plan Dial Plan Configuring Cisco Unified Communications Server Configure Route Groups Configure Route Lists Configure Route Pattern Support for Active Control Participant List Indicators Selecting Layout Limitations Overview of ActiveControl and the iX protocol CUCM 8.x and earlier Third-party networks VCS-centric deployments Load Balancing Calls Configuring Call Bridges for Load Balancing Incoming Calls Creating Call Bridge Groups Enabling Load Balancing Fine Tuning Load Balancing Enable Load Balancing of Outbound SIP Calls Setup Outbound Dial Plan Rule for Load Balancing SIP Calls Supply the Call Bridge Group or Specific Call Bridge to Use for Outbound SIP Calls Cisco Meeting Server Integration VCS/Expressway Gateway Configuration Call Testing Inbound call from an endpoint registered to a VCS/Expressway Outbound call to an endpoint registered to a VCS/Expressway Calling non Cisco Meeting App users from H.323 endpoint Troubleshooting Cisco Meeting Server Integration with TMS TMS Integration Cisco Meeting Server Configuration with Lync/Skype for Business Configuring Cisco Meeting Server with SKYPE Dial plan configuration ? integrating Lync/Skype for Business Lync clients dialing into a call on clustered Meeting Servers Integrating SIP endpoints and Lync clients Adding calls between Lync clients and SIP video endpoints Lync Front End server configuration VCS configuration Meeting Server configuration Integrating Cisco Meeting App with SIP and Lync clients Integrating Lync using Lync Edge service Controlling the bandwidth for sharing content on Microsoft Lync and Skype for Business calls Direct Lync federation Calling into scheduled Lync meetings directly and via IVR Office 365 Dual Homed Experience with OBTP Scheduling Cisco Meeting Server Recording and Streaming Recording Meetings Recorder licensing Recording with Vbrick Prerequisites for the Meeting Server Configuring the Meeting Server to work with Vbrick Steps to configuring the Streamer Deploying streaming Streamer licensing Recording meetings Cisco Meeting Manager (CMM) Deployment Deploy Cisco Meeting Manager Cisco Meeting Manager Meetings Navigation List Meetings Edit Meetings Layout Recording Streaming Participants Find meetings Find participants Change layout for all participants in a meeting Start and stop recording Start and stop streaming Add participants Change layout for an individual participant Turn audio or video on or off View participant details Call statistics Cisco Meeting Server WebRTC using Expressway Proxy Configure Cisco Meeting Server for WebRTC Proxy Configure Cisco Expressway C Configure Turn on Cisco Expressway E Cisco Meeting Server Customization WebRTC App Customization Call Customization IVR Message Customization SIP/LYNC Call Message Customization Invitation Customization Cisco Meeting Server Troubleshooting Troubleshooting Cisco Meeting Server Connectivity Troubleshooting Web Bridge connectivity Troubleshooting Call Server issues Troubleshooting Conferencing issues

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server
Delivered OnlineFlexible Dates
Price on Enquiry

RUM120 - Real User Monitor 9.x Essentials Workshop

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for New users of Real User Monitor (RUM) 9.1, including: Database Administrators System Administrators Network Administrators Operations Managers Availability Engineers Overview At the end of the course, you should be able to: Describe the architecture of a RUM implementation Install and configure the RUM Windows Probe Install and configure the RUM Engine Configure RUM monitoring of a three-tier application (web, application, and database server) from BSM Explain RUM reporting data Size and tune RUM Configure RUM monitoring for secure web applications that use SSL Java Key Store (JKS) Troubleshoot RUM issues using the RUM logs This course is designed for users who have working experience with Business Service Management (BSM). This course is designed for users who have working experience with Business Service Management (BSM).

RUM120 - Real User Monitor 9.x Essentials Workshop
Delivered OnlineFlexible Dates
Price on Enquiry