• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

21665 Disc courses

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 4 Days 24 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this four-day course, you focus on installing VMware Tanzu© Kubernetes Grid? in a VMware vSphere© environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters List the components of a Tanzu Kubernetes Grid instance VMware Tanzu Kubernetes Grid CLI and API Illustrate how to use the Tanzu CLI Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API custom resource definitions Authentication Explain how Kubernetes manages authentication with Management clusters Explain how Kubernetes manages authentication with supervisor clusters Define Pinniped Define Dex Describe the Pinniped authentication workflow Load Balancers Illustrate how load balancing works for the Kubernetes control plane Illustrate how load balancing works for application workload Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer List load balancing options available on public clouds VMware Tanzu Kubernetes Grid on vSphere List the requirements for deploying a supervisor cluster List the steps to install a Tanzu Kubernetes Grid supervisor cluster Summarize the events of a supervisor cluster creation List the requirements for deploying a management cluster List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters VMware Tanzu Kubernetes Grid on Public Clouds List the requirements for deploying a management cluster on AWS and Microsoft Azure List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and Azure Tanzu Kubernetes Workload Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain the difference between the v1alpha3 and v1beta1 APIs Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs compose a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes Grid cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Tanzu Kubernetes Grid Packages Define the Tanzu Kubernetes Grid packages Explain the difference between Auto-Managed and CLI-Managed packages Define packages repositories Configuring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages Describe Cert-Manager Describe the Harbor Image Registry Describe Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe Prometheus and Grafana Configuring and Managing Tanzu Kubernetes Grid Networking Packages Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Describe ExternalDNS Demonstrate how to install Service Discovery with ExternalDNS Describe Multus CNI Tanzu Kubernetes Grid Day 2 Operations List the load balancer configuration options in vSphere to load balance applications Demonstrate how to configure Ingress with the NodePortLocal Mode Explain how to install VMware Tanzu Application Platform Describe life cycle management in Tanzu Kubernetes Grid Explain how backup and restore are implemented in Tanzu Kubernetes Grid Describe Velero and Restic List the steps to back up a Workload cluster using Velero and Restic Troubleshooting Tanzu Kubernetes Grid Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster Explain packages cleanup procedures Explain management recovery procedures Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Install, Configure, Manage [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers Senior Software Engineers Java Developers DevOps Engineers Software Developers .NET Developers Systems Engineers Full Stack Developers Full Stack Java Developers Data Scientists Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi™ hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler™ Discuss solutions for managing the vSphere life cycle Use VMware vSphere Update Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere© 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center Course Introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concept Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Use VMware Host Client? to access and manage ESXi host Virtual Machines Create and remove a virtual machine Provision a virtual machine with virtual devices Identify the files that make up a virtual machine Explain the importance of VMware Tools vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use the vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use vCenter Server High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Deploy virtual machines on a VMware vSAN? datastore Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Dynamically increase the size of a virtual disk Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Configure a vSphere cluster using ESXi Cluster Quickstart Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster vSphere Lifecycle Management Describe how VMware vSphere© Lifecycle Manager? works Use vSphere Lifecycle Manager to update ESXi hosts in a cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Install, Configure, Manage [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Install, Configure, Manage [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Install, Configure, Manage [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

A Free One to One enquiry call

4.9(8)

By The Soul Shed

Learn about Intuitive Creativity, and three practices: Deep-Mapping, SoulCollage® and Walking with Trees If intuitive creative practices as a pathway to unfolding are new to you, please do be in touch to organise a call where you can discover more, share where you are at, and ask any questions you need to.  Register here and I will be in touch to arrange a call with you.

A Free One to One enquiry call
Delivered OnlineFlexible Dates
FREE

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the Dynamics 365 Supply Chain Management Functional Consultant Expert or those whose role includes implementing and configuring advanced features of Dynamics 365 Supply Chain Management. Overview Objectives: Create products as type Item and Service. Set up product unit conversions. Set up transfer orders Set up default order settings. Create product masters with predefined variants. Create and set up category hierarchies. Create product attributes. Create bill of materials using BOM designer Discrete manufacturing concepts Production order statuses Production stages Bill of materials (BOM) Resources Routes and operations Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure process manufacturing. Create and configure catch weight items. Configure approved vendors. Understand the features in engineering change management. Learn how the end-to-end engineering change management process works. Set up engineering organizations. Work with product versioning. Create dimension groups by using the version dimensions. Create product life cycle states. Use engineering categories. Set up engineering change severities and severity rules. Set up product owners. Use a workflow with engineering change management. Create an engineering change request. Learn about business impacts. Create an engineering change order. Important terminology to help you understand the concepts and processes that are associated with product configuration. Product configuration end-to-end scenario. Different areas that span the product configuration process. The product configuration model. How to build a product configuration model. Configure the costing sheet. Perform BOM calculation and analyze costs by using the costing sheet. IoT intelligence and insights in Supply Chain Management This course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes. Create products and product masters in Dynamics 365 Supply Chain Management Product information workspace Concept of a product Create products Set up unit conversions Batch disposition codes Default order settings Define products as not stocked Create product masters with variants Gain productivity by using the Variant suggestions page Create and set up category hierarchies and attributes Set up item pricing Create bill of materials in Dynamics 365 Supply Chain Management Work with the BOM designer BOM and formula versions BOM line types BOM levels Get started with discrete manufacturing in Dynamics 365 Supply Chain Management Discrete manufacturing life cycle Master planning and planned production orders Bills of materials Working with BOM and item configurations Create a bill of materials Production orders Work with commodity pricing and compliance in Dynamics 365 Supply Chain Management Configure commodity pricing Configure product compliance Configure process manufacturing in Dynamics 365 Supply Chain Management Process manufacturing item types Production type setup Set up packaging and batch attributes Shelf life related setup Item model group, product compliance, and approved vendors Catch weight Transaction adjustments Catch weight item handling policy Catch weight tags Configure approved vendors Get started with Engineering Change Management for Dynamics 365 Supply Chain Management Overview of features End-to-end walkthrough of features Set up versioned products in Dynamics 365 Supply Chain Management Create an engineering organization Create nomenclature for product versions Create product version number rules Create product dimension groups by using the version dimension Create product life cycle states Engineering attributes Product readiness policies Product release policies Create engineering categories Configure engineering change management for Dynamics 365 Supply Chain Management Set up engineering change severities Set up severity rule sets Set up product owners Engineering workflows Request and follow up with product changes in Dynamics 365 Supply Chain Management Engineering change requests Engineering change orders up with product changes in Dynamics 365 Supply Chain Management Get started with product configuration in Dynamics 365 Supply Chain Management Elements of a product configuration model Expression constraints and table constraints in product configuration models Validate and test a product configuration model Finalize a model for configuration Set up a product configuration model Calculations for product configuration models Solver strategy for product configuration Reuse product configurations Release a product configuration model Customize a product configuration model Work with the costing sheet in Dynamics 365 Supply Chain Management Costing versions Cost groups Calculation groups Costing sheets BOM calculations BOM Measurements BOM Reports Configure formulas for process manufacturing in Dynamics 365 Supply Chain Management Formulas, formula lines, and formula versions Formula features Approve and activate formulas and formula versions Use step consumption Coproducts By-products Burden allocation Planning items Get started with production control in Dynamics 365 Supply Chain Management Core concepts in production control Understand unified manufacturing Manufacturing principles Overview of the production process and production life cycle Batch orders Discrete manufacturing Process manufacturing Lean manufacturing Configure production control for unified manufacturing Capacity planning Integration between the General ledger and the Production control modules IoT intelligence and insights Describe the value proposition for mixed-reality Guides for production floor workers Use warehouse management for manufacturing in Dynamics 365 Supply Chain Management Production input location Production output location Staging and order picking Release BOM and formula lines to the warehouse Cross-docking Planned cross docking Visibility into material exceptions Work with manufacturing execution in Dynamics 365 Supply Chain Management Understand the manufacturing executions Identify roles in manufacturing execution Planning consideration for manufacturing execution Configure manufacturing execution Setup time and attendance for manufacturing execution processes Control production with manufacturing execution Create and process report as finished journals with co-products and by-products Calculate and approve raw time registrations Report as finished from the job card device Get started with Asset Management for Dynamics 365 Supply Chain Management Asset Management terminology and concepts Functional locations and assets Assets and work orders Install the Asset Management mobile workspace Use the Asset Management mobile workspace Asset Management integration capabilities Integrate Asset Management with Dynamics 365 Guides Schedule work orders in Asset Management for Dynamics 365 Supply Chain Management Configure workers for work order scheduling Schedule and dispatch work orders Calculate capacity load on scheduled work orders Configure and perform the procure-to-purchase process in Dynamics 365 Supply Chain Management Procurement scenario Overview of the procure-to-purchase process Set up procurement categories Use procurement catalogs Create a purchase requisition Create and process a request for quotation Create purchase orders Vendor categories and catalogs Evaluate a vendor and put a vendor on hold Use purchasing policies Configure activity-based subcontracting and production flow costing in Dynamics 365 Supply Chain Management Subcontracting capabilities Subcontracting a vendor Subcontracting service Transfer activities as subcontracting activities Subcontracting as an alternate resource Cost accounting of subcontracted services Subcontracting cost flow Backflush costing Products and material in Work in Progress Standard cost Costing lean manufacturing Calculation of standard cost Calculate unused quantities Calculation of production variances to standard cost Ledger entries created from processing a production flow Configure and use agreements in Dynamics 365 Supply Chain Management Work with trade agreements Create sales agreements Create purchase agreements Configure trade allowance management Configure brokerage contract management Configure royalty contract management Configure vendor rebates Rebate management module Work with capa Additional course details: Nexus Humans MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert
Delivered OnlineFlexible Dates
Price on Enquiry

Management Essentials with Applied Emotional Intelligence

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Leaders & Managers Overview The practical emotional intelligence tools every manager needs to build performance, communication, trust and leadership skills. Management Essentials with applied Emotional Intelligence delivers crucial tools for professionals to learn more about the people side of the organization. Strengthening performance with a powerful framework to understand the job of managing people. Provides practical tools for effective management and leadership. This course blends engaging learning and powerful content with the perspective of emotional intelligence experts. It provides tools to help navigate through today?s challenges, foster innovation, and build organizations where people thrive. What is Emotional Intelligence? Learn about business EI - a practical, work based approach that helps individuals and teams. Discover 18 key brain talents essential to fuel performance. Essentials of Trust Where does Trust originate? Do we trust from the head or the heart? Explore the science of emotional intelligence with a practical approach. Use the EI tools to help you earn trust. The Challenge of Change Untangle and rewire to affect change. Understand the stages of change and the emotional transitions needed to support change. Recognize our own patterns; a key step to being more effective at change. Igniting Motivation The surprising truth about what motivates us. Find meaning in your work and help the people that work for you find meaning. Delve into Purpose, Skill and Autonomy, and find what motivates you and your team? Enhancing Teamwork What blocks us from utilizing Divergence in our Teams? What helps us? Learn to know the EI talents you have in your group. Understand working with differing personalities. Discover strengths and weaknesses and how can they be positive. Accelerating Execution Higher and lower talents and how they assist? Learn the impact of optimizing talent. Discover your EI talent to help you grow and optimize your execution.

Management Essentials with Applied Emotional Intelligence
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Advanced Cisco Contact Center Enterprise (CCEAA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities. Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration. Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop. Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new. Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop. Successfully deploy Mobile Agent in a CCE Environment. Successfully deploy Post Call Survey in a CCE Environment. The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco Contact Center Enterprise (CCE) solution. PCCE Review Review PCCE Architecture and Components Review PCCE Protocols Introducing Bulk Import Tools Use the PCCE Bulk Import Tool Use Bulk Import Templates Configuring Advanced Scripting and CCE Data Exchange Design for Advanced Scripting CCE Data Exchange Cisco Unified Communications Manager Initiated Call Flows Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models Describe Subsequent Transfers Using Gadgets to Customize the Finesse Desktop Obtain Finesse Custom Gadgets Deploy Finesse Custom Gadgets Implementing Mobile Agent Examine Mobile Agent Functionality Identify Mobile Agent Architecture and Components Implementing Post Call Survey Examine Post Call Survey Functionality Configure Post Call Survey Lab practice Review Discovery Navigate CCE Discovery Architecture and Components Import Bulk Data Create a VXML Application Using Call Studio Configure Precision Queues Create a CCE Routing Script Customize the Finesse Desktop Test Your Call Flow Configure Cisco Unifi

Cisco Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Administering DNA Center for Assurance v2.0 (IADNACA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore

Cisco Implementing and Administering DNA Center for Assurance v2.0 (IADNACA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe the Cisco CloudCenter solution, architecture, and features Discover the enterprise-class security solution for IT organizations and cloud service providers Discover how the CloudCenter Suite adapters can be leveraged to build custom integrations with a variety of enterprise platforms and services Discover the integrations and APIs that can be performed from Action Orchestrator CLDAO, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite is a 3-day course that teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes.This course will help you:Acquire the advanced skills and techniques using the primary modules of workload manager, cost optimizer and action orchestrator for consistent experiences across all business environmentsLearn how to design and deploy applications that are delivered consistently and reliably across private and public clouds Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs Additional course details: Nexus Humans Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered OnlineFlexible Dates
Price on Enquiry