Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: • This course is intended primarily for network administrators, network engineers, network managers and systems engineers who would like to implement BGP. The secondary audience for this course is as follows: • This course is intended for network designers and project managers. The course is also recommended to all individuals preparing for BGP exam. Overview After completing this course the student should be able to: - Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains - Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario In which you must support connections to multiple ISPs - Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections - Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented - Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems - Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems - Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network This covers the theory of BGP, configuration of BGP on Cisco IOS© routers, detailed troubleshooting information, and hands-on exercises that provide learners with the skills that they need to configure and troubleshoot BGP networks in customer environments. BGP Overview Introducing BGP Understanding BGP Path Attributes Establishing BGP Sessions Processing BGP Routes Configuring Basic BGP Monitoring and Troubleshooting BGP Lab 1-1: Initial Lab Setup Lab 1-2: Configuring Basic BGP BGP Transit Autonomous Systems Working with a Transit AS Interacting with IBGP and EBGP in a Transit AS Forwarding Packets in a Transit AS Configuring a Transit AS Monitoring and Troubleshooting IBGP in a Transit AS Lab 2-1: Configuring a Transit AS Route Selection Using Policy Controls Using Multihomed BGP Networks Employing AS-Path Filters Filtering with Prefix-Lists Using Outbound Route Filtering Applying Route-Maps as BGP Filters Implementing Changes in BGP Policy Lab 3-1: Using Multihomed BGP Networks Lab 3-2: Employing AS-Path Filters Lab 3-3: Filtering with Prefix-Lists Lab 3-4: Implementing Changes in BGP Policy Route Selection Using Attributes Influencing BGP Route Selection with Weights Setting BGP Local Preference Using AS-Path Prepending Understanding BGP Multi-Exit Discriminators Addressing BGP Communities Lab 4-1: Influencing BGP Route Selection with Weights Lab 4-2: Setting BGP Local Preference Lab 4-3: Understanding BGP Multi-Exit Discriminators Lab 4-4: Addressing BGP Communities Customer-to-Provider Connectivity with BGP Understanding Customer-to-Provider Connectivity Requirements Implementing Customer Connectivity Using Static Routing Connecting a Multihomed Customer to a Single Service Provider Connecting a Multihomed Customer to Multiple Service Providers Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks Introducing Route Reflectors Designing Networks with Route Reflectors Configuring and Monitoring Route Reflectors Introducing Confederations Configuring and Monitoring Confederations Lab 6-1: Introducing Route Reflectors Lab 6-2: Configuring and Monitoring Confederations Optimizing BGP Scalability Improving BGP Convergence Limiting the Number of Prefixes Received from a BGP Neighbor Implementing BGP Peer Groups Using BGP Route Dampening Lab 7-1: Limiting the Number of Prefixes Received from a BGP Neighbor Lab 7-2: Implementing BGP Peer Groups Lab 7-3: Using BGP Route Dampening Additional course details: Nexus Humans Cisco Configuring BGP on Cisco Routers v4.0 (BGP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring BGP on Cisco Routers v4.0 (BGP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Cisco integrators and partners Network operators Network administrators Optical network administrators System administrators System integrators and professional services Overview After taking this course, you should be able to: Describe Cisco EPN Manager's features and navigate the Cisco EPN Manager's user interface Understand the network inventory, topologies, and circuits Manage dashboards, alarms, and events Create and interpret reports Distinguish the system requirements for Cisco EPN Manager, and procedures for new installations, upgrades, licensing, and high availability Manage device groups and virtual domains Establish user accounts and their role-based access to EPN Manager's features and devices Configure and combine devices Perform backups and restores Manage data retention, purging, and software updates Monitor system health and performance Update and manage software images Archive, review, and restore configuration files Configure Quality of Service (QoS) actions and policies Configure devices using templates Perform compliance audits Configure monitoring policies Provision Carrier Ethernet services Provision Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) services Provision Circuit Emulation (CEM) services Provision an Optical Channel Network Connection (OCHNC) circuit Provision an Optical Channel Client Connection (OCHCC) circuit Provision an optical Media Channel Group with an OCHCC circuit Describe how Cisco EPN Manager can work with Cisco Network Services Orchestrator (NSO) to provide automated service provisioning The Configuring and Operating Cisco EPN Manager (EPNM100) v4.0 course shows you how to create efficient and agile network management through automated device operations, fast provisioning install, network configuration, dashboard management, and device management using Cisco¸ Evolved Programmable Network (EPN) Manager. Through a combination of lessons and hands-on labs, you will learn to maximize the benefits of the Cisco EPN Manager as a simplified, flexible, and cost-effective end-to-end lifecycle management solution for network provisioning, and network assurance management for today?s converging packet and optical multilayer networks. Exploring Cisco EPN Manager Cisco EPN Manager Overview Cisco EPN Manager Key Features Viewing Devices and Inventory Device Types View Devices Viewing Network Topologies and Circuits Topology Map Basics Change Information Displayed Using Dashboards Dashboards Overview Customize Dashboards Managing Alarms and Events Alarms and Events Overview View Alarms and Events Generating Reports Report Fundamentals Create and Schedule Reports Performing Basic Administration Installation Basics Perform Server Setup Adding Devices Device Management Fundamentals Add a Device Manually Add User-Defined Fields Backup and Restoring Backup Fundamentals Schedule a Backup Performing System Maintenance Software Updates Data Retention and Purging Software Image Management (SWIM) Software Image Management Fundamentals Setting Up Software Image Management Configuration Management Configuration Management Fundamentals Archive Setup Configuring QoS QoS Basics Create a Classification Profile Configuring Devices with Templates Device Configuration Methods Template Basics Performing Compliance Management Compliance Audit Basics Compliance Policy Basics Monitoring with Policies Monitoring Policy Fundamentals Edit a Monitoring Policy Circuit and Video Conferencing (VC) Fundamentals Circuit Provisioning Basics Supported Service Types Provisioning Carrier Ethernet Services Provision a Carrier Ethernet Service Verify a Service Provisioning Cisco MPLS Traffic Engineering Services Cisco MPLS TE Service Basics Provision a Cisco MPLS TE Service Provisioning Circuit Emulation Services Circuit Emulation Services Basics Provision a CEM Service Provisioning an OCHNC Circuit OCHNC Circuit Basics Set Up Devices for Circuit Provisioning an Optical OCHCC Circuit OCHCC Circuit Basics Set Up Devices for Circuit Provisioning a Media Channel Group with an OCHCC Circuit Media Channel Group with OCHCC Basics Provision a Media Channel Group Introducing Cisco EPN Manager with Cisco NSO Cisco EPN Manager with Cisco NSO Basics For More Information Additional course details: Nexus Humans Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text
Duration 3 Days 18 CPD hours This course is intended for Storage and virtual infrastructure administrators who are responsible for production support and administration of VMware vSAN 7. Overview By the end of the course, you should be able to meet the following objectives: Define the tasks involved in vSAN node management Updating and upgrading vSAN using VMware vSphere Lifecycle Manager⢠Explain vSAN resilience and data availability features Reconfigure vSAN storage policies and observe the cluster-wide impact Perform vSAN cluster scale-out and scale-up operations Describe common vSAN cluster maintenance operations Control vSAN resync operations Configure vSAN storage efficiency and reclamation features Use VMware Skyline⢠Health to monitor cluster health, performance, and storage capacity Describe vSAN security operations Configure vSAN Direct for cloud native applications Configure remote vSAN datastore and vSAN native file services Manage two-node cluster and stretched cluster advance operations In this three-day course, you learn about managing and operating VMware vSAN? 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as, vSAN node management, cluster maintenance, security operations and advanced vSAN cluster operations. You also gain practical experience through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Node Management Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades vSAN Resilience and Data Availability Operations Describe vSAN storage policies Recognize the impact of a vSAN storage policy change Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configure the vSAN fault domains vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Cluster Performance Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server (KMS) vSAN Direct Discuss the use cases for vSAN Direct Understand the overall architecture of vSAN Direct Describe the workflow of vSAN Direct datastore creation Explore how vSAN Direct works with storage policy tagging Remote vSAN Discuss the use cases for remote vSAN Understand the high-level architecture Describe remote datastore operations Discuss the network requirement Interoperability between remote vSAN and VMware vSphere© High Availability vSAN Native File Service Discuss the use cases for vSAN file service Understand the high-level architecture of vSAN file service Discuss the authentication model Configure file shares Monitor file share health and capacity utilization Manage Advanced vSAN Cluster Operations Describe the architecture for stretched clusters and two-node clusters Understand the importance of witness node Describe how stretched cluster storage policies affect vSAN objects Create and apply a vSAN stretched cluster policy to meet specific needs Discuss stretched cluster failure scenarios and responses Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Management and Operations [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Management and Operations [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support Introduction The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. Managing the Nutanix Cluster In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. Securing the Nutanix Cluster This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. Acropolils Networking This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM Management This section shows you how to upload images, and how to create and manage virtual machines. Health Monitoring and Alerts In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. Distributed Storage Fabric This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV Workload Migration Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. File and Volumes This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. Understanding Infrastructure Resiliency This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. Data Protection Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. Prism Central Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. Monitoring the Nutanix Cluster This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. Cluster Management and Expansion This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. Remote Office Branch Office (ROBO) Deployments In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. Additional course details: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.