Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Phone Network Administrators Phone Network Engineers Data System Administrators Entry-level Network Engineers Channel Partners/Resellers, Customers, Employees Overview Describe the Cisco Unified Communications Manager network, service, and features Understand the importance of and configuration of redundancy and high availability in the enterprise network Describe user configuration and the user web interface Explain basic phone options and the use of BAT Explain the route plan and on-net/off-net calling Describe the various media resources, including conferencing and MOH Describe the basic phone features and use of hunt groups Administering Cisco Unified Communications Manager (ACUCM) v12.0 is a 3-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involves routers, switches, or Cisco IOS software configuration. Exploring IP Telephone Traditional Voice versus IP Telephony Clustering Overview Intracluster Communications Cisco Unified Communications Manager Clusters Clustering Options Platform Requirements Describing Deployment Models Single-Site Deployment Centralized Call-Processing Deployment Distributed Call-Processing Deployment Distributed Single-Cluster Call-Processing Deployment Hybrid Call-Processing Deployment New Advanced Multicluster Options Understanding Advanced Multisite Features Need for CAC Deploying AAR Survivable Remote Site Telephony SRST Failover Logging in to Cisco Unified Communications Manager Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability Logging In to Cisco Unified Operating System Administration and the DRS Navigation Menu Command-Line Interface Examining Basic Server Configuration Server Configuration?Eliminating DNS Reliance Configuring Enterprise Parameters Describing Multilevel Administration Configuring Multilevel Administration Creating End Users Creating Roles Creating User Groups Assigning Users to User Groups Configuring DRS Backup and Restore Procedures DRS Backup Procedures DRS Restore Procedures Understanding User Configuration Understanding User Management Configuring Users Using the User Web Pages Understanding the User Web Pages Using the User Web Pages Configuring System Parameter Cisco Unified CM Configuration Cisco Unified Communications Manager Group Configuration Phone NTP Configuration Date/Time Group Codecs and Regions Location Configuration Device Pool Configuration DHCP Service Configuration Device Defaults Configuration Clusterwide Parameters Licensing Supporting Cisco Unified IP Phones Cisco Unified IP Phones Overview Specialized Cisco Unified IP 7900 Series Phones Phone Button Templates Softkey Templates Exploring Phone Registration and IP Phone Communications Cisco Unified IP Phone Registration Cisco Unified IP Phone Configuration Utilizing the Bulk Administration Tool (BAT) Overview of Cisco Unified Communications Manager BAT Cisco Unified Communications Manager TAPS Implementing Dial Plan Connectivity Organizational Dial Plan Trunks Gateways Creating Route Plans Dial Plan Overview Route Pattern Overview Digit Collection Call Routing Configuring Transition Patterns and Route Filters Translation Patterns The 9.@ Pattern Route Filters Implementing Digit Manipulation Discard Digits Instruction Transformation Masks Route Plan Report Defining Class of Control Overview of Class of Control Partitions CSS Configuration PLAR Application Using Class of Control Features Call Restriction Time of Day Routing Traditional vs. Line/Device Approach Defining Media Resources Overview of Media Resources Conference Bridge Media Termination Points Transcoder Music on Hold Annunciator Exploring Media Resource Management MRG Management Configuring MRGs Configuring MRGLs Describing Basic Features Call Park Call Pickup Cisco Call Back Shared Lines with Barge and Privacy Exploring Hunt Groups Hunt Group Overview Line Group Configuration Hunt List Configuration Hunt Pilot Configuration Final Forwarding Describing Phone Services Cisco IP Phone Services Cisco Phone Services Configuration
Duration 1 Days 6 CPD hours This course is intended for The course is appropriate for IT managers, architects or anyone who wants to understand the big picture of what Apache Hadoop brings to the enterprise. All levels of technology knowledge are welcome. In this course, students unveil Apache Hadoop, giving themselves a thorough understanding of what the technology is and how it would impact their organizations. In this course, students unveil Apache Hadoop, giving themselves a thorough understanding of what the technology is and how it would impact their organizations.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe the Cisco CloudCenter solution, architecture, and features Discover the enterprise-class security solution for IT organizations and cloud service providers Discover how the CloudCenter Suite adapters can be leveraged to build custom integrations with a variety of enterprise platforms and services Discover the integrations and APIs that can be performed from Action Orchestrator CLDAO, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite is a 3-day course that teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes.This course will help you:Acquire the advanced skills and techniques using the primary modules of workload manager, cost optimizer and action orchestrator for consistent experiences across all business environmentsLearn how to design and deploy applications that are delivered consistently and reliably across private and public clouds Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs Additional course details: Nexus Humans Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed for network administrators, system administrators, network architects, systems engineers, and technical support engineers who are involved with advanced installation, configuration, maintenance, and basic troubleshooting of Ruckus ICX products. Overview Upon successful completion of this course, the student will be able to: Describe Ruckus ICX hardware Configure and implement management protocols on Ruckus equipment Configure and implement monitoring and reporting features on Ruckus equipment including syslogs and sFlow Perform hardware troubleshooting and support functions Perform firmware upgrades Configure, implement, and maintain Layer 2 STP protocols (RSTP, MSTP, PVST) Configure and manage VLANs, Virtual Ethernet routed interfaces, topology groups, and Q-in-Q Configure, deploy and maintain Link Aggregation Groups (LAGS) Describe, configure, and maintain Multi-Chassis Trunking (MCT) Integrate MCT with VRRPe for redundancy Identify PoE-capable products Configure and manage Ruckus ICX switches in a PoE environment Configure, implement, and maintain the OSPF routing protocol Configure, implement, and maintain QoS This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. Additional course details: Nexus Humans Ruckus ICX 200 Administrator Training Course training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ruckus ICX 200 Administrator Training Course course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming
Duration 1 Days 6 CPD hours This day-long workshop gives participants a thorough understanding of the iPad iOS operating system. This course is designed for both those who want to learn more about their iPads, those who work in business environments and who want to integrate the iPad into their existing company?s infrastructure, as well as personnel who are responsible for supporting other iPad users. Setting Up The iPad iPad Essentials The Home Screen Launching and Running Apps Changing Screen Orientation Locking the Rotation The Control Center Creating Folders Accessibility and Voice Over Settings General Settings Parameters Passcode Setting Up Notifications Location Services iCloud and Synching your iPad Other Application Settings Multi-Touch Gestures Tap, Touch and Hold Drag, Flick and Swipe Pinch, Rotate and Shake Switching Between Applications Using the Apple Applications Showing and Hiding Applications Closing Documents vs. Quitting Applications Working With Documents Type, Select, Cut, Copy, Paste and Replace Understanding the iPad Keyboard Opening Pages, Numbers and Keynote Accessing Files and Documents Copying files between the iPad and Computer Working with Microsoft Office Connecting To The Internet WI-FI and Bluetooth Devices Through Servers Browsing and Searching The Web Enterprise Network The iPad In Business iOS Security Deployment Seamless Integration Mobile Device Management Printing with AirPrint Creating Passcodes Working with Photos and Camera Photos and Video Recording Video Integrating Photos or Video Into Documents or Presentations Mirroring Video Finding and Installing Apps The App Store Apps for Enterprise Installing and Deleting Apps Resetting the iPad Connecting and Mirroring with the iPhone Battery Issues Tips for Improving Battery Use Rebooting the iPad Hidden Keystrokes Troubleshooting Connectivity Issues ReInstalling Apps Preserving Batter Power Accessibility Functions Additional course details: Nexus Humans iPad For Business training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPad For Business course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This workshop is designed to support staff and organisations in the voluntary, community, and social enterprises (VCSEs) to consider, plan, and implement personal and professional boundaries in the workplace.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration. Overview #NAME? Red Hat System Administration I (RH124) equips you with Linux© administration "survival skills" by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134). 1 - Getting Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit 2 - Manage Files Graphically with Nautilus Manage files graphically and access remote systems with Nautilus 3 - Get Help in a Graphical Environment Access documentation, both locally and online 4 - Configure Local Services Configure the date and time and configure a printer 5 - Manage Physical Storage Understand basic disk concepts and manage system disks 6 - Manage Logical Volumes Understand logical volume concepts and manage logical volumes 7 - Monitor System Resources Manage memory and CPU utilization 8 - Manage System Software Manage system software locally and using Red Hat Network (RHN) 9 - Get Started with Bash Understand basic shell concepts, execute simple commands, and use basic job control techniques 10 - Get Help in a Textual Environment Use man and info pages and find documentation in /usr/share/doc 11 - Establish Network Connectivity Understand basic network concepts; configure, manage, and test network settings 12 - Administer Users and Groups Manage users and groups 13 - Manage Files from the Command Line Understand Linux filesystem hierarchy; manage files from the command line 14 - Secure Linux File Access Understand Linux file access mechanisms; manage file access from the GUI and the command line 15 - Administer Remote Systems Share and connect to a desktop; use SSH and rsync 16 - Configure General Services Manage services; configure SSH and remote desktops 17 - Manage Physical Storage II Manage filesystem attributes and swap space 18 - Install Linux Graphically Install Red Hat Enterprise Linux and configure the system with firstboot 19 - Manage Virtual Machines Understand basic virtualization concepts; install and manage virtual machines 20 - Control the Boot Process Understand runlevels and manage GRUB 21 - Deploy File Sharing Services Deploy an FTP server and a web server 22 - Secure Network Services Manage a firewall; understand SELinux concepts and manage SELinux 23 - Comprehensive Review Get a hands-on review of the concepts covered throughout the course
Duration 5 Days 30 CPD hours This course is intended for This course is designed for: IT Professionals in the BC/DR or system administration domain, business continuity and disaster recovery consultants, individuals wanting to establish themselves in the field of IT business, continuity and disaster recovery, IT risk managers and consultants, and CISOs and IT directors. Before taking this course, some experience in the IT BC/DR domain is recommended. More info can be found here: https://www.eccouncil.org/wp-content/uploads/2017/05/edrpv3-brochure.pdf Overview EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. EDRP teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization's critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization?s critical data in the aftermath of a disaster. The program is designed to provide much needed step-by-step guidance to attendees and then tests their knowledge through case studies. EDRPv3 addresses gaps in other BC/DR programs by providing helpful templates that are applied to BC/DR efforts in an enterprise. Course Outline Introduction to Disaster Recovery and Business Continuity Business Continuity Management (BCM) Risk Assessment Business Impact Analysis (BIA) Business Continuity Planning (BCP) Disaster Recovery Planning Process Data Backup Strategies Data Recovery Strategies Virtualization-Based Disaster Recovery System Recovery Centralized and Decentralized System Recovery BCP Testing, Maintenance, and Training Additional course details: Nexus Humans EC-Council Disaster Recovery Professional (EDRP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Disaster Recovery Professional (EDRP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.