• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1672 Environment courses in Manchester delivered Live Online

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)
Delivered OnlineFlexible Dates
Price on Enquiry

B6155 IBM Cognos Analytics - Enterprise Administration (v11.0.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants

B6155 IBM Cognos Analytics - Enterprise Administration (v11.0.x)
Delivered OnlineFlexible Dates
Price on Enquiry

Advance Sales Management

5.0(10)

By GBA Corporate

Overview This course is designed to gain advanced sales techniques through traditional and modern selling techniques. It will help train the participants for a wide range of sale environments in diverse sectors. With the increase in neck-to-neck competition sales have become a major factor and a lot of new philosophies and modern techniques including new sales methodology has been introduced in the sales industry. As a salesperson who is directly involved in sales or even managers who are into products and services, knowing how to sell is an incredibly useful skill. The course is designed with a lot of practical exercises, and modern techniques, taking from basic to advance level which will help the delegates to attain the skills they require and start implementing what they learned.

Advance Sales Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

SketchUp Basic Level Training Course

By ATL Autocad Training London

Who is this course for? SketchUp Basic Level Training Course. Click here for more info: Website Ideal for newcomers to 3D modeling, it suits students, hobbyists, and professionals. Gain a strong foundation in SketchUp, perfect for careers in architecture and interior design. Our flexible 1-on-1 sessions let you tailor your learning schedule. Schedule sessions Monday to Saturday, 9 am to 7 pm. The 5-hour course adapts to your timeline, ensuring a personalized, supportive, and adaptable learning experience. Course Title: SketchUp Basic Course. Course Duration: 5 hours Understanding the Basics of SketchUp Introduction to SketchUp Navigating the SketchUp Environment Exploring Zoom, Pan, and Rotate Functions Familiarizing Yourself with the XYZ Axis Mastering SketchUp Tools Efficient Toolbar Selections Utilizing Templates for Projects Drawing with Precision Using the Pencil Tool Working with Fundamental Geometric Shapes Taking Accurate Measurements Advanced SketchUp Techniques Creating Circles and Arcs Harnessing Sticky Geometry Solutions Unveiling the Power of Tags (Formerly Layers) Streamlining Workflow with Keyboard Shortcuts Accurate Object Measurement within SketchUp Information Management and Database Usage Moving and Copying Objects Simple Array Techniques Mastering Rotational Manipulations Effortless Rotational Copying Fractional and Relative Scaling Component and Group Creation Constructing Components for Reusability Creating Efficient Groups Comparing the Advantages of Components and Groups Saving and Reusing Components Importing Components from Digital Repositories Advanced Modeling and Geometry Leveraging Push-Pull Operations Creating Complex Shapes with the Follow Me Tool Exploring Geometry Intersections Duplicating and Offsetting Faces, Edges, and Polygons Incorporating 2D Polygons into Your Drawings Skillful Use of the Paint Bucket Tool Materials and Textures Proficiency with the Materials Editor Applying High-Quality Textures Sourcing and Positioning Textures Graphics and Bitmap Considerations Crafting Scenes and Styles Generating and Customizing Scenes Managing Scenes and Styles Introduction to Animation and Presentation Animation Concepts Adding Dimensions to Your SketchUp Models Annotating Designs for Clarity Preparing Models for Printing Exporting Images and PDFs in 2D Formats This comprehensive SketchUp Fundamentals course will equip you with essential skills to create, modify, and present 3D models effectively. After completing our 5-hour SketchUp training, you'll achieve the following learning outcomes: Basic SketchUp Proficiency: Gain essential skills to navigate the SketchUp interface and utilize its core features effectively. Geometry Creation: Learn to create 2D and 3D geometric shapes, lines, and curves with precision. Rendering Concepts: Understand the fundamentals of rendering and how to apply basic rendering techniques to enhance your designs. Model Organization: Discover techniques for organizing and structuring your SketchUp models efficiently. Visualization Skills: Develop the ability to visualize and plan architectural and interior design concepts in 3D. Efficient Workflows: Acquire time-saving tips and tricks for streamlining your design workflow. Personal Projects: Apply your newfound skills to your personal design projects or professional endeavors. By the end of this short training, you'll have a solid foundation in SketchUp, allowing you to create and present basic 3D models and designs effectively. After SketchUp Training, You'll Acquire: Advanced 3D Modeling: Master the art of creating intricate 3D models, architectural designs, and detailed structures using SketchUp. Texture Mapping and Material Application: Learn to apply realistic textures and materials, enhancing the visual appeal of your 3D creations. Rendering Techniques: Explore rendering plugins like V-Ray or Twilight Render to create lifelike visualizations of your designs. Collaboration and Presentation: Develop skills to effectively collaborate with teams and present your ideas in professional and compelling ways. Project Visualization: Enhance your ability to transform conceptual ideas into visually stunning and detailed 3D representations. Job Opportunities: Architectural Designer: Create detailed architectural models for residential and commercial projects. Interior Designer: Design interior spaces, visualizing furniture placements, colors, and decor elements. Landscape Architect: Develop 3D landscape designs, showcasing outdoor spaces and environmental elements. 3D Modeler: Work in various industries, creating 3D models for animations, games, or simulations. Visualization Specialist: Provide visualization services to real estate agencies, design firms, or marketing companies, transforming ideas into compelling visuals. Why Choose Us? Tailored One-on-One Training: Exclusive coaching from skilled architects and designers, in-person or live online, Monday to Saturday. Customized Tutorials: Enhance your skills with tailored video tutorials to take home. Comprehensive Learning: Receive digital resources for thorough understanding and revision. Free Ongoing Support: Enjoy continuous assistance via phone or email, ensuring your success beyond the course. Flexible Syllabus: Adapted to your needs for focused learning. Official Certificate: Validate your expertise with our prestigious certification.

SketchUp Basic Level Training Course
Delivered in London or OnlineFlexible Dates
£180

Advance Accounting Techniques

5.0(10)

By GBA Corporate

Overview Accounting is the methodical approach of updating and keeping track of all the required information related to financial transactions. This course is designed to gain knowledge of how to interpret and analyse financial statements effectively. This course will emphasize in-depth knowledge of financial reporting elements used in Advance Accounting highlighting transactions recognizing, differentiating and efficiently recording information.  Advanced Accounting Techniques course covers difficult complex accounting topics like forecasting, hedging, data aggregation, interval accounting, segment reporting and many more including deeply understanding the financial statement Advanced accounting techniques were developed to provide information appropriate for decision-making in changing internal and external environments. 

Advance Accounting Techniques
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Understanding and Developing a Marketing Strategy

5.0(1)

By Let’s Do Business Group

An area that many small and new businesses struggle with is developing and defining their approach to marketing. Creating a marketing strategy document is something every business owner should do before you start marketing your business.

Understanding and Developing a Marketing Strategy
Delivered Online
£30

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

GCSE Tuition - Religious Studies - Online

5.0(8)

By GLA Tutors Home or Online

Excelling in GCSE Religious Studies! At GLA Tutors, we are dedicated to helping students succeed in their GCSE Religious Studies examinations. Our experienced tutors are passionate about the subject and committed to providing comprehensive support aligned with the AQA examination board's specification. Let's explore the breakdown of the AQA GCSE Religious Studies specification: Paper 1: The Study of Religions: Beliefs and Teachings This paper focuses on the study of two religions, such as Christianity and Islam. Our tutors will guide students through the fundamental beliefs, teachings, and practices of these religions. We delve into topics like the nature of God, religious texts, worship, and the impact of religion on individuals and society. Through engaging discussions and thought-provoking exercises, we help students develop a deep understanding of religious beliefs. Paper 2: Thematic Studies This paper explores ethical and philosophical issues, as well as the influence of religion in the modern world. Our tutors will delve into topics like crime and punishment, human rights, life and death, and religion and society. We provide in-depth analysis, case studies, and perspectives from different religious traditions to enable students to critically examine these issues. We also emphasise the development of strong argumentation and evaluation skills. Paper 3: Study of Religion: Textual Studies In this paper, students will explore religious texts and their significance. Our tutors will guide students through the study of sacred texts, such as the Bible or the Qur'an. We help students analyse and interpret these texts, understand their historical and cultural context, and explore their relevance in contemporary society. We provide comprehensive guidance on textual analysis and the application of religious teachings to real-life situations. At GLA Tutors, we foster a supportive and inclusive learning environment, where students can explore and deepen their understanding of religious studies. Our tutors provide personalised one-on-one sessions, group discussions, and access to a range of learning resources to cater to each student's unique needs. Beyond the specification, we encourage critical thinking, empathy, and open-mindedness, enabling students to engage with complex ethical and philosophical questions. We also focus on developing strong exam techniques, essay writing skills, and effective revision strategies to maximize exam success. Join us at GLA Tutors and embark on a transformative journey in GCSE Religious Studies. Our tutors are here to guide you towards academic excellence, a deep appreciation for religious diversity, and the ability to apply religious teachings to real-world contexts. Feel free to explore our website for more information or reach out to us with any questions you may have. Let's embark on this enriching educational adventure together! We can provide assistance for everything you need to prepare students for exams, including: past papers, mark schemes and examiners’ reports specimen papers and mark schemes for new courses exemplar student answers with examiner commentaries high quality revision guides

GCSE Tuition - Religious Studies - Online
Delivered OnlineFlexible Dates
£40

Advanced Python for network engineers

5.0(3)

By Systems & Network Training

Advanced Python training course description This course caters to network engineers aiming to enhance both their Python proficiency and network automation skills. Delving deeper into key areas such as netmiko, Nornir, and ncclient, we also focus on automating network testing and validation. Participants gain greater confidence working with Python functions, classes, objects, and error handling. The course additionally introduces more libraries like Scrapli, TTP, pyATS, Genie, pybatfish, and Suzieq, which cover parsing strategies, automation testing, validation, network analysis, observability, and telemetry. The curriculum also encompasses concurrency techniques. What will you learn Write Python modules and functions. Evaluate techniques to parse unstructured data. Use NETCONF filters. Handle Python errors effectively (try, assert…). Use postman. Automate testing and validation of the network. Use scrapli, Genie, batfish and Suzieq. Advanced Python training course details Who will benefit: Network engineers. Prerequisites: Python for network engineers Duration 5 days Advanced Python training course contents Review CLI, NETCONF, RESTCONF, structured versus unstructured data, gNMI and when to use which. PEP 8. Naming conventions. Packages, modules, Classes and methods. The scrapli library. Netmiko versus scrapli. Hands on: scrapli, Dictionaries versus Regular Expressions. Modules and Functions Writing your own modules, containers versus packages, virtual environments. Best practices, calling functions, writing your own functions. Parameters, arguments. Named arguments, dictionaries as arguments. Builtins. Docstrings. Main. __name__, __main__ . Program arguments. Hands on: Getting interfaces, showing interface status using Netmiko and functions. Using dictionaries as arguments. Writing your own modules. Parsing strategies Turning unstructured data into structured data. textfsm, PyATS Genie parser, NAPALM getters, Template Text Parser. Hands on: Genie parser, TTP. Accessing structured data with lists and dictionaries. Classes, objects and Python Python classes in Genie, PyEZ and others . Hands on: studying network automation classes, objects, methods and attributes. Configuration management - more nornir, ncclient, requests Nornir tasks. Nornir results, Nornir functions, Nornir plugins. Nornir processors. YANG, YANG models, pyang. NETCONF hello. Capabilities. Schemas. Filters. Subtrees. XPATH. Exploring available YANG data models. NETCONF and network wide transactions. Asserting NETCONF capabilities. Configuration types. Locking configurations, commits. NETCONF data stores. Netconf-console. RESTCONF differences from NETCONF. URI construction. Postman. More XML and JSON. Git and configuration versions. Hands on: Nornir and Jinja2. Exploring available models, NETCONF filters. Using postman. Python error handling and debugging Context handlers, try, assert, logging, pdb, pytest, unit testing, chatgpt. Hands on: Writing code with each of the error handling methods, investigating what happens on an error. Use chatgpt to debug your code. Python Automation Testing Testing and validation. pyATS, Genie. Testbed file. Genie parse, genie learn, genie diff. Genie conf, Genie ops, Genie SDK, Genie harness. Xpresso. Hands on: Using Genie for state comparisons of the network. Network analysis Batfish, pybatfish, configuration analysis, analysing routing, analysing ACLs. Pandas. Pandas dataframe. Filtering and selecting values of interest. Hands on: Use Batfish to analyse network snapshots, find network adjacencies, flow path analysis. Network observability Suzieq, using docker, using as a package. Sqpoller, suzieq-gui, suzieq-cli, sq-rest-server. Namespaces and seeing devices, network state and Asserts. Time based analysis, snapshots and changes. Hands on: Suzieq: Gathering data from the network, analysing data from the network. Network state assertion. Telemetry gRPC, gNMI. CAP, GET, SET. Subscriptions. Model Driven telemetry. Hands on: Analysing telemetry data with Python. Concurrency asyncio, threads, processes. Nornir concurrency. Scrapli and netmiko concurrency. Hands on: Multiple SSH connections to devices at same time. Scarpli asyncio.

Advanced Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697