• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3157 FA courses delivered Live Online

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. What is Robotic Process Automation? Scope and techniques of automation Robotic process automation About UiPath The future of automation Record and Play UiPath stack Downloading and installing UiPath Studio Learning UiPath Studio Task recorder Step-by-step examples using the recorder Sequence, Flowchart, and Control Flow Sequencing the workflow Activities Control flow, various types of loops, and decision making Step-by-step example using Sequence and Flowchart Step-by-step example using Sequence and Control flow Data Manipulation Variables and scope Collections Arguments ? Purpose and use Data table usage with examples Clipboard management File operation with step-by-step example CSV/Excel to data table and vice versa (with a step-by-step example) Taking Control of the Controls Finding and attaching windows Finding the control Techniques for waiting for a control Act on controls ? mouse and keyboard activities Working with UiExplorer Handling events Revisit recorder Screen Scraping When to use OCR Types of OCR available How to use OCR Avoiding typical failure points Tame that Application with Plugins and Extensions Terminal plugin SAP automation Java plugin Citrix automation Mail plugin PDF plugin Web integration Excel and Word plugins Credential management Extensions ? Java, Chrome, Firefox, and Silverlight Handling User Events and Assistant Bots What are assistant bots? Monitoring system event triggers Monitoring image and element triggers Launching an assistant bot on a keyboard event Exception Handling, Debugging, and Logging Exception handling Common exceptions and ways to handle them Logging and taking screenshots Debugging techniques Collecting crash dumps Error reporting Managing and Maintaining the Code Project organization Nesting workflows Reusability of workflows Commenting techniques State Machine When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file Integrating a TFS server Deploying and Maintaining the Bot Publishing using publish utility Overview of Orchestration Server Using Orchestration Server to control bots Using Orchestration Server to deploy bots License management Publishing and managing updates

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)
Delivered OnlineFlexible Dates
Price on Enquiry

Windows 10 Modern Desktop Administrator Associate Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Overview After completing this course, learners should be able to: Prepare to install Windows 10. Install Windows 10. Configure Updates for Windows. Perform post-installation configuration tasks. Configure devices and drivers for Windows. Configure storage for Windows. Configure network settings in Windows. Configure remote management of Windows. Configure and manage applications in Windows. Configure Internet Explorer. Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them. Use Windows troubleshooting and monitoring tools. Troubleshoot Windows installations. Troubleshoot application installation issues. Troubleshoot web browser settings. Troubleshoot Windows authentication. Troubleshoot hardware issues related to Windows machines. Develop an Operating System deployment and upgrade strategy. Understand the different methods of deployment. Understand on-premise and cloud-based solutions. Deploy and migrate desktops to Windows 10. Plan and configure Windows Update policies. Describe the benefits and capabilities of Azure AD. Manage users using Azure AD with Active Directory DS. Implement Windows Hello for Business. Configure conditional access rules based on compliance policies. Describe the various tools used to secure devices and data. Implement Windows Defender Advanced Threat Protection. This five day accelerated course will cover topics necessary to prepare attendees with the baseline knowledge to take the MD-100 and MD-101 exams for the Modern Desktop Administrator Associate certification. Installing Windows Introducing Windows 10 Installation Options Requirements for Windows Features Installation Process and Media Upgrading to Windows 10 Updating Windows Windows Servicing Model Updating Windows Applying Applications and Windows Updates Post-Instalation Configuration and Personalization Customize the Windows 10 UI Configure device specific settings such as power plans and mobile device options Use the Windows control panel and setting app to configure settings Describe using Windows PowerShell Configuring Peripherals and Drivers Managing Devices and Drivers Managing Printers Configuring Networking Configure IP Network Connectivity Implement Name Resolution Implement Wireless Network Connectivity Remote Access Overview Remote Management Configuring Storage Overview of storage options Using OneDrive Managing Disks, Partitions, and Volumes Maintaining Disks and Volumes Managing Storage Spaces Managing Apps in Windows 10 Providing Apps to Users Managing Universal Windows Apps The Windows Store Web browsers in Windows 10 Configuring Authorization and Authentication Using Security Settings to Mitigate Threats Configuring User Account Control Implementing Device Registration Authentication Configuring Data Access and Usage Overview of File Systems Configuring and Managing File Access Configuring and Managing Shared Folders Managing Security with Policies Configuring Advanced Management Tools Configuring Tenant Roles Managing Tenant Health and Services Supporting the Windows 10 Environment Troubleshooting Windows Troubleshooting Tools Troubleshooting the Windows OS Troubleshooting Windows Startup Troubleshooting Operating System Service Issues Troubleshooting Sign-In Issues Troubleshooting Files and Applications File Recovery in Windows 10 Application Troubleshooting Troubleshooting Hardware and Drivers Troubleshooting Device Driver Failures Overview of Hardware Troubleshooting Troubleshooting Physical Failures Planning an Operating System Deployment Strategy Overview of Windows as a service Windows 10 Deployment options Considerations for Windows 10 deployment Implementing Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Managing Updates for Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Device Enrollment Device management options Manage Intune device enrollment and inventory Configuring Profiles Configuring device profiles Managing user profiles Monitoring devices Application Management Implement Mobile Application Management (MAM) Deploying and updating applications Administering applications Managing Authentication in Azure Ad MANAGING AUTHENTICATION IN AZURE AD Managing Devices and Device Policies Microsoft Intune Overview Managing devices with Intune Implement device compliance policies Managing Security Implement device data protection Managing Windows Defender ATP Managing Windows Defender in Windows 10 Additional course details: Nexus Humans Windows 10 Modern Desktop Administrator Associate Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Windows 10 Modern Desktop Administrator Associate Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Windows 10 Modern Desktop Administrator Associate Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering Python Programming (TTPS4820)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This introductory-level Python course is geared for experienced users who want to use Python in web development projects, or system administrators and web site administrators who want to use Python to support their server installations, as well as anyone else who wants to automate or simplify common tasks with the use of Python scripts. Basic familiarity with any programming or scripting language would be helpful, along with a working, user-level knowledge of Unix/Linux, Mac, or Windows. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Throughout the hands-on course students, will learn to write essential Python scripts using the most current and efficient skills and techniques. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Create working Python scripts following best practices Use python data types appropriately Read and write files with both text and binary data Search and replace text with regular expressions Get familiar with the standard library and its work-saving modules Use lesser known but powerful Python data types Create 'real-world', professional Python applications Work with dates, times, and calendars Know when to use collections such as lists, dictionaries, and sets Understand Pythonic features such as comprehensions and iterators Write robust code using exception handling Mastering Python Programming is an introductory and beyond-level practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This comprehensive, practical course provides an in-depth exploration of working with the programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world. An overview of Python What is python? Python Timeline Advantages/Disadvantages of Python Getting help with pydoc The Python Environment Starting Python Using the interpreter Running a Python script Python scripts on Unix/Windows Editors and IDEs Getting Started Using variables Builtin functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control White space Conditional expressions Relational and Boolean operators While loops Alternate loop exits Array types About array types (AKA sequences) Lists and list methods Tuples Indexing and slicing Iterating through a sequence Nested sequences Sequence functions, keywords, and operators List comprehensions Generator Expressions Working with files File overview Opening a text file Reading a text file Writing to a text file Reading and writing raw (binary) data Converting binary data with struct Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Parameters Global and local scope Nested functions Returning values Sorting The sorted() function Alternate keys Lambda functions Sorting collections Using operator.itemgetter() Reverse sorting Errors and Exception Handling Syntax errors Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages The import statement Module search path Creating Modules Using packages Function and Module aliases An Introduction to Python Classes About o-o programming Defining classes Constructors Methods Instance data Properties Class methods and data Regular Expressions RE syntax overview RE Objects Searching and matching Compilation flags Groups and special groups Replacing text Splitting strings Using the Standard Library The sys module Launching external programs Math functions Random numbers Reading CSV data Dates and Times Working with dates and times Translating timestamps Parsing dates from text Formatting dates Calendar data Working with the File System Paths, directories, and filenames Checking for existence Permissions and other file attributes Walking directory trees Creating filters with fileinput Using shutil for file operations Advanced Data Handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Network Programming Using requests Grabbing web content Sending email Using SSH for remote access Using FTP Writing real-life applications Reading input files a la Unix Parsing command-line options Detecting the current platform Implementing logging Additional course details: Nexus Humans Mastering Python Programming (TTPS4820) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering Python Programming (TTPS4820) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Mastering Python Programming (TTPS4820)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco SD-WAN Cloud (SDWAN-CLD-CT)

By Nexus Human

Duration 5 Days 30 CPD hours Overview Upon completing this course, you will be able to meet the following objectives: SD-WAN Overview Cloud Concepts Cloud Technologies SD-WAN Direct Cloud Access (DCA) SD-WAN SaaS Cloud On-RAMP for IAAS (AWS) Cloud On-RAMP for IAAS (AZURE) Cloud Configuration for GCP Cloud On-RAMP for MULTI-CLOUD Cloud On-RAMP for CO-LOCATIONS This is a 5 day hands-on course on Cisco SD-WAN Cloud Configuration, Monitoring and Troubleshooting. This course provides the student with the knowledge to connect SD-WAN to SaaS Applications, as well as the ability to connect their Branches to AWS, AZURE, GCP Data Centers in the Cloud. Students will also learn how to Configure, Monitor, and Troubleshoot SD-WAN Co-Locations and SD-WAN Multicloud. SD-WAN Overview SD-WAN Controller SD-WAN WAN Edges supported in Cloud Instances Cloud Concepts Cloud Ops vs WAN Ops Cloud Connectivity Cloud Access Control Cloud Network Connectivity Cloud Regions Cloud Availability Zones Virtual Networks Cloud Routing Internet Gateways VS VPN Gateways VPC/VNET: IP Addressing Cloud Network Load Balancing Cloud Peering Cloud Transit Networks Cloud Technologies Azure Azure Basics Resource Groups vNets Availability zones Availability Set Workload and Public IP Network Virtual Appliance Load Balancer User Defined Routes Network Security Group VPN Gateway Express Routes Creating VNET for SDWAN AWS AWS Basics Region VPCs Availability zones Subnets EC2 Instance Elastic IPs Security Groups Internet Gateway NAT Gateway Route Table VPN Gateway Direct Connect Elastic Load Balancer Subscribe to Amazon machine images Setting AWS resource limits AWS Transit Gateways Creating VPC for SDWAN AWS IAM Role AWS Security Groups Service limits AWS SSH key pair Google Cloud GCP Basics Project Region Virtual Private Cloud Availability Zone Subnets Compute Engine Cloud Load Balancer Cloud DNS VPC Routing Cloud VPN & VPC peering VPC Firewall Rules SD-WAN Direct Cloud Access (DCA) DCA Prerequisites DNS on VPN 0 DIA Central Policy Configuration Match Traffic Set QOS Set External Access SD-WAN SaaS Supported Platforms and Versions SaaS Prerequisites DNS on VPN 0 DIA SaaS Access Methods Cloud Access through Direct Internet Access Links Cloud Access through a Gateway Site Hybrid Approach Supported SaaS Applications SaaS Security Options SaaS Configuration Common Scenarios for Using Cloud onRamp for SaaS Specify Office 365 Traffic Category Enable Cloud onRamp for SaaS, Cisco IOS XE SD-WAN Devices Configure Applications for Cloud onRamp for SaaS Using Cisco vManage Configure Sites for Cloud onRamp for SaaS Using Cisco vManage View Details of Monitored Applications Cloud On-RAMP for IAAS (AWS) Prerequisite AWS Configuration Verify prerequisites Configure AWS for Cisco SD-WAN Cloud On-RAMP for AWS Overview Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp AWS IAM Role Select Region Select CPU and Memory Transit Networking IP Addresses Discover and Map Host VPCs AWS to SD-WAN Security Monitor Cisco Cloud Onramp for AWS Troubleshoot Cisco Cloud Onramp for AWS Interconnecting Cisco SD-WAN with AWS Transit Gateway (TGW) Cloud On-RAMP for IAAS (AZURE) Prerequisite AZURE Configuration Cloud On-RAMP for AZURE Configure AWS for Cisco SD-WAN Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp Select Region Discover and Map Host VPCs Monitor Cisco Cloud Onramp for Azure Troubleshoot Cisco Cloud Onramp for AZURE Azure Virtual Wan (VWAN) Integration Cloud Configuration for GCP Prerequisite GCP Configuration SD-WAN Configuration Configure Google Cloud for SD-WAN Google Cloud GCP Basics Deploy cEdge Catalyst 8000V Edges Setup IPSEC Connections Setup BGP Connections Cloud On-RAMP for MULTI-CLOUD AWS Transit Gateway Microsoft vWAN Create Cisco Cloud GW Discover host VPCs/VNets Map Branch nets to VPCs Cloud On-RAMP for CO-LOCATIONS SD-WAN CO-LOCATIONS Overview Colocation facilities Cisco Colocation Equipment Cisco Cloud Services Platform 5444 Cisco Network Function Virtualization Infrastructure Software (NFVIS) Virtual Network Functions Network Fabric Cisco Catalyst 9500-48Y4C switch Cisco Catalyst 9500-40X switch Device Configuration and Connectivity Sizing the Colocation Solution Devices Cisco Colocation Manager Deploy Network Services at the Network Edge Colocation Solution?Deployment Workflow Monitor Cisco SD-WAN Colocation Devices Cisco Colocation Manager States for Switch Configuration Cisco Colocation Manager States and Transitions from Host Cisco Colocation Manager Notifications VM Alarms Cloud Services Platform Real-Time Commands Colocation High Availability Troubleshoot Cisco SD-WAN Cloud onRamp for Colocation Solution Troubleshoot Catalyst 9500 Issues Troubleshoot Cloud Services Platform Issues DHCP IP Address Assignment Troubleshoot Cisco Colo Manager Issues Troubleshoot Service Chain Issues Troubleshoot Physical Network Function Management Issues Log Collection from CSP Troubleshoot vManage Issues Additional course details: Nexus Humans Cisco SD-WAN Cloud (SDWAN-CLD-CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Cloud (SDWAN-CLD-CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco SD-WAN Cloud (SDWAN-CLD-CT)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is experienced web developers who are new to User Experience (UX) and Responsive Design principles. These professionals typically have a solid understanding of front-end development technologies such as HTML, CSS, and JavaScript but seek to expand their skillset to create more user-centric, adaptable, and accessible web experiences. Roles that would benefit from this course include: Front-end Web Developers Full-stack Developers Web Designers Team Leads and Project Managers Freelance Web Developers Overview Working in a hands-on learning environment led by our expert UX coach, you'll learn to: Understand and apply UX principles and user-centered design processes: Participants will learn to identify the needs and preferences of users, create user personas, and apply UX best practices to develop intuitive, user-friendly web experiences. Design and implement responsive web layouts: Participants will gain the skills to create fluid grid layouts, use flexible images, and apply media queries to design web pages that adapt seamlessly across various devices and screen sizes. Optimize web performance for responsive designs: Participants will learn techniques to improve website performance, including image optimization, responsive images, and minification and concatenation of assets, ensuring a fast and smooth user experience across devices. Implement accessible web designs: Participants will understand the importance of accessibility in web design and learn to apply WCAG principles and accessible design patterns to create websites that are usable by a wide range of users, including those with disabilities. Collaborate effectively with designers, developers, and stakeholders: Participants will gain insights into design collaboration and handoff processes, enhancing their ability to communicate design decisions, provide and receive feedback, and work efficiently with team members and clients. In today's fast-paced digital world, user-centric and adaptable websites are no longer a luxury ? they're a necessity. By embracing UX and responsive design, you'll unlock the potential to elevate your websites, boosting user satisfaction and engagement. This, in turn, leads to higher conversion rates and a stronger online presence for your clients or organization, as well as better collaboration within your team, bridging the gap between designers, developers, and stakeholders.UX Design & Responsive Design for Experienced Web Developers is a three day, engaging hands-on workshop designed to equip you with the latest skills and best practices in User Experience (UX) and Responsive Web Design required to create seamless, user-friendly websites that adapt effortlessly across devices. This course will immerse you in the latest skills, best practices, and hands-on activities, empowering you to create exceptional, accessible websites that excel across devices and captivate users. Throughout the program you?ll explore the fundamentals of UX and responsive design, including user-centered design processes, mobile-first and desktop-first approaches, and design techniques for various devices and screen sizes. You'll gain practical experience creating responsive layouts, optimizing performance, and implementing accessible web designs, all while leveraging popular frameworks and design tools. You'll also gain valuable insights into performance optimization, accessibility, and collaboration strategies, ensuring you have the complete toolkit to excel in your field.By the end of this workshop, you?ll have gained a solid understanding of UX and responsive design principles, as well as hands-on experience in applying these concepts to real-world projects. You?ll be able to create more user-friendly, responsive, and accessible websites, and collaborate more effectively with your design and development teams. Introduction to UX and Responsive Design: Understanding User Experience What is UX? Importance of UX in web development UX principles and best practices User-centered design process Responsive Web Design Basics What is Responsive Web Design? Importance of Responsive Design in modern web development Fluid grid layout, flexible images, and media queries Hands-on Activity: Creating a Responsive Layout Designing a simple responsive layout using HTML, CSS, and media queries Breakdown and explanation of the code Testing responsiveness across different devices Mobile-first vs. Desktop-first Approaches Pros and cons of each approach Deciding which approach to use Designing for Different Devices and Screen Sizes Common breakpoints and device considerations Accessibility and usability across devices Typography, color, and other design elements in responsive design Hands-on Activity: Designing for Different Devices Modifying the previously created responsive layout to optimize for various devices Discussion and feedback on designs Advanced UX and Responsive Design Techniques: UX Research and Testing Importance of UX research Usability testing and user feedback A/B testing and heatmaps Navigation and Information Architecture Designing effective and user-friendly navigation Organizing content and information Common navigation patterns in responsive design Hands-on Activity: Designing Navigation for Responsive Websites Adding navigation elements to the previously created responsive layout Testing navigation on different devices and screen sizes Discussion and feedback on navigation designs Responsive Web Design Frameworks and Tools Overview of popular frameworks (Bootstrap, Foundation, etc.) Pros and cons of using frameworks Introduction to design tools (Sketch, Figma, Adobe XD) Hands-on Activity: Exploring Frameworks and Tools Experimenting with a chosen framework or design tool Redesigning the responsive layout using the selected framework/tool Sharing experiences and discussing the benefits and drawbacks UX and Responsive Design Best Practices: Design Patterns and UI Components Common design patterns in responsive web design Designing reusable UI components Consistency and usability in UI components Performance Optimization Importance of performance in responsive design Image optimization and responsive images Minification and concatenation of assets Hands-on Activity: Optimizing Performance (1.5 hours) Applying performance optimization techniques to the responsive layout Testing the improvements in performance Sharing results and discussing best practices Accessibility in UX and Responsive Design Importance of accessibility in web design Accessibility principles (WCAG) Accessible design patterns and techniques Hands-on Activity: Evaluating and Improving Accessibility Assessing the accessibility of the responsive layout Implementing accessibility improvements Testing and discussing the results Design Collaboration and Handoff Collaborating with designers, developers, and stakeholders Effective communication and documentation Design handoff tools and techniques Hands-on Activity: Simulating Design Handoff Participants will work in pairs to simulate a design handoff Reviewing, discussing, and providing feedback on each other's responsive layouts Sharing experiences and lessons learned

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry