• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18258 Introduction To Construction courses delivered Online

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Quality of Service v2.5 (QOS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner / Reseller Customer Employee Overview At course completion students will be able to: - Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network - Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations - Given a converged network and a policy defining QoS requirements, classify and mark network traffic to implement the policy - Use Cisco QoS queuing mechanisms to manage network congestion - Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network - Use Cisco QoS traffic policing and traffic shaping mechanisms to effectively limit the rate of network traffic - Given a low speed WAN link, use Cisco link efficiency mechanisms to improve the badwidth efficiency of the link - Describe the recommended best practices and methods used for end-to-end QoS deployment in the enterprise This course provides students with knowledge of IP QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. Introduction to QoS Review Converged Networks Understand QoS Describe Best-Effort and Integrated Services Models Describe the Differentiated Services Model Module Summary Module Self-Check Implement and Monitor QoS MQC Introduction Monitor QoS Define Campus AutoQoS Define WAN AutoQoS Module Summary Module Self-Check Lab 2-1: IP SLA Setup and QoS Baseline Measurement Lab 2-2: Configuring QoS with Cisco AutoQoS Classification and Marking Classification and Marking Overview Case Study 3-1: Classification and Marking MQC for Classification and Marking NBAR for Classification Use of QoS Preclassify Campus Classification and Marking Module Summary Module Self-Check Lab 3-1: Classification and Marking Using MQC Lab 3-2: Using NBAR for Classification Lab 3-3: Configuring QoS Preclassify Lab 3-4: Campus Classification and Marking Using MQC Congestion Management Queuing Introduction Configure WFQ Configure CBWFQ and LLQ Configure Campus Congestion Management Module Summary Module Self-Check Lab 4-1: Configuring Fair Queuing Lab 4-2: Configuring LLQ-CBWFQ Lab 4-3: Configuring Campus-Based Queuing Mechanisms Congestion Avoidance Congestion Avoidance Introduction Configure Class-Based WRED Case Study 5-1: WRED Traffic Profiles Configure ECN Describe Campus-Based Congestion Avoidance Module Summary Module Self-Check Lab 5-1: Configuring DSCP-Based WRED Lab 5-2: Configuring WTD Thresholds Traffic Policing and Shaping Traffic Policing and Shaping Overview Configure Class-Based Policing Campus Policing Configure Class-Based Shaping Configure Class-Based Shaping on Frame Relay Interfaces Configure Frame Relay Voice-Adaptive Traffic Shaping and Fragmentation Module Summary Module Self-Check Lab 6-1: Configuring Class-Based Policing Lab 6-2: Configuring Class-Based Shaping Link Efficiency Mechanisms Link Efficiency Mechanisms Overview Configure Class-Based Header Compression Configure LFI Module Summary Module Self-Check Lab 7-1: Configuring Class-Based Header Compression Lab 7-2: Configuring LFI Deploying End-to-End QoS Apply Best Practices for QoS Policy Design End-to-End QoS Deployments Module Summary Module Self-Check Lab 8-1: Mapping Enterprise QoS Policy to the Service Provider Policy Additional course details: Nexus Humans Cisco Implementing Cisco Quality of Service v2.5 (QOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Quality of Service v2.5 (QOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Quality of Service v2.5 (QOS)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud: Plan and Deploy

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload™ Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Carbon Black Cloud Describe the VMware Carbon Black Cloud platform Describe VMware Carbon Black Cloud operating systems requirements Identify interesting files according to VMware Carbon Black Cloud Identify events collected Describe data flows Managing VMware Carbon Black Cloud Roles and Users Describe the use of roles in VMware Carbon Black Cloud Describe RBAC capabilities Create and edit a custom role Manage new console users Recognize the impact of a user role on a console user Describe authentication mechanisms VMware Carbon Black Cloud Sensors Describe the VMware Carbon Black Cloud sensor resource usage List the supported operating systems for VMware Carbon Black Cloud sensors Explain sensor usage in VMware Carbon Black Cloud Preparing for Deployment Identify configuration settings for endpoints in sensor policy settings Organize sensors using sensor groups to assign the desired policy based on specific criteria Compare VDI sensor settings as compared to traditional endpoint sensor settings Determine requirements for the initial deployment of sensors Evaluate the policy impact on sensors Identify best practices for deploying sensors Installing Sensors Describe how to send an installation request Recognize the features and limitations of an installation code and company code Recognize the process for successfully completing an attended installation Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Generate logs with unattended installations Generate sensor logs Check network connectivity for sensor installation Deploying Workloads Recognize the deployment process for VMware Carbon Black Cloud Workload Identify eligible workloads in a vSphere environment Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload Managing Sensors Describe VMware Carbon Black Cloud sensor deployment Explain the differences in sensor status Describe sensor update capabilities Explain sensor actions Manage vSphere workloads Post-deployment Validation Describe the process of a sensor background scan Recognize a properly registered sensor installation Identify sensor status in RepCLI Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud: Plan and Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Design and Build Integration Solutions (ARC101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced administrators and platform developers as well as solution, enterprise, and technical architects responsible for designing or building integration solutions on the Salesforce Platform. It's also designed for project or program managers looking to understand the big picture of integration in order to better manage their projects and programs. Ideally, you hold the Salesforce Administrator, Salesforce App Builder, or Salesforce Platform Developer I credential and/or are knowledgeable about standard and custom objects; how to work with flows and Process Builder; how to navigate Salesforce, Lightning Components, and Schema Builder; and Apex basics such as creating a Class and Anonymous Blocks. This class is recommended for anyone looking to earn their Salesforce Certified Integration Designer credential. Overview When you complete this course, you will be able to: Identify integration requirements by asking relevant integration questions to business stakeholders. Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes, Data Virtualization) to design integration solutions. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, Outbound Messaging, Callouts, and Salesforce Connect) to build integration solutions. Explore architectural concepts and the big picture thinking of how to integrate on the Salesforce Platform. In this 3-day class, our Salesforce integration experts will demonstrate how to build solutions that provide a single view of your customers. You?ll learn about integration capabilities and the considerations that should be made when architecting an integration solution. Through a combination of demos, discussions, and hands-on exercises, you?ll design and build secure, scalable, and high-performing integration solutions that seamlessly surface the information that matters most Integration Overview Understand the Importance of Integration Explore Integration Architecture Explore the Meaning of Single View of the Customer Explore the Meaning of System Landscape Understand the Role of Enterprise Service Bus (ESB) and Extract Transform Load (ETL) in System Landscape Integration Capabilities Introduction to Salesforce APIs Create External Applications Using SOAP API Build Mobile Applications Using REST API Work with Large Data Volumes Using BULK API Build Event-Driven Applications Using Streaming API Build Event-Driven Applications Using Platform Events Build Event-Driven Applications Using Change Data Capture Send Data from Salesforce to External Applications Using Outbound Message Call External APIs Programmatically Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Call External APIs Declaratively Using External Services Integration Patterns Understand Use Cases for a Request and Reply Pattern Understand Use Cases for a Fire and Forget Pattern Understand Use Cases for a Batch Data Synchronization Pattern Understand Use Cases for a Remote Call-In Pattern Understand Use Cases for a UI Update Based on Data Changes Pattern Understand Use Cases for a Data Virtualization Pattern Integration Security Explore Two-Way Transport Layer Security (TLS) Understand When to Use Remote Site Settings Understand the Benefits of Using Named Credentials Understand Certificates Encrypt Your Data at Rest Using Salesforce Shield Platform Encryption Advanced Integration Discussions Design Solutions for Performance Design Solutions for Scale Review Integration Regulatory Requirements Review Integration Best Practices Case Study Draw a System Landscape Diagram Evaluate Business Needs Translate Needs to Integration Requirements Design an Integration Solution Build an Integration Solution Maintain an Integration Solution Additional course details: Nexus Humans Salesforce Design and Build Integration Solutions (ARC101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Design and Build Integration Solutions (ARC101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Design and Build Integration Solutions (ARC101)
Delivered OnlineFlexible Dates
Price on Enquiry

Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows - IT Staff and Managers - Network and systems personnel and engineers - Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics Overview Upon completing this course, the student will be able to meet these objectives: Students will be able to Deploy and Manage a Meraki Network using the Meraki Dashboard - Deploy, Manage, Monitor and Troubleshoot Meraki MS Switches - Deploy, Manage, Monitor and Troubleshoot Meraki MR Wireless Access Points - Deploy, Manage, Monitor and Troubleshoot Meraki MX Firewall Appliances - Deploy, Manage, Monitor and Troubleshoot Meraki MV IP Video Cameras - Deploy, Manage, Monitor and Troubleshoot Meraki MC Phones - Deploy, Manage, Monitor and Troubleshoot Meraki Systems Manager - Deploy, Manage, Monitor and Troubleshoot Meraki SDWAN This course familiarizes individuals with networking concepts and demonstrates how to effectively use Meraki products to build a comprehensive network Cisco/Meraki Product Line Introduction MS - Switching MR - Wireless LAN MX - Security MV ? Camera MC - Voice SD-WAN Cisco/Meraki Cloud Management Introduction to cloud management The dashboard and navigation Organizations & Networks ? what is the difference and how to use them System-wide parameters (organization parameters) Cisco/Meraki Dashboard Administration Creating and implementing maps Summary Report and Auto Generation Reports Adding administrators and tweaking security levels Using Tags and Configuring Alerting (SNMP, email) Adding admins, configuring reports, and alerts Firmware Management Configuring Authentication Lab 1 Lab 2 Configuring external authentication Configuring Group Policies Device Replacement Location Analytics Other advanced analytics Cisco/Meraki Switching Review switching basics Review Meraki L2 Switch Models Configuring Meraki Switches Troubleshooting / Diagnostics Lab 3 Cisco/Meraki Routing Review routing basic (IP Addresses, Networks and Masks, OSPF, etc.) Review Meraki L3 switch Models Configuring Meraki Switches for Routing Lab 4 Cisco/Meraki Wireless Review Wireless Basics Meraki Wireless Product Review Performing a Site Survey Configuring Access Points Lab 5 Cisco/Meraki Firewalls/Security Review firewall basics Meraki Firewall Model Review Configuring a Meraki Firewall Lab 6 IP Cameras MV21 vs MV71 Installing Cameras Adding Cameras to the Dashboard Managing MV Cameras Troubleshooting Cameras Lab 7 Meraki Communications QOS Voice Security Deploying Meraki MC74 Phones Deploying Cisco IP Phones to CUCM Deploying Voice Features End User Lab 8 Meraki Systems Manager Controlling Wireless Device Policies Enrolling Devices Apps Profiles Tags Security Policies Geofencing Policies Lab 9 Meraki SDWAN What is SD-WAN? Concentrator Mode VPN Topology Split Tunnel Full Tunnel Hub and Spoke VPN Mesh Datacenter Redundancy (DC-DC Failover) Warm Spare (High Availability) for VPN concentrators Connection Monitor Dual-Active VPN uplinks Policy-based Routing Dynamic Path Selection SD-WAN Objectives Example Topology High Level Traffic Flow SD-WAN Technologies Deploying a one-armed concentrator Dashboard Configuration Other Datacenter Configuration MX IP Assignment Upstream Considerations Datacenter Redundancy (DC-DC Failover) High-level architecture Failover Times Datacenter Deployment Branch Deployment Lab 10 Meraki Support Getting support for Meraki Finding the Right Documentation Posting in the Community Troubleshooting Meraki Connectivity Issues Resetting Devices. Additional course details: Nexus Humans Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT)
Delivered OnlineFlexible Dates
Price on Enquiry

Network Automation with Python and Ansible

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. Day 1 ? Critical Python Catchup & Review Overview of Python and Ansible Python white space rules & best practices Printing and more Printing Date types and Variables Packing and Unpacking Variables f Strings Conditional expressions Relational and Boolean operators Lists, Tuples, Dictionaries Indexing and slicing Built-in functions Iterating with Loops (for and while) Working with files Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) Using Python to access REST interfaces Working with JSON Python, Ansible and Paramiko Using Paramiko to SSH with keys and passwords RESTful API review API keys Paramiko Review Using Paramiko to SFTP with keys and passwords Day 02 ? Python and Network Automation Introduction to Netmiko (automating routers and switches) Using Netmiko to send commands to / from network devices Working with YAML Converting JSON to YAML with Python Ansible keywords YAML and JSON for data exchange Ansible and YAML Ansible Playbook components Tying together Python and Ansible ? Using Python within Ansible Ansible Network Modules What is new in Ansible (most current updates / release notes) Network Agnostic modules Writing network playbooks Reviewing the construction of network playbooks Writing Ansible playbooks that respond to network failures Day 03 ? Blending Python and Ansible Skillsets Review how to use Python within Ansible Calling Python scripts with Ansible Jinja2 Templating Engine for Python (and Ansible) Using Templates in Ansible playbooks Jinja2 filters, looping, and other useful tricks for automating with Ansible Playbook tagging for selective runs When to use Python and when to use Ansible ?Big Picture? options for using Python & Ansible within your Network Ansible Roles Day 04 ? Customizing Ansible with Python Review ? Running Scripts with Ansible Prompting for Ansible user input Ansible Galaxy & Getting at Roles Writing a custom Ansible Module with Python Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. Case Study: Automate your Enterprise Network When to use Python and when to use Ansible Writing your own Ansible modules in Python ?Big Picture? options for using Python & Ansible within your Network Overview ? NETCONF / YANG and what they mean for Python and Ansible Molecule ? Testing your roles Additional course details: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Automation with Python and Ansible
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Migration from VMware NSX for vSphere to NSX-T

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Understand the networking and security features of NSX-T Data Center Compare end-to-end and lift-and-shift migration approaches Identify common fixed network topologies supported in end-to-end migrations Perform end-to-end migrations for fixed and user-defined topologies Describe other migration modes supported by the migration coordinator Describe lift-and-shift migration techniques Troubleshoot common problems with end-to-end and lift-and-shift migrations Describe the steps to perform a cross-vCenter NSX to NSX Federation migration This three-day, hands-on training course provides you with the skills, techniques, and tools required to successfully migrate your current VMware NSX© Data Center for vSphere© environment to VMware NSX-T? Data Center. You will learn to choose between different migration approaches and how to perform the type of migration that best suits your current environment. In addition, you are presented with common migration problems and resolutions. Course Introduction Introduction and course logistics Course objectives Introduction to NSX-T Data Center Describe the motivation for migrating to NSX-T Data Center Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Describe the logical switching components in NSX-T Data Center Describe the components and functions of NSX-T Data Center logical routing Describe the security features of NSX-T Data Center Explain the implementation of networking services in NSX-T Data Center Migration Approaches Describe the end-to-end migration approach Describe the lift-and-shift migration approach Compare the migration approaches Determine the best migration strategy based on customer requirements Fixed Topologies for Migration Identify the NSX Data Center for vSphere fixed network topologies that can be migrated to NSX-T Data Center without a user-defined topology Explain how network and security objects from the fixed topologies are translated from NSX Data Centerfor vSphere to NSX-T Data Center End-to-End Migration Describe the prerequisites for end-to-end migration Prepare the NSX Data Center for vSphere environment for migration Prepare the NSX-T Data Center environment for migration Migrate the NSX Data Center for vSphere environment with the migration coordinator using a fixed topology Migrate the NSX Data Center for vSphere environment with the migration coordinator using a user-defined topology Perform postmigration tasks Other Migration Modes Describe the steps to migrate NSX Data Center for vSphere when integrated with VMware vRealize Automation Describe the Edge Cutover migration mode Describe the Distributed Firewall migration mode Describe the Distributed Firewall, Host, and Workload migration mode Describe the vSphere Networking migration feature Lift-and-Shift Migration Describe the prerequisites for lift-and-shift migrations Configure L2 bridging in preparation for lift-and-shift migrations Migrate the network and security configuration Migrate workloads Describe the DFW-only migration mode Troubleshooting Migrations Troubleshoot migration problems Identify the log files used in troubleshooting Identify and resolve common issues related to migrations. Cross-vCenter NSX to NSX Federation Migration Contrast cross-vCenter NSX and NSX Federation architectures Describe the steps for a multisite migration Demonstrate how to perform a cross-vCenter NSX to NSX Federation migration Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Migration from VMware NSX for vSphere to NSX-T training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Migration from VMware NSX for vSphere to NSX-T course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Migration from VMware NSX for vSphere to NSX-T
Delivered OnlineFlexible Dates
Price on Enquiry

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud on AWS: Design, Configure, Manage 2023

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of VMware Cloud on AWS Prepare and deploy VMware Cloud on AWS SDDC Configure the scale-up and scale-down of a VMware Cloud on AWS SDDC Access a VMware vCenter configuration in VMware Cloud on AWS Configure internal, external, and inter-SDDC networking Configure storage integrations and solutions for VMware Cloud on AWS Configure a connection between an on-premises vSphere SDDC and a VMware Cloud on AWS SDDC Migrate VMs between on-premises vSphere and VMware Cloud on AWS SDDCs Describe lifecycle management, troubleshooting scenarios, and disaster recovery solutions for a VMware Cloud on AWS SDDC Describe how VMware add-on solutions support a VMware Cloud on AWS SDDC This four-day, hands-on training course provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud? on AWS infrastructure. You will explore the common use cases of the VMware Cloud on AWS infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere© that leverage AWS.In this course, you are introduced to various rapid and easy migration options for workloads based on vSphere to VMware Cloud on AWS. In addition, you are presented with VMware Cloud Disaster Recovery?, which is a Disaster Recovery as-a-service (DRaaS) solution, with fast recovery capabilities, that can be used to cost-effectively protect a broad set of your virtualized applications. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Cloud on AWS Choosing VMware Cloud on AWS Management and operational structure VMware Cloud on AWS Platform and SDDC Deployment Preparation Getting started with VMware Cloud on AWS Preparing AWS infrastructure for a VMware Cloud on AWS deployment Setting up a VMware on Cloud AWS account Billing and pricing on VMware Cloud services Deploying and Scaling and SDDC Deploying and examining SDDC configurations Sizing the SDDC SDDC cluster management SDDC host management Optimizing and maintaining SDDC Cluster using Elastic DRS for VMware Cloud on AWS Accessing and Analyzing vCenter Configurations Accessing vCenter Server in the Cloud SDDC Analyzing resource management settings in the SDDC Exploring vSphere permissions on VMware Cloud on AWS VMware Tanzu? for VMC on AWS Networking in VMware Cloud on AWS Internal SDDC network Networking and security options SDDC Network Administration with NSX Manager Creating virtual machines in the Cloud SDDC Inter-SDDC networking Storage on VMware Cloud on AWS vSAN storage in VMware Cloud on AWS Attaching external storage to a VM running on an SDDC Working with On-Premises vSphere Hybrid-linked mode Migration solutions for VMware Cloud on AWS VM migration with VMware HCX© Maintaining and Troubleshooting VMware Cloud on AWS Accessing API with VMware Cloud on AWS Maintenance and support Common troubleshooting steps Disaster Recovery Solution Site Recovery add-on service VMware Cloud Disaster Recovery? Using Other VMware Products with the SDDC VMware Aria? Operations for Logs (formerly vRealize Log Insight) VMware Horizon© with VMware Cloud on AWS VMware Aria Automation add-on (formerly vRealize Automation) Using VMware Aria Operations with VMware Cloud on AWS Using VMware Aria Operations for Networks (formerly vRealize Network Insight) with VMware Cloud on AWS Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud on AWS: Design, Configure, Manage 2023 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud on AWS: Design, Configure, Manage 2023 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud on AWS: Design, Configure, Manage 2023
Delivered OnlineFlexible Dates
Price on Enquiry