Duration 2 Days 12 CPD hours This course is intended for This class is designed for individuals responsible for implementing a new B2B Commerce Cloud on Classic storefront or providing functional storefront maintenance in a support or administrative role. Overview Understand the different types of products and how to configure them. Set up different pricing strategies. Understand how to implement Marketing and Pricing Strategies. Organize your storefront by configuring Categories and Menus. Understand how the B2B Commerce Cloud handles Internationalization by setting up additional currencies and languages. Grasp Attribute Driven Commerce. Configure Facetted Searches. Take the next step toward a B2B Commerce Administrator Accreditation. Design, build, and launch a business-to-business (B2B) commerce solution that enables retailers, wholesalers, or distributors to purchase goods or services from your brand. In this 2-day class, our Commerce Cloud experts will walk you through how to set up and configure the essential elements required to manage a storefront, so you can deliver a buyer experience that satisfies your organization?s unique requirements. Platform Overview Understand the Features and Functionality of B2B Commerce Setup Administer Commerce Cloud Adjust Sharing Settings Configure the Storefront Secure Domain Style Your Storefronts with Themes Add Widgets to Storefront Pages Leverage Indexing Enable Caching for Storefront Pages B2B Buyers Manage Contacts Create Buyer Users Understand Community Licenses Enable a User Create Account Groups Create Price Lists Manage Storefront Access Products Add Standard Products to a Price Book Create a Product Bundle Create a Product Kit Create an Aggregated Product Create a Dynamic Kit Create an Assembly Product Marketing and Pricing Strategies Show Related Products Create Subscription Products Set Up Promotions Offer Coupons for Discounts on Storefront Purchases Offer Tiered Pricing to Give Customers a Price Break Configure Attribute Pricing Configure Contract Pricing Storefront Organization Show Your Featured and Spotlight Products Plan Your Category Structure Add a Menu Component Create Page Sections Customize Storefront Headings with Page Labels Localization Add or Change the List of Available Languages Add or Change the List of Available Currencies Localize Objects Advanced Configurations Enable Effective Accounts Split an Order with Line Level Independence Additional course details: Nexus Humans Salesforce Administer and Merchandise a B2B Commerce on Classic Store (B2B101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Administer and Merchandise a B2B Commerce on Classic Store (B2B101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting. Overview As a result of attending this course, students should be able to analyze the operational state of computer systems and identify potential issues. When problems appear, students will be able to successfully resolve the issue, returning it to a secure and stable working condition. Students should be able to demonstrate the following skills: Diagnostic and analysis procedures Preventive maintenance planning and implementation System recovery using proven tools and techniques This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues.You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills.This course covers the same material as RH342, but includes the Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342) Introduction to troubleshooting Describe a generalized strategy for troubleshooting. Take proactive steps to prevent small issues Prevent small issues from becoming large problems by employing proactive system administration techniques. Troubleshoot boot issues Identify and resolve issues that can affect a system's ability to boot. Identify hardware issues Identify hardware problems that can affect a system?s ability to operate. Troubleshoot storage issues Identify and fix issues related to storage. Troubleshoot RPM issues Identify and fix problems in, and using, the package management subsystem. Troubleshoot network issues Identify and resolve network connectivity issues. Troubleshoot application issues Debug application issues. Deal with security issues Identify and fix issues related to security subsystems. Troubleshoot kernel issues Identify kernel issues and assist Red Hat Support in resolving kernel issues. Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting. Additional course details: Nexus Humans Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas Æ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice
Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services Create Azure App Service Web Apps Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Implement Azure functions Azure Functions overview Developing Azure Functions Implement Durable Functions Develop solutions that use blob storage Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Create an Azure Resource Manager Template Develop solutions that use Cosmos DB storage Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Create and deploy ARM templates Implement user authentication and authorization Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Implement secure cloud solutions Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Implement API Management API Management overview Defining policies for APIs Securing your APIs Develop event-based solutions Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Develop message-based solutions Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Monitor and optimize Azure solutions Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Additional course details: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Learners who will find this course applicable to their work include: Solutions architects Cloud practitioners Data engineers Data scientists Developers Overview In this course, you will explore: Workload definition and key concepts The AWS Well-Architected Framework Review phases, process, best practices, and antipatterns High and medium risks Prioritizing improvements to the AWS Well-Architected workflow Locating and using the AWS Well-Architected Framework white paper, labs, prebuilt solutions in the AWS solutions library, AWS Well-Architected independent software vendors (ISVs), and AWS Well-Architected Partner Program (WAPP) This interactive course provides a deep dive into Amazon Web Services (AWS) best practices to help you perform effective and efficient AWS Well-Architected Framework Reviews. The course covers the phases of a review, including how to prepare, run, and get guidance after a review has been performed. Attendees should have familiarity with the AWS concepts, terminology, services, and tools that are covered in the intermediate, 200-levelAWS Well-Architected Best Practices.This course provides an AWS Well-Architected Framework Review simulation and instructor-led group exercises and discussions regarding prioritizing and solutioning risks. The content focuses on teaching learners how to prepare proposals on high and medium risk issues using the AWS Well-Architected Tool. Module 1: AWS Well-Architected Framework Reviews Workload definition Key concepts of a workload AWS Well-Architected Review phases AWS Well-Architected Review approach, lessons learned, and use case AWS Well-Architected Review best practices AWS Well-Architected Review anti-patterns Module 2: Customer Scenario Group Sessions Demonstration of a Review question and answer example Operational excellence Group role-play exercise Two questions in this pillar Security Group role-play exercise Three questions in this pillar Reliability Group role-play exercise Three questions in this pillar Performance efficiency Group role-play exercise Three questions in this pillar Cost optimization Group role-play exercise Three questions in this pillar Module 3: Risk Solutions and Priorities AWS Well-Architected workflow Defining and solutioning high risk issues (HRIs) and medium risk issues (MRIs) Identifying significant risks and solutioning group discussion for: Operational excellence Security Reliability Performance efficiency Cost optimization Prioritizing improvements Module 4: Resources Resource pages AWS Well-Architected ISVs Module 5: Course Summary Objective recap Debrief What?s next? Additional course details: Nexus Humans Advanced AWS Well-Architected Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced AWS Well-Architected Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: System installers System integrators System administrators Network administrators Solutions designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the system architecture of Cisco WAN Automation Engine and Cisco WAE network abstraction Plan and deploy Cisco WAE Planning components, including Collector, WAE Design, and WAE Live Plan and deploy Cisco WAE Automation and explain the basics of Cisco WAE APIs Explain how to deploy changes to the network using Cisco WAE and XR Traffic Controller (XTC) Explain how to use the Cisco WAE Design application to solve problems and achieve business goals WAE200, Operating and Implementing Cisco WAN Automation Engine v3.0 is a 5-day course that gives you the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco© WAN Automation Engine (WAE) solution. Extensive hands-on labs help you gain the necessary skills to install and maintain Cisco WAE systems.This course will help you:Learn to install Cisco WAN Automation EngineGain confidence with WAE configuration and basic troubleshootingPractice designing and managing bandwidth and traffic engineering WAE Solution and Architecture Overview Examining WAE Examining WAE Architecture and Design Examining WAE Applications and Use Cases WAE Solution Implementation Planning a WAE Deployment Deploying WAE Describing WAE Integration Options Network Model Configuration Describing the Collection Process Describing Network Interface Modules Creating Network Models Configuring WAE Modeling Daemon WAE Automation Bandwidth Applications Deploying Bandwidth on Demand Application Deploying Bandwidth Optimization Application WAE Design Fundamentals Getting Started with WAE Design Describing Demands and Traffic Tools Modeling Interior Gateway Protocol (IGP) and BGP Describing Failures and Simulation Analysis WAE Design Traffic Engineering and Optimization Engineering Traffic by Using Metrics Engineering Traffic by Using Resource Reservation Protocol with Traffic Engineering (RSVP-TE) Engineering Traffic by Using Segment Routing-Traffic Engineering (SR-TE) Engineering Traffic by Using Latency Constraints Modeling Quality of Service (QoS) Introduction to WAE API Introducing WAE Design Remote Procedure Call (RPC) API Introducing WAE Optimization and Prediction Module (OPM) API Introducing WAE Server Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) APIs WAE Live Deployment Describing the Components of WAE Live Configuring WAE Live Explaining WAE Live Features Maintenance and Troubleshooting Maintaining WAE Troubleshooting WAE Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Overview VMware vSphere: What's New [V8] https://lms.nhcms.neYou will learn essential Terraform concepts including: Writing Terraform HCL code Deploying into common clouds such as AWS, Azure, Docker, Kubernetes, and VMWare Where Terraform fits in the Enterprise CI/CD model Differences between Terraform and Ansible As enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use ?Infrastructure as Code? (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform?s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible. This class prepares you for Terraform Certifcation. Up and Running with Terraform Terraform Overview Defining ?declarative? How to think about Terraform (versus Ansible) Reviewing the Terraform Configuration Running the Terraform Configuration Provisioners Syntax Low Level? HCL syntax Style Conventions Comments Blocks Arguments JSON Configuration Syntax Resources Meta-Arguments depends_on count for_each provider lifecycle Data Sources Variables and Output Input Variables Output Values Local Values Functions String Collection Numeric Encoding Filesystem Date and Time Hash and Crypto IP Network Type Conversion Modules Module Blocks Module Sources Meta Arguments Terraform Templates templatefile Function Template Demonstration Introducing Data Sources Creating an External Data Source Building tftpl template files Expressions Types and Values Strings and Templates Reference to Values Operators Function Calls Conditionals For Expressions Splat Expressions Dynamic Blocks Type Constraints Version Constraints State Understanding the importants of states state storage and locking importing existing resources Remote State What to do when local state is lost CICD Piplines with Terraform Terraform and GitLab pipelines Terraform and Jenkins pipelines Enterprise Case Studies Terraform and Docker Terraform and Kubernetes Terraform and Amazon AWS Terraform and Azure Terraform and VMWare Understanding how to apply Terraform to your unique infrastructure Beyond Basics Intro to Go Programming Terraform Cloud Additional HashiCorp Offerings Backends Secrets Additional course details: Nexus Humans Terraform 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Terraform 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.