Duration 2 Days 12 CPD hours This course is intended for This course is ideal for developers and engineers including: Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Cisco integrators/partners Field engineers Server administrators Network managers Overview After taking this course, you should be able to: Apply troubleshooting methodology to Cisco ACI networks Troubleshoot logical and physical constructs of the Cisco ACI policy Understand Cisco APIC and its troubleshooting aspects Troubleshoot endpoint learning in Cisco ACI Troubleshoot Layer 2 traffic bridging and Layer 3 routing in the Cisco ACI network Troubleshoot hypervisor integration in Cisco ACI Troubleshoot Layer 4 to Layer 7 service insertion Troubleshoot contracts and route leaking in Cisco ACI The Troubleshooting Cisco Application-Centric Infrastructure (DCACIT) v5.2 course teaches you through a combination of lectures and labs the key components and procedures needed to troubleshoot Cisco Nexus 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is for advanced engineers who have installed and managed existing fabrics or for those who have completed the Implementing Cisco Application-Centric Infrastructure-Advanced (DCACI) course. Course Outline Describing Cisco ACI Troubleshooting Methodology Troubleshooting Logical and Physical Constructs Troubleshooting Cisco APIC Troubleshooting Endpoint Learning Troubleshooting Layer 2 Troubleshooting Layer 3 Routing Troubleshooting VMM Integration Troubleshooting Layer 4-7 Service Insertion Troubleshooting Contracts and Route Leaking Additional course details: Nexus Humans Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary Lab outline Execute Your First Python Program Use the Python Interactive Shell Explore Foundation Python Data Types Explore Complex Python Data Types Use Standard String Operations Use Basic Pattern Matching Reformat MAC Addresses Use the if-else Construct Use for Loops Use while Loops Create and Use Functions Create and Use Classes Use the Python main() Construct Traverse the File Structure Read Data in Comma-Separated Values (CSV) Format Read, Store, and Retrieve Data in XML Format Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format Read, Store, and Retrieve Data in a Raw or Unstructured Format Import Modules from the Python Standard Library Import External Libraries Create a Python Module Prompt the User for Input Use Command-Line Arguments Manage Exceptions with the try-except Structure Manage Exceptions with the try-except-finally Structure Use Assertions Use Simple Debugging Methods Use the Python Debugger Code a Practical Debugging Script
Duration 5 Days 30 CPD hours This course is intended for Application Developers; Programmers, Sales and Pre Sales, Technical Support, Project Managers, Cisco customers, partners and employees involved in UCCE/CVP or CVP stand alone deployments Overview Upon completing this course, the learner will be able to meet these overall objectives: Introduction to the Java API, its capabilities and limitations - Practice - This course is applicable for any version of CVP and Studio. Introduction to Voice Elements and their complexity - creating every different Java component to extend Studio (see below) Overview of a UCCE with CVP Comprehensive Call Flow Module 1 Overview of a UCCE with CVP Comprehensive Call Flow Module 2 ICM routing scripts to route calls to CVP VXML Server applications Passing data (e.g., global variables) Parsing and evaluating data returned Queueing Assigning data to send to Finesse. Module 3 Writing Call Studio scripts (applications) Prompting Callers ? using pre-recorded audio; TTS text-to-speech; Say it Smart to format audio as digits, date, time, currency; input error reprompting Menus Collecting and confirming caller input, such as account numbers, dates of birth, etc Working with variables ? Session data, Element data, Call data, Local data (CVP11) Introduction to retrieving data from back end systems: SQL Database interaction ? using the Studio Database element to select data Web service interaction- Studio Web Services element for SOAP-web services and calling a simple REST web service Playing audio to callers during back-end data retrieval Catch events Working with counters, decisions, math Introduction to javascript for substrings and string length Setting VoiceXML properties affecting the gateway Multi-Language applications Module 4 Working with Version Control Module 5 ÿImplementing a Post Call Survey Module 6 Using the Studio Debugger to test applications within Studio Module 7 CVP Reporting Server and CVP CUIC Reports Best practices regarding naming elements and variables Configuring data to pass to the Reporting Server using OAMP Understanding Reporting Server tables Understanding the Application Summary CUIC reports Module 8 Administration covered throughout the course OAMP Operations Console to deploy applications to VXML Server Using Studio Documenter to print Visio-like diagrams of the application Configuring log file properties Using logs for debugging applications Administrative scripts for graceful updates or suspensions of the server Important log, debug, administration files Module 9 Cisco Courtesy Callback Detailed discussion of the CCB Call flow, the ICM script, and the 5 Studio scripts used for Courtesy Callback.
Duration 4 Days 24 CPD hours This course is intended for Data center engineers Engineers (design, implementation, pre-sales, post-sales) Product managers and sales Overview After taking this course, you should be able to: Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex Explain the Cisco Unified Computing System⢠(Cisco UCS) and what makes it valuable to business Describe how Cisco HyperFlex Data Platform (HXDP) works Describe the physical components of Cisco HyperFlex Describe Cisco Intersight and introduce functionalities relevant to HyperFlex Install standard ESXi-based vSphere Cisco HyperFlex Manage your Cisco HyperFlex VMware ESXi-based cluster Describe how to maintain Cisco HyperFlex Design a Cisco HyperFlex solution Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption Describe a stretched cluster and how is it different from a standard cluster Describe an Edge cluster and how is it different from a standard cluster Perform basic troubleshooting tasks and explain Cisco Intersight The Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco© HyperFlex? data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.? Introducing Hyperconvergence and Cisco HyperFlex Traditional Data Center Design What Is Hyperconvergence? Describing Cisco UCS: The Foundation of Cisco HyperFlex Cisco Server Deployment Models: Standalone Versus Managed Cisco UCS Managed Model Benefits Describing Cisco HyperFlex Software Components Virtual Machine Hypervisor Log-Structured File System Describing Cisco HyperFlex Hardware Components Introducing Cisco HyperFlex Servers Storage Technologies in Cisco HyperFlex Introducing Cisco Intersight Introducing Cisco Intersight Installing and Expanding Standard ESXi Cisco HyperFlex Installation Summary Software Prerequisites Managing Cisco HyperFlex in vSphere Environment Management Interfaces Overview Cisco HyperFlex Plugin for vCenter Maintaining Cisco HyperFlex Cisco HyperFlex Upgrade Overview Cisco HyperFlex Online Upgrade Designing Cisco HyperFlex Cluster Resiliency: VM-Level Cluster Resiliency: HXDP-Level Protecting Your Data Disaster Recovery Overview Third-Party Data Restore Solutions Introducing Cisco HyperFlex Stretched Deployment Stretched Cluster Overview Prerequisites Introducing Cisco HyperFlex EDGE Cisco HyperFlex EDGE Cluster Overview Prerequisites and Recommendations Troubleshooting Cisco HyperFlex Troubleshooting Guidelines Generating Tech Support Bundles
Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course
Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who want to increase their knowledge of and familiarity with concepts surrounding data science. Other individuals who want to know more about basic data science concepts are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DSBIZ⢠(Exam DSZ-110) credential. Overview In this course, you will identify how data science supports business decisions. You will: Explain the fundamentals of data science Describe common implementations of data science. Identify the impact data science can have on a business The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improve and expand the success of the business. Data Science Fundamentals What is Data Science? Types of Data Data Science Roles Data Science Implementation The Data Science Lifecycle Data Acquisition and Preparation Data Modeling and Visualization The Impact of Data Science Benefits of Data Science Challenges of Data Science Business Use Cases for Data Science Additional course details: Nexus Humans CertNexus Data Science for Business Professionals (DSBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Science for Business Professionals (DSBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Application ConsultantProgram / Project ManagerSystem Architect Overview Configure and use major features of SAP Extended Warehouse Management This course provides students with the opportunity to define and set the mandatory configuration required to customize the implementation of SAP EWM. The Extended Warehouse Management (EWM) System Environment Outlining the Basics of EWM Integration Setting Up the Integration Between SAP ERP and SAP EWM Setting Up Delivery Document Integration Structural Elements and Master Data Creating Structural Elements in EWM Creating Storage Bins Creating Work Centers Transferring Master Data from ERP to EWM using the APO Core Interface Creating Warehouse Product Master Data Creating Packaging Specifications Warehouse Process Types Applying Warehouse Process Types Goods Receipt Outlining Goods Receipt Processes in EWM Setting Up Availability Groups for Inventory Management (IM) Configuring Direct Putaway Applying Putaway Rules Checking Capacities Goods Issue Outlining the Goods Issue Process in EWM Applying the Stock Removal Strategies Configuring Pick Denials Combining Items in Waves Implementing Two-Step Picking Storage Control Outlining Storage Control Configuring Process-Oriented Storage Control Configuring Layout-Oriented Storage Control Warehouse Order Creation Creating Warehouse Orders Posting Changes, Stock Transfers, and Replenishment Performing Posting Changes and Stock Transfers Performing Ad Hoc Movements and Replenishment Physical Inventory Outlining the Physical Inventory Process Setting Up the Procedures for Physical Inventory Slotting Configuring the Slotting Process Post Processing Framework (PPF) Outlining the Post Processing Framework Applying the Post Processing Framework in Delivery Processing Additional course details: Nexus Humans EWM110 SAP Basic Customizing in SAP EWM training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EWM110 SAP Basic Customizing in SAP EWM course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication Perform searches across endpoint data to discover suspicious behavior Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR Create custom watchlists to detect suspicious activity in your environment Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Enterprise EDR? product and leverage its capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Search operators Analyzing processes Analyzing binaries Advanced queries Managing Watchlists Subscribing Alerting Custom watchlists Alert Processing Alert creation Analyzing alert data Alert actions Threat Hunting in Enterprise EDR Cognitive Attack Loop Malicious behaviors Response Capabilities Using quarantine Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Enterprise EDR training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Enterprise EDR course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.