• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1752 Mode courses in Cardiff delivered Live Online

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and implement Fibre Channel, zoning, and N-Port Virtualization (NPV) features on Cisco UCS Describe and implement Fibre Channel over Ethernet (FCoE) on Cisco UCS Describe Cisco UCS policies for service profiles Describe Cisco Adapter Fabric Extender (FEX) and Single Root I/O Virtualization Describe and implement Role-Based Access Control (RBAC) on Cisco UCS Describe and implement external authentication providers on Cisco UCS Manager Describe and implement key management on Cisco UCS Manager Describe Cisco UCS Director Describe and implement Cisco Intersight Describe the scripting options for Cisco UCS Manager Describe and implement monitoring on Cisco UCS Manager The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System? (Cisco UCS©) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight?; and more. Implementing Cisco UCS Storage Area Network (SAN) SAN Introduction Cisco UCS Fabric Interconnect Fibre Channels modes Named VSANs Cisco UCS Fibre Channel and FCoE Storage Connectivity Describing Cisco UCS Policies for Service Profiles Storage Policies and Profiles Basic Input Output System (BIOS) Policies Boot Policy Intelligent Platform Management Interface (IPMI) Policies Scrub Policies Maintenance Policies Describing Cisco Adapter FEX and Single Root I/O Virtualization Cisco FEX Overview Cisco Adapter FEX Single Root I/O Virtualization Implementing RBAC on Cisco UCS RBAC in Cisco UCS Users, Roles, and Privileges Functions of Organizations and Locales Effective Rights of a User Implementing External Authentication Providers Options for External Authentication Providers Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco UCS Director Cisco UCS Director Overview Policies, Virtual Data Centers, and Catalogs Cisco UCS Director Virtualization Support Managing Compute with Cisco UCS Director Cisco UCS Manager Orchestration Self-Service Portal Reporting and Monitoring in Cisco UCS Director Implementing Cisco Intersight Cisco UCS Director Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS PowerTool Cisco UCS Python Software Development Kit (SDK) Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco Intersight Cisco Intersight Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS Manager PowerTool Cisco UCS Python SDK Implementing Monitoring on Cisco UCS Manager Logging Sources in Cisco UCS Manager Port Monitoring Capabilities of Cisco UCS Manager Simple Network Management Protocol (SNMP) Security Ramifications Cisco UCS Manager Call Home Feature Lab outline Configure Pod-Specific Device Aliases Configure Zoning Configure VSANs in Cisco UCS Manager Configure Unified Ports on Cisco UCS Fabric Interconnects Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE Configure RBAC Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP) Configure a Trusted Point and Key Ring in Cisco UCS Manager Configure Cisco UCS with Cisco Intersight Configure Cisco UCS Manager Using Scripting Implement Syslog and Call Home Additional course details: Nexus Humans Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to GITHub for Developers (TTDV7551)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class assumes some prior experience with Git, plus basic coding or programming knowledge. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert team, students will explore: Getting Started with Collaboration Understanding the GitHub Flow Branching with Git Local Git Configuration Working Locally with Git Collaborating on Your Code Merging Pull Requests Viewing Local Project History Streaming Your Workflow with Aliases Workflow Review Project: GitHub Games Resolving Merge Conflicts Working with Multiple Conflicts Searching for Events in Your Code Reverting Commits Helpful Git Commands Viewing Local Changes Creating a New Local Repository Fixing Commit Mistakes Rewriting History with Git Reset Merge Strategies: Rebase This is a fast-paced hands-on course that provides you with a solid overview of Git and GitHub, the web-based version control repository hosting service. While the examples in this class are related to computer code, GitHub can be used for other content. It offers the complete distributed version control and source code management (SCM) functionality of Git as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project. Getting Started with The GitHub Ecosystem What is Git? Exploring a GitHub Repository Using GitHub Issues Activity: Creating A GitHub Issue Using Markdown Understanding the GitHub Flow The Essential GitHub Workflow Branching with Git Branching Defined Activity: Creating a Branch with GitHub Introduction Class Diagram Interaction Diagrams Sequence Diagrams Communication Diagrams State Machine Diagrams Activity Diagram Implementation Diagrams Local Git Configuration Checking your Git version Git Configuration Levels Viewing your configurations Configuring your username and email Configuring autocrif Working Locally with Git Creating a Local copy of the repo Our favorite Git command: git status Using Branches locally Switching branches Activity: Creating a New File The Two Stage Commit Collaborating on Your Code Collaboration Pushing your changes to GitHub Activity: Creating a Pull Request Exploring a Pull Request Activity: Code Review Merging Pull Requests Merge Explained Merging Your Pull Request Updating Your Local Repository Cleaning Up the Unneeded Branches Viewing Local Project History Using Git Log Streaming Your Workflow with Aliases Creating Custom Aliases Workflow Review Project: GitHub Games User Accounts vs. Organization Accounts Introduction to GitHub Pages What is a Fork? Creating a Fork Workflow Review: Updating the README.md Resolving Merge Conflicts Local Merge Conflicts Working with Multiple Conflicts Remote Merge Conflicts Exploring Searching for Events in Your Code What is GitHub? What is Git bisect? Finding the bug in your project Reverting Commits How Commits are made Safe operations Reverting Commits Helpful Git Commands Moving and Renaming Files with Git Staging Hunks of Changes Viewing Local Changes Comparing changes with the Repository Creating a New Local Repository Initializing a new local repository Fixing Commit Mistakes Revising your last commit Rewriting History with Git Reset Understanding reset Reset Modes Reset Soft Reset Mixed Reset Hard Does gone really mean gone? Getting it Back You just want that one commit Oops, I didn?t mean to reset Merge Strategies: Rebase About Git rebase Understanding Git Merge Strategies Creating a Linear History Additional course details: Nexus Humans Introduction to GITHub for Developers (TTDV7551) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to GITHub for Developers (TTDV7551) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to GITHub for Developers (TTDV7551)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Backup and Recovery (TTOR21619)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This hands-on course is geared for experienced DBAs already working with Oracle. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll learn how to: Implement backup and recovery settings and perform backup operations to the media of your choice. Move data between databases and files Use Oracle Database recovery processes to recover from media and other failures. Diagnose and repair data failures Use flashback technologies and data duplication to complement backup and recovery procedures Secure the availability of their database using backup and recovery strategies Geared for DBAs and other technical support staff, Oracle Database 19c Backup and Recovery is a hands-on course that allows you to develop appropriate backup and recovery procedures to address their business model and requirements. Throughout the course you?ll explore how to implement basic backup and recovery procedures, move data between databases and files, and employ basic monitoring procedures. You?ll also learn how to secure the availability of a database by using appropriate backup and recovery strategies, how to how to perform backup and recovery operations using RMAN, and how to use Flashback features to recover from human error. This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you?ll learn how to:Implement backup and recovery settings and perform backup operations to the media of your choice.Move data between databases and filesUse Oracle Database recovery processes to recover from media and other failures.Diagnose and repair data failuresUse flashback technologies and data duplication to complement backup and recovery proceduresSecure the availability of their database using backup and recovery strategies Backup Methods User Managed Backups Oracle Managed Backups Types of Failures Types of Recoveries Recovery Configuration Configuring the Database for Archivelog Configuring the Database for No-Archivelog Configuring the Flash Recovery Area Configuring RMAN RMAN Default Settings Command Line Enterprise Manager RMAN Backups Full RMAN Backup Compressed Backups Uncompressed Backups Partial RMAN Backup Incremental Backups Change Tracking File Managing Backups Backup Reports Backup Maintenance Backup Catalog Backup Crosscheck RMAN Complete Recovery RMAN Complete Recovery Database Recovery Tablespace Recovery Datafile Recovery RMAN In-Complete Recovery Time Based Recovery Sequence Based Recovery SCN Based Recovery Non-Database File Recovery Spfile Recovery Controlfile Recovery Incremental Recovery Flash Recovery Area for a Fast Recovery User Managed Backup Configuring User Managed Backups Perform a User Managed Backup User Managed Recovery User Managed Complete Recovery User Managed Incomplete Recovery Configuring Flashback Flashback Query Flashback Drop Flashback Database Performing Flashback Recoveries Flashback Query Flashback Drop Flashback Transaction Query Flashback Versions Query Performing Flashback Database Determining the FRA Size FRA Retention Performing a Flashback Database RMAN Duplicate Command Setting up for a Duplicate Database Creating the Duplicate spfiles Performing the Duplicate Command. RMAN Recovery Catalog Configuring for the Recovery Catalog Creating the Recovery Catalog Backups with the Recovery Catalog Registering the Database with the Recovery Catalog Performing Backups with the Recovery Catalog Recoveries with the Recovery Catalog Identifying Type of Recoveries with the Recovery Catalog Performing Recoveries with the Recovery Catalog Recovery Catalog Maintenance Registering Additional Databases with the Recovery Catalog Cataloging Additional Backups with the Recovery Catalog Recovery Catalog Scripts DataPump Configuring Datapump DataPump Exports DataPump Imports Tuning RMAN RMAN Sessions RMAN Channels RMAN Job Progress Additional course details: Nexus Humans Oracle 19c Database Backup and Recovery (TTOR21619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Backup and Recovery (TTOR21619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Backup and Recovery (TTOR21619)
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Captivate 2019 - Beyond The Essentials

By Nexus Human

Duration 2 Days 12 CPD hours Overview - You will learn advanced Adobe Captivate concepts. - You will learn to create highly interactive software simulation and to control the text that appears in the recording?s text captions by editing Captivates text capture templates. - You will create responsive lessons (using Fluid Boxes and Breakpoints) that automatically reflow to fit just about any kind of display including desktops, laptops, tablets, and smart phones. - Learn new features that Captivate now supports; such as, Virtual Reality with 360-degree images and videos along with interactive videos. - Fine-tune your Captivate production skills by leveraging object styles, master slides, themes, and advanced actions. - Engage your learners by adding variables, widgets, and learner interactions (including drag and drop) to your eLearning. - Learn to create object styles, apply them globally, and import and export them. Knock large projects down to size by learning to create branch groups. - Create branching scenarios that allow learners to plot their own path through your course. - You will also learn to create templates. - Ensure your eLearning can be used by people with disabilities by adding such 508-compliant features as accessibility text, keyboard shortcuts, and closed captions. - Enable Captivates reporting features and, along the way, learn about Learning Management Systems, SCORM, SCOs, Manifests, and content packages. A course that teaches the higher-end, more advanced functionality of Adobe Captivate 2019. 1 - INTERACTIVE SOFTWARE SIMULATIONS AND CAPTION PRE-EDITING Rehearse a Script Set Recording Preferences Record a Simulation Edit a Text Capture Template 2 - OBJECT STYLES, PROJECT SHARING, AND BRANCHING Create a New Style Apply an Object Style Globally Export and Import an Object Style Name a Slide Copy/Paste Project Assets Use Buttons to Create a Branch Explore the Branching View Create a Branch Group 3 - VARIABLES AND WIDGETS Add Project Information Insert a System Variable Edit a System Variable Create a User Variable Use a Variable to Gather Learner Data Insert and Format a Widget 4 - INTERACTIVE VIDEOS AND VIRTUAL REALITY Insert an Interactive Video Add Bookmarks Add Slide Overlays Create a Virtual Reality Project Add a Text Hotspot Add an Audio Hotspot Add a Quiz to a Virtual Reality Project 5 - INTERACTIONS Insert a Process Circle Create a Basic Drag and Drop Interaction Manage Drag and Drop Buttons and Write Captions Create a ?Trick? Retry Slide Explore an Advanced Drag and Drop Project Create an Advanced Drag and Drop Interaction Change the States of a Smart Shape Use States to Swap Images 6 - ACCESSIBLE ELEARNING Set Document Information Enable Accessibility Add Accessibility Text to Slides Import Slide Audio Add Shortcut Keys Add Closed Captions Set a Tab Order 7 - ADVANCED ACTIONS Use a Completed Action Name Objects Create a Mask Control Object Visibility Create a Standard Advanced Action, Attach an Action to a Button Group Timeline Objects Create a Variable Create a Conditional Action Create Decision Blocks 8 - PROJECT TEMPLATES AND MASTER SLIDES Work with the Main Master Slide Work with Content Masters Apply a Master to Filmstrip Slides Edit a Master Apply a Theme Create a Custom Theme Review a Template Create a Project Based on a Template Create a Project Template 9 - RESPONSIVE PROJECTS Customize Breakpoints Save a Standard Project As Responsive Insert and Name Fluid Boxes Resize Fluid Boxes Add Content to Fluid Boxes Switch Modes Use the Position Inspector Modify a Single Breakpoint Exclude from View Add a New Breakpoint Position and Link Objects Edit Breakpoint Object Styles 10 - REPORTING RESULTS Set Quiz Reporting Options Create a Manifest File Report a Button Interaction Adjust Slide Object Interaction Preview in SCORM Cloud Publish a Content Package Create an Inquisiq LMS Account Create an LMS Course Attach a Lesson to a Course Test an eLearning Course Additional course details: Nexus Humans Adobe Captivate 2019 - Beyond The Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Captivate 2019 - Beyond The Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Adobe Captivate 2019 - Beyond The Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry