• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1908 Object courses in Cardiff delivered Live Online

18th July Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS

5.0(3)

By I Am In Print

LOOKING FOR: CHILDREN'S: PICTURE BOOK TEXTS, NON-FICTION, POETRY Lucy Brownridge is Editorial Director at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She specialises in highly illustrated picture books and non-fiction (including poetry) for children. She has commissioned and edited books which have gone on to win the Carnegie Awards, The British Book Awards, the Klaus Flugge Prize, the Blue Peter Prize and have been translated into over 30 languages. She has been editor to Alan Ahlberg, Quentin Blake, Mariajo Ilustrajo, Yuval Zommer and Children’s Laureate Joseph Coelho among many others. She is the author of The Fantastical Safari and The Cat Family series, and many other books for children. She is interested in the history of illustrated children’s books and is always looking for innovative ways to use the book format. ABOUT YOU Include a covering letter, in a Word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. PICTURE BOOKS Please send one or two (max) full manuscripts, in a Word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? NON-FICTION PROPOSALS Please send a paragraph explaining your idea, a contents list, if appropriate, and a sample piece of text. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 11th July 2025

18th July Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS
Delivered Online + more
£72

Microsoft Access for Office 365: Part 3

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Students taking this course are database administrators or prospective database administrators who have experience working with Access for Microsoft 365 and need to learn advanced skills. Overview In this course, you will manage an Access database and add complex database features to improve its usability, efficiency, performance, and security. You will: Share data across applications. Use action, unmatched, and duplicate queries to manage data. Create complex reports and forms. Use macros to improve user interface design. Use VBA to extend database capabilities. Perform database management tasks such as backup, compacting, repairing, performance analysis, checking object dependencies, and documenting. Implement security strategies and distribute a database to multiple users. You've covered many of the basic functions of Microsoft© Access©, and now you're ready to learn advanced Access features such as database management, advanced form design, packaging a database, encrypting a database, preparing a database for multiple-user access, and more. Knowledge of these features separates database professionals from the casual database users or occasional designers.This course is the third part of a three-course series that covers the skills needed to perform basic database design and development in Access.Microsoft© Access© for Office 365?: Part 1 : Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports.Microsoft© Access© for Office 365?: Part 2 : Focuses on optimization of an Access database, including optimizing performance and normalizing data; data validation; usability; and advanced queries, forms, and reports.Microsoft© Access© for Office 365?: Part 3 (this course): Focuses on managing the database and supporting complex database designs, including import and export of data; using action queries to manage data; creating complex forms and reports; macros and Visual Basic for Applications (VBA); and tools and strategies to manage, distribute, and secure a database.This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Importing and Exporting Table Data Topic A: Import and Link Data Topic B: Export Data Topic C: Create a Mail Merge Lesson 2: Using Queries to Manage Data Topic A: Create Action Queries Topic B: Create Unmatched and Duplicate Queries Lesson 3: Creating Complex Reports and Forms Topic A: Create Subreports Topic B: Create a Navigation Form Topic C: Show Details in Subforms and Popup Forms Lesson 4: Creating Access Macros Topic A: Create a Standalone Macro to Automate Repetitive Tasks Topic B: Create a Macro to Program a User Interface Component Topic C: Filter Records by Using a Condition Topic D: Create a Data Macro Lesson 5: Using VBA to Extend Database Capabilities Topic A: Introduction to VBA Topic B: Use VBA with Form Controls Lesson 6: Managing a Database Topic A: Back Up a Database Topic B: Manage Performance Issues Topic C: Document a Database Lesson 7: Distributing and Securing a Database Topic A: Split a Database for Multiple-User Access Topic B: Implement Security Topic C: Convert an Access Database to an ACCDE File Topic D: Package a Database with a Digital Signature

Microsoft Access for Office 365: Part 3
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

BW362 SAP BW on SAP HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technology Consultants Overview Enables you to implement and maintain SAP BW powered by SAP HANA.Outlines advantages of the new SAP 'In-Memory' database foundation for SAP BW.Explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW.Introduces the new SAP architecture framework of LSA++ and provides guidelines on how to convert your existing EDW-architecture into this new concept.Explains native HANA modeling and how both, HANA information views as well as BW InfoProviders, can complement each other in so-called 'mixed scenarios'. In this course, students gain the knowledge to enable themselves to implement and maintain SAP BW powered by SAP HANA. The course explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW. Getting Started SAP HANA Basics SAP BW Basics SAP HANA BW Modeling Tools SAP HANA Native Modeling Migration to SAP BW on HANA Migration Strategies and Tools SAP BW Migration Cockpit BW on HANA Data Management Multi-Temperature Data Management Optimizing BW Data Management based on Dynamic Tiering and Non- Active Concept Optimizing BW Data Management based on Nearline-Storage Optimization Areas in BW on HANA HANA-Optimized Data Modeling: InfoCubes HANA-Optimized Data Modeling: Advanced DataStore-Objects HANA-Optimized Data Modeling: CompositeProviders HANA-Optimized Data Staging HANA-Optimized Analytic Manager HANA-Optimized Analysis Processes Modeling with SAPïs Reference Architecture LSA++ Review of Layered Scalable Architecture (LSA) From LSA to LSA++: Streamline Core Layers LSA++: Open Operational Data Store Layer (Open ODS Views) LSA++: Agile Data Mart & BW Workspace Layer Hybrid Modeling in Mixed Scenarios Generation of HANA-Views of BW InfoProviders Mixed Scenarios SAP HANA Live HANA-Optimized BI Content Data Provisioning into SAP HANA and SAP BW Overview of Data Provisioning Methods to SAP HANA SLT Replication into SAP HANA SLT Replication into SAP BW Operational Data Provisioning into SAP BW DB-Connect and Open Hub Destination Additional Enhancements of BW 7.40 InfoObject Enhancements Authorization Enhancements Process Chain Monitoring HANA-Optimized BW Search HANA-Optimized BW Planning Obsolete BW Object Types Mobile Enablement Enhancements SAP HANA vs. BW Accelerator Summary & Outlook New Transactions and BW on HANA Roadmap Additional course details: Nexus Humans BW362 SAP BW on SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW362 SAP BW on SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BW362 SAP BW on SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Authors Overview Please refer to course overview This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting The Welcome page Consume report content Interactive filtering Working with reports Dimensionally modeled relational dataUse personal data sources and data modules Upload personal data Upload custom images Using navigation paths in a data module Examine list reports Group data Format columns Include headers and footers Aggregate fact data Identify differences in aggregation Multiple facts and repeated information Use shared dimensions to create multi-fact queries Present repeated information Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Work with crosstab data Format, sort, and aggregate a crosstab Create discontinuous crosstab reportsCreate visualization reports Visualization categories Customize visualizations Client side visualizations Enhanced map visualizations Focus reports using filters Create filters to narrow the focus Use advanced detail filters Apply a filter with aggregation Use summary filters Focus reports using prompts Examine parameters and prompts Create a parameter for a report item Add a prompt page Add a prompt item to a report Identify a prompt type Create a cascading prompt Use calculations What are calculations Add Date and Time functions Add string functions Display prompt selections in report titles Customize reports with conditional formatting Three steps for conditional formatting Create a variable Assign the variable to a report object Format based on the conditional value Conditionally render report objects Drill-through definitions Navigate to related data Enhance report layout View the structure of a report Use Guided report layout Force page breaks Create horizontal pagination Modify the report structure Format objects across reports Use additional report-building techniques Enhance a report design Add objects to reports Convert a list to a crosstab Explore reuse Additional course details: Nexus Humans B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry

Ethereum Training - Blockchain Development Bootcamp

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Programmers Application DevelopersSystem Architects Network ArchitectsNetwork Security Architects IT Professionals w/programming experience Overview Those who attend the Ethereum Development course and pass the exam certification will have a demonstrated knowledge of:An excellent overall understanding of the Ethereum architecture and Solidity language.All functional components (including smart contracts) required to develop an Ethereum Blockchain.The understanding of how to instantiate an Ethereum application on the network.An in-depth understanding of how transactions are created and implemented on an Ethereum network. This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum?s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development. The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. What is Blockchain and Smart Contracts? What is Blockchain and how does it work? Bitcoin vs Ethereum Smart Contract How you can use Smart Contracts? Advantages of Smart Contracts Solidity LAB TASK Types of Variables in Solidity Public and Private Code Public Variables and Functions Private Variables and Functions Internal Functions External Functions Smart Contract Constructors Constant Variables Setting Variables LAB CHALLENGE Smart Contracts With WEB3.JS LAB Installing & Running the Ethereum TestRPC Installing Web3.js Changing the Environment in Remix Creating the UI Using Web3.js to Connect & Interact with the Smart Contract SOLUTION LAB CHALLENGE Smart Contract Events With WEB3.JS AIM LAB The Current Contract Defining the Smart Contract Event Updating the UI LAB CHALLENGE Functions, Mappings and Structs THEORY Functions Mappings Structs LAB The Smart Contract Creating a Modifier Using the Modifier Web3 UI?s Modifier Handling LAB Creating a Struct Creating the Mapping Map Addition Get from the Mapping The Full Contract Count from Map LAB CHALLENGE Inheritance and Deployment THEORY Object-oriented programming Inheritance LAB Current Contract Creating a Base Contract Changing from Strings to bytes Continuing the Project Installing MetaMask Deploy Contract to the Ropsten Test Network LAB Update the HTML Form Update the JavaScript Using the App LAB CHALLENGE Embark Framework and It's Deployment Blockchain (Ethereum) Decentralized Storage (IPFS) Decentralized Communication Web Technologies LAB Installing Embark Framework Hello World with Embark Framework First Contract Deployment with Embark Framework Solidity Smart Contracts Testing THEORY What is Software Testing? LAB LAB CHALLENGE Contracts Management With Factories THEORY Factory LAB LAB CHALLENGE IPFS Files Hosting THEORY IPFS FILES HOSTING LAB 1. Get your hosting server 2. Install IPFS on the Server LAB CHALLENGE End to End Development of DAPP AIM LAB Setup the Project Program the Smart Contract Create the Front-end of the application Deploy the App with IPFS LAB CHALLENGE

Ethereum Training - Blockchain Development Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Online Adobe Photoshop Training for Beginners

By Greta Powell Training

Adobe Photoshop Training Course for Beginners. A one to one private Photoshop Course on a 24 /7 basis to suit your hours.

Online Adobe Photoshop Training for Beginners
Delivered OnlineFlexible Dates
£200

55039 Windows PowerShell Scripting and Toolmaking

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for administrators in a Microsoft-centric environment who want to build reusable units of automation, automate business processes, and enable less-technical colleagues to accomplish administrative tasks. Overview Describe the correct patterns for building modularized tools in Windows PowerShell Build highly modularized functions that comply with native PowerShell patterns Build controller scripts that expose user interfaces and automate business processes Manage data in a variety of formats Write automated tests for tools Debug tools This course covers advanced Windows PowerShell topics, with an emphasis on building reusable tools. Students are introduced to workflow, engage in best practices, and learn a variety of script development and toolmaking techniques. Tool Design Tools do one thing Tools are flexible Tools look native Start with a Command Why start with a command? Discovery and experimentation Build a Basic Function and Module Start with a basic function Create a script module Check prerequisites Run the new command Adding CmdletBinding and Parameterizing About CmdletBinding and common parameters Accepting pipeline input Mandatory-ness Parameter validation Parmeter aliases Emitting Objects as Output Assembling information Constructing and emitting output Quick tests An Interlude: Changing Your Approach Examining a script Critiquing a script Revising the script Using Verbose, Warning, and Informational Output Knowing the six channels Adding verbose and warning output Doing more with verbose output Informational output Comment-Based Help Where to put your help Getting started Going further with comment-based help Broken help Handling Errors Understanding errors and exceptions Bad handling Two reasons for exception handling Handling exceptions in our tool Capturing the actual exception Handling exceptions for non-commands Going further with exception handling Deprecated exception handling Basic Debugging Two kinds of bugs The ultimate goal of debugging Developing assumptions Write-Debug Set-PSBreakpoint The PowerShell ISE Going Deeper with Parameters Parameter positions Validation Multiple parameter sets Value from remaining arguments Help messages Aliases More CmdletBinding Writing Full Help External help Using PlatyPs Supporting online help ?About? topics Making your help updatable Unit Testing Your Code Sketching out the test Making something to test Expanding the test Going further with Pester Extending Output Types Understanding types The Extensible Type System Extending an object Using Update-TypeData Analyzing Your Script Performing a basic analysis Analyzing the analysis Publishing Your Tools Begin with a manifest Publishing to PowerShell Gallery Publishing to private repositories Basic Controllers: Automation Scripts and Menus Building a menu Using UIChoice Writing a process controller Proxy Functions A proxy example Creating the proxy base Modifying the proxy Adding or removing parameters Working with XML Data Simple: CliXML Importing native XML ConvertTo-XML Creating native XML from scratch Working with JSON Data Converting to JSON Converting from JSON Working with SQL Server Data SQL Server terminology and facts Connecting to the server and database Writing a query Running a query Invoke-SqlCmd Thinking about tool design patterns Design tools that use SQL Server for data storage Final Exam Lab problem Break down the problem Do the design Test the commands Code the tool

55039 Windows PowerShell Scripting and Toolmaking
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Sales engineers Account managers Networking engineers Technical and non-technical audiences Overview After taking this course, you should be able to: Understand the role that programmable infrastructure is having on the transition to the digital enterprise Describe Cisco DNA, its components and benefits, and explain a few use cases Describe the different technologies and solutions within the Cisco programmable infrastructure portfolio Describe Cisco DNA Center REST APIs Understand the functionality provided by Cisco WebEx Teams Describe Cisco CMX, services, and related APIs Describe the importance of DevOps culture within network operations in the shift to becoming a digital enterprise The Programming Use Cases for Cisco Digital Network Architecture (DNAPUC) v1.0 course highlights the shift toward the digital enterprise and examines the components, benefits, and use cases of Cisco Digital Network Architecture (Cisco DNA?) in an enterprise environment. You will learning about key platforms including Cisco© DNA Center, Cisco WebEx Teams?, Cisco Connected Mobile Experiences (CMX), and their related APIs. This course also covers open standards, tools, and network APIs that you can use to complement the Cisco DNA software portfolio, including Python, JavaScript Object Notation (JSON), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Next Generation (YANG). Understanding Programmable Infrastructure Digital Enterprise Four Pillars of Digitization Network Programmability and Automation What Should Be Automated? Quantifying Programmability and Automation for the Business Network Programmability and Automation Use Cases Introducing Cisco DNA Cisco DNA Overview Cisco DNA Components Benefits of Cisco DNA Cisco DNA Use Cases Describing Programmable Infrastructure Cisco Programmability Options Data Center Infrastructure Enterprise Network Programmability Streaming Telemetry Collaboration Management, Monitoring, and Analytics Describing Network APIs How APIs Enable Business Automation API Overview Data Encoding with JSON and XML RESTful APIs RESTCONF and NETCONF Overview Data Modeling with YANG Describing Cisco DNA Center APIs Cisco DNA Center Overview Cisco DNA Center Automation Enterprise Benefits Cisco DNA Center Applications and Use Cases Cisco DNA Center REST API Overview Case Study: Network Automation at Symantec Describing Cisco Collaboration APIs Cisco Webex Teams Overview Cisco Webex Teams Business Benefits Cisco Webex Teams API Overview Describing Cisco Mobility APIs Cisco CMX Overview Cisco CMX Programmability Business Benefits Cisco CMX Mobility Services API Overview Case Study: Victoria University and Cisco CMX Implementing DevOps Culture Within Network Operations Transition to DevOps CALMS Model (Culture, Automation, Lean, Measurement, Sharing) Role of Cisco Technology in the Transition to DevOps Additional course details: Nexus Humans Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC)
Delivered OnlineFlexible Dates
Price on Enquiry