Duration 3 Days 18 CPD hours This course is intended for The target audience for this course includes: Software testers (both technical and user acceptance testers), Test analysts, Test engineers, Test consultants, Software developers, Managers including test managers, project managers, quality managers. Overview By the end of this course, an attendee should be able to: perform effective testing of software, be aware of techniques and standards, have an awareness of what testing tools can achieve, where to find more information about testing, and establish the basic steps of the testing process. This is an ISTQB certification in software testing for the US. In this course you will study all of the basic aspects of software testing and QA, including a comprehensive overview of tasks, methods, and techniques for effectively testing software. This course prepares you for the ISTQB Foundation Level exam. Passing the exam will grant you an ISTQB CTFL certification. Fundamentals of Testing What is Testing? Typical Objectives of Testing Testing and Debugging Why is Testing Necessary? Testing?s Contributions to Success Quality Assurance and Testing Errors, Defects, and Failures Defects, Root Causes and Effects Seven Testing Principles Test Process Test Process in Context Test Activities and Tasks Test Work Products Traceability between the Test Basis and Test Work Products The Psychology of Testing Human Psychology and Testing Tester?s and Developer?s Mindsets Testing Throughout the Software Development Lifecycle Software Development Lifecycle Models Software Development and Software Testing Software Development Lifecycle Models in Context Test Levels Component Testing Integration Testing System Testing Acceptance Testing Test Types Functional Testing Non-functional Testing White-box Testing Change-related Testing Test Types and Test Levels Maintenance Testing Triggers for Maintenance Impact Analysis for Maintenance Static Testing Static Testing Basics Work Products that Can Be Examined by Static Testing Benefits of Static Testing Differences between Static and Dynamic Testing Review Process Work Product Review Process Roles and responsibilities in a formal review Review Types Applying Review Techniques Success Factors for Reviews Test Techniques Categories of Test Techniques Choosing Test Techniques Categories of Test Techniques and Their Characteristics Black-box Test Techniques Equivalence Partitioning Boundary Value Analysis Decision Table Testing State Transition Testing Use Case Testing White-box Test Techniques Statement Testing and Coverage Decision Testing and Coverage The Value of Statement and Decision Testing Experience-based Test Techniques Error Guessing Exploratory Testing Checklist-based Testing Test Management Test Organization Independent Testing Tasks of a Test Manager and Tester Test Planning and Estimation Purpose and Content of a Test Plan Test Strategy and Test Approach Entry Criteria and Exit Criteria (Definition of Ready and Definition of Done) Test Execution Schedule Factors Influencing the Test Effort Test Estimation Techniques Test Monitoring and Control Metrics Used in Testing Purposes, Contents, and Audiences for Test Reports Configuration Management Risks and Testing Definition of Risk Product and Project Risks Risk-based Testing and Product Quality Defect Management Tool Support for Testing Test Tool Considerations Test Tool Classification Benefits and Risks of Test Automation Special Considerations for Test Execution and Test Management Tools Effective Use of Tools Main Principles for Tool Selection Pilot Projects for Introducing a Tool into an Organization Success Factors for Tools Additional course details: Nexus Humans ISTQB Software Testing Certification Training - Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Software Testing Certification Training - Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.
Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced administrators and platform developers as well as solution, enterprise, and technical architects responsible for designing or building integration solutions on the Salesforce Platform. It's also designed for project or program managers looking to understand the big picture of integration in order to better manage their projects and programs. Ideally, you hold the Salesforce Administrator, Salesforce App Builder, or Salesforce Platform Developer I credential and/or are knowledgeable about standard and custom objects; how to work with flows and Process Builder; how to navigate Salesforce, Lightning Components, and Schema Builder; and Apex basics such as creating a Class and Anonymous Blocks. This class is recommended for anyone looking to earn their Salesforce Certified Integration Designer credential. Overview When you complete this course, you will be able to: Identify integration requirements by asking relevant integration questions to business stakeholders. Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes, Data Virtualization) to design integration solutions. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, Outbound Messaging, Callouts, and Salesforce Connect) to build integration solutions. Explore architectural concepts and the big picture thinking of how to integrate on the Salesforce Platform. In this 3-day class, our Salesforce integration experts will demonstrate how to build solutions that provide a single view of your customers. You?ll learn about integration capabilities and the considerations that should be made when architecting an integration solution. Through a combination of demos, discussions, and hands-on exercises, you?ll design and build secure, scalable, and high-performing integration solutions that seamlessly surface the information that matters most Integration Overview Understand the Importance of Integration Explore Integration Architecture Explore the Meaning of Single View of the Customer Explore the Meaning of System Landscape Understand the Role of Enterprise Service Bus (ESB) and Extract Transform Load (ETL) in System Landscape Integration Capabilities Introduction to Salesforce APIs Create External Applications Using SOAP API Build Mobile Applications Using REST API Work with Large Data Volumes Using BULK API Build Event-Driven Applications Using Streaming API Build Event-Driven Applications Using Platform Events Build Event-Driven Applications Using Change Data Capture Send Data from Salesforce to External Applications Using Outbound Message Call External APIs Programmatically Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Call External APIs Declaratively Using External Services Integration Patterns Understand Use Cases for a Request and Reply Pattern Understand Use Cases for a Fire and Forget Pattern Understand Use Cases for a Batch Data Synchronization Pattern Understand Use Cases for a Remote Call-In Pattern Understand Use Cases for a UI Update Based on Data Changes Pattern Understand Use Cases for a Data Virtualization Pattern Integration Security Explore Two-Way Transport Layer Security (TLS) Understand When to Use Remote Site Settings Understand the Benefits of Using Named Credentials Understand Certificates Encrypt Your Data at Rest Using Salesforce Shield Platform Encryption Advanced Integration Discussions Design Solutions for Performance Design Solutions for Scale Review Integration Regulatory Requirements Review Integration Best Practices Case Study Draw a System Landscape Diagram Evaluate Business Needs Translate Needs to Integration Requirements Design an Integration Solution Build an Integration Solution Maintain an Integration Solution Additional course details: Nexus Humans Salesforce Design and Build Integration Solutions (ARC101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Design and Build Integration Solutions (ARC101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Customers configuring and maintaining CUCM 8.x, 9.x, 10.x, 11.0, or 12.x. PBX System Administrators transitioning to CUCM administration IP networking professionals taking on responsibility for CUCM administration Workers being cross-trained for CUCM administration coverage The secondary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) 12.x (or earlier version) system and its environment Configure CUCM to support IP Phones in multiple locations Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Understand User Web Page functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Understand the capabilities of and demonstrate the Bulk Administration Tool Understand the SMART Licensing model for Cisco Unified Communications Understand and demonstrate the use of the Unified Reporting tool Understand and demonstrate the use of the Dialed Number Analyzer Communications Manager Administration for Version 12.5 (CMA v12.5) is an instructor-led course presented to system administrators and customers involved with the day-to-day operation of the Cisco Unified Communications Manager product. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan and implementing Features. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the Cisco Unified Communications Manager software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x. The concepts and the lab tasks are the same for most of the Cisco Unified Communications Manager software versions CUCM System Basics Introduction to IP Telephony Traditional Voice vs. IP Telephony Clustering Overview Intra-Cluster Communications CUCM Redundancy Options Deployment Models Campus (Single Site) Deployment Centralized Call Processing Deployment Distributed Call Processing Deployment Clustering over the IP WAN Call Processing Deployment Hybrid Call Processing Deployment Basics of CUCM Configuration Administrative Interfaces Administration and Serviceability Unified Reporting and the Enterprise License Manager Disaster Recovery System and Unified OS Administration Navigation Bar Command Line Interface Server Redundancy: CM Groups CM Group Configuration Date/Time Group Regions and Codecs Locations Device Pool Configuration Service Parameters Configuration Enterprise Parameters Configuration Supporting Phones and Users Configuring CUCM to Support Phones Cisco Unified IP Phone Model Ranges Specialized Cisco IP 89xx and 99xx phones Cisco Jabber Client Phone Button Templates Softkey Template Cisco IP Phone Registration Device Defaults Phone Configuration Manual Phone Configuration Auto-Registration Self-Provisioning Using the Bulk Administration Tool (BAT) Deploying new phones and users Overview of the Auto-Register Phone Tool Configuring CUCM to Support Users Understanding CUCM Users Manual User Creation User Import with BAT Importing Users with LDAP Sync LDAP Authentication Understanding User Administration Configuring User Administration Working with Access Control Groups Assigning End Users to Access Control Groups User Web Pages Understanding the Dial Plan Dial Plan Overview Introduction to the Dial Plan Understanding Dial Plan Components Route Lists, Route Groups and Devices Call Routing Understanding Digit Analysis Basics of Dial Plan Configuration Basics of the Dial Plan Dial Plan Configuration Translation Patterns Route Plan Report Advanced Dial Plan Configuration Understanding Digit Manipulation External Phone Number Masks Transformation Masks Discard Digits Instructions: PreDot Class of Control Overview of Class of Control Partitions and Calling Search Space Traditional vs. Line/Device Approach Configuring Partitions and CSSs Time of Day Routing PLAR Application Forced Authorization Codes CUCM Features Media Resources Overview of Media Resources Conference Bridge Music on Hold Transcoder Annunciator Overview of Media Resource Management Configuring Media Resources User Features Configuring Call Coverage in Cisco Unified Communications Manager Call Coverage in Cisco Unified Communications Manager Hunt Group Overview Hunt Group Configuration Final Forwarding Shared Lines Call Pickup Directed and Group Call Pickup Call Park Lab Outline Configuring the System to Support Cisco IP Phones Creating and Associating Users Configuring Basic Dial Plan Elements Configuring Complex Dial Plan Elements Implementing Class of Control Configuring Media Resources Configuring Hunt Groups and Call Coverage Configuring Call Pickup and Call Park
The 'golden rule' of negotiation is simple - don't! But life's rarely that simple and very often we do have to negotiate, particularly if we want to win the business and especially if we want to win it on our terms. Such negotiations are crucial. We need to prepare for them. We need a strategy, and the skills to execute it. Does your team have a structured approach? Is it flawlessly executed, every time? Or is there room for improvement? This programme will help them master the six fundamentals of closing better business: Manage all these elements well and you will win more business, more profitably. This course will help participants: Negotiate from a position of partnership, not competition Deal more effectively and profitably with price objections Identify and practise successful sales negotiating skills Identify strengths and weaknesses as a sales negotiator Understand different types of buyer behaviour Learn to recognise negotiating tactics and stances Apply a new and proven structure to their business negotiations Identify and adapt for different behavioural styles Be alert to unconscious (non-verbal) communication Prepare and present a proposal at a final business negotiation stage Project confidence and exercise assertiveness in all sales negotiations 1 Planning for successful business negotiations This session introduces the concept of business negotiation and looks at its importance in the context of the participants' roles and activities. It briefly examines why we negotiate and the dynamics involved. Session highlights: What kind of a negotiator are you? Negotiation skills self-assessment and best practice How to establish roles and responsibilities for both parties How to identify and set objectives for both buyer and seller How to research and establish the other person's position (business negotiation stance) 2 How to structure your negotiations This module presents an eight-step framework or structure for use in negotiations and considers how best to prepare and plan your negotiations within the context of a supplier/customer relationship or business cycle. It also includes a brief review of legal responsibilities and what constitutes a 'deal'. Session highlights: Learn and apply a formal structure to use when negotiating How to establish short- and longer-term objectives and opportunities How best to plan, prepare and co-ordinate a major business negotiation meeting, or on-going negotiations Understanding of basic legal and organisational requirements 3 Verbal negotiation skills This session examines the human and communication dynamics inherent in any negotiation situation. It emphasises the importance of professional skills in preparing for a negotiation by identifying needs, wants and requirements accurately and by qualifying the competitive and organisational influences present. Session highlights: How to fully 'qualify' the other party's needs, requirements and constraints during the negotiation process by using advanced questioning and listening skills How to pre-empt negotiation objections by promoting and gaining commitment to options, benefits, value and solutions How best to propose and suggest ideas, using drawing-out skills 4 Non-verbal negotiation skills This module highlights how different personal styles, corporate cultures and organisation positions can influence events, and demonstrates practical methods for dealing with and controlling these factors. It also examines key principles of body language and non-verbal communication in a practical way. Session highlights: Gaining rapport and influencing unconsciously Understanding the importance of non-verbal communication; reading other people's meaning and communicating effectively as a result Ensure that non-verbal behaviour is fully utilised and observed to create maximum impact and monitor progress (eg, buying signals) Recognising that business negotiations are precisely structured and agreements gained incrementally 5 Proposing and 'packaging' This session highlights how best to present and package your proposal. It looks at how to pre-empt the need for negotiating by creating minor-options and 'bargaining' points, as well as how to manage the expectations and perceptions of the customer or buyer. Session highlights: How to identify the key variables that can be negotiated The power and use of 'authority' within your negotiations How to structure and present your proposal, ideas or quotation to best effect The importance of when and how to identify and influence buyer's objections 6 Dealing with price This module highlights how to best present and package price within your proposal or negotiation. In most cases, price has more to do with psychology than affordability and preparation and careful handling are essential. Session highlights: The three reasons that people will pay your asking price How to set price in a competitive market The key differences between selling and negotiating Ten ways to present price more effectively and persuasively 7 Getting to 'Yes': tactics and strategies There are many different tactics and strategies common to successful negotiators. This session looks at those that are most appropriate to the participants' own personal styles and situations. The importance of 'follow-through' is also explained and how to deal with protracted or 'stale-mate' business negotiations. Session highlights: How to negotiate price and reduce discounting early in the process How to recognise negotiating tactics and strategies in your customer or supplier Key strategies, techniques and tactics to use in negotiation The importance of follow-through and watching the details How to deal with stalled business negotiations or competitor 'lock-out' 8 Case studies and review This session examines a number of different situations and participants discuss ways to approach each. This will allow learning to be consolidated and applied in a very practical way. There will also be a chance to have individual points raised in a question and answer session. Session highlights: Case studies Question and answer Planning worksheet Negotiation 'toolkit' and check-list 9 Personal action plans Session highlights: Identify the most important personal learning points from the programme Highlight specific actions and goals Flag topics for future personal development and improvement
Duration 2 Days 12 CPD hours This course is intended for The introductory-level course is geared for software developers, project managers, and IT professionals seeking to enhance their understanding and practical skills in version control and collaboration using GitLab. It's also well-suited for those transitioning from another version control system to GitLab, or those responsible for software development lifecycle within their organization. Whether you are an individual looking to boost your proficiency or a team leader aiming to drive productivity and collaboration, this course will provide the necessary expertise to make the most of GitLab's capabilities. Overview This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you'll: Gain a firm understanding of the fundamentals of Git and GitLab, setting a solid foundation for advanced concepts. Learn to effectively manage and track changes in your code, ensuring a clean and reliable codebase. Discover ways to streamline your daily tasks with aliases, stashing, and other GitLab workflow optimization techniques. Develop skills in creating, merging, and synchronizing branches, enabling seamless collaboration and version control. Equip yourself with the knowledge to use Git as a powerful debugging tool, saving time and effort when troubleshooting issues. Understand the basics of continuous integration and continuous deployment (CI/CD) in GitLab, helping you automate the software delivery process. Immerse yourself in the dynamic world of GitLab, a leading web-based platform for version control and collaboration, through our intensive two-day course, GitLab Quick Start. Version control systems, such as GitLab, are the backbone of modern software development, enabling teams to work cohesively and maintain a structured workflow. By mastering GitLab, you can improve efficiency, encourage collaboration, and ensure accuracy and reliability within your projects, adding significant value to your organization. Throughout the course you?ll explore various aspects of GitLab, starting from the fundamental principles of source code management to advanced concepts like rebasing and continuous integration/design. Key topics covered include Git and GitLab basics, reviewing and editing commit history, mastering GitFlow and GitLab Flow, branching and merging strategies, and understanding remote repositories. You'll also learn how to utilize Git as a debugging tool and explore the power of GitLab's built-in CI/CD capabilities. The core value of this course lies in its practical application. You'll learn how to effectively manage changes in code with GitLab, allowing you to maintain audit trails, create reproducible software, and seamlessly move from another version control system. Then you?ll learn how to enhance your workflow efficiency using aliases for common commands, saving changes for later use, and ignoring build artifacts. You?ll also explore GitLab's CI/CD, which will enable you to automate your software delivery process. These hands-on labs will walk you through creating, merging, and synchronizing remote branches, configuring Git, troubleshooting using Git as a debugging tool, and setting up GitLab Runner for CI/CD. Each lab is designed to simulate real-world projects, offering you a first-hand experience in managing and contributing to a version control system like GitLab. Introduction to Source Code Management The Core Principles of Change Management The Power to Undo Changes Audit Trails and Investigations Reproducible Software Changing code-hosting platform Moving from another version control system Git and GitLab Introduction and Basics Introduction to Git GitFlow GitLab Flow Trees and Commits Configuring Git Adding, Renaming, and Removing Files Reviewing and Editing the Commit History Reviewing the Commit History Revision Shortcuts Fixing Mistakes Improving Your Daily Workflow Simplifying Common Commands with Aliases Ignoring Build Artifacts Saving Changes for Later Use (Stashing) Branching Branching Basics Listing Differences Between Branches Visualizing Branches Deleting Branches Tagging Merging Merging Basics Merge Conflicts Merging Remote Branches Remote Repositories Remote Repositories Synchronizing Objects with Remotes Tracking Branches Centralizing and Controlling Access Introduction to GitLab Git Repositories on GitLab Daily Workflow Reviewing Branching and Merging Branch Review Merging Basics Rebasing Rebasing Basics Rebasing with Local Branches Rebasing with Remote Branches Interactive Rebasing Squashing Commits Getting Out of Trouble Git as a Debugging Tool Using the Blame Command to See File History Performing a Binary Search Continuous Integration / Continuous Design (CI/CD) How to install GitLab Runner Adding to our example project Breaking down .gitlab-ci.yml Adding .gitlab-ci.yml to our example project Deconstructing an advanced .gitlab-ci.yml file GitLab CI/CD web UI Optional: Resetting Trees Introduction to Resetting Resetting Branch Pointers Resetting Branches and the Index Resetting the Working Directory Making Good Use of the Reset Command Optional More on Improving Your Daily Workflow Interactively Staging Changes Optional: Including External Repositories Submodules Subtrees Choosing Between Submodules and Subtrees Workflow Management Branch Management
Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The aim of this programme is to help attendees create better quality technical documents in an organised and efficient manner. It will give those new to the topic an appreciation of how to approach the task professionally whilst those with more experience will be able to refresh and refine their skills. The programme comprises three complementary one-day modules: The programme presents a structured methodology for creating technical documents and provides a range of practical techniques that help delegates put principles into practice. Although not essential, it is strongly advised that delegates for modules 2 and 3 have already attended module 1, or another equivalent course. Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. This course will: Explain the qualities and benefits of well written technical documents Present a structured approach for producing technical documents Review the essential skills of effective technical writing Demonstrate practical methods to help create better documents Provide tools and techniques for specification and report writing Review how technical documents should be issued and controlled Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. Module 1: Essential skills for technical writers 1 Introduction to the programme Aims and objectives of the module Introductions and interests of participants 2 Creating effective technical documents What is technical writing? how does it differ from other writing? Key qualities of an effective technical document Communication essentials and the challenges faced by technical writers The lessons of experience: how the best writers write The five key steps : prepare - organise - write - edit - release (POWER) 3 Preparing to write Defining the document aims and objectives; choosing the title Understanding technical readers and their needs Getting organised; planning and managing the process Integrating technical and commercial elements The role of intellectual property rights (IPR), eg, copyright 4 Organising the content The vital role of structure in technical documents Deciding what to include and how to organise the information Categorising information: introductory, key and supporting Tools and techniques for scoping and structuring the document Creating and using document templates - pro's and con's 5 Writing the document Avoiding 'blinding them with science': the qualities of clear writing Problem words and words that confuse; building and using a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity; being concise and ensuring clarity Using diagrams and other graphics; avoiding potential pitfalls 6 Editing and releasing the document Why editing is difficult; developing a personal editing strategy Some useful editing tools and techniques Key requirements for document issue and control Module 2: Creating better specifications 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' writing process for specifications 2 Creating better specifications The role and characteristics of an effective specification Specifications and contracts; the legal role of specifications Deciding how to specify; understanding functional and design requirements Developing the specification design; applying the principles of BS 7373 Getting organised: the key stages in compiling an effective specification 3 Preparing to write a specification Defining the scope of the specification; deciding what to include and what not Scoping techniques: scope maps, check lists, structured brainstorming The why/what/how pyramid; establishing and understanding requirements Clarifying priorities; separating needs and desires: the MoSCoW method Useful quantitative techniques: cost benefit analysis, QFD, Pareto analysis Dealing with requirements that are difficult to quantify 4 Organising the content The role of structure in specifications Typical contents and layout for a specification What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the specification Identifying and understanding the specification reader Key words: will, shall, must; building and using a glossary Writing performance targets that are clear and unambiguous Choosing and using graphics Exercise: writing a specification 6 Editing and releasing the document Key editing issues for specifications Issue and control of specifications Module 3: Writing better reports 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' technical writing process for technical reports 2 Creating better reports What is a technical report? types and formats of report The role and characteristics of an effective technical report Understanding technical report readers and their needs The commercial role and impact of technical reports Getting organised: the key stages in compiling a technical report 3 Preparing to write reports Agreeing the terms of reference; defining aims and objectives Being clear about constraints; defining what is not to be included Legal aspects and intellectual property rights (IPR) for reports Preparing the ground; gathering information and reference documents Keeping track of information: note making, cataloguing and cross referencing Tools and techniques for developing a valid and convincing argument 4 Organising the content The role of structure reviewed; some typical report structures Who needs what: identifying the varied needs of the readership What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the report Planning the storyline: the report as a journey in understanding Recognising assumptions about the reader; what they do and don't know Converting complex concepts into understandable statements Presenting technical data and its analysis; the role of graphics Presenting the case simply whilst maintaining technical integrity Exercise: writing a technical report 6 Editing and releasing the report Key editing issues for technical reports Issue and control of technical reports
Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text