Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Partners and customers interested in the Catalyst 9800 wireless controller Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe Cisco Catalyst 9800 Understand the Benefits for Catalyst 9800 Configure Catalyst 9800 Migrate to the Catalyst 9800 Troubleshoot the Catalyst 9800 Understand and Discuss WIFI6 Configuring Cisco Catalyst 9800 and Intro to WIFI6 v1.0 is a three-day course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course. Introduction Cisco Catalyst 9800 Overview Intent Based Networking (IBN) Cisco Catalyst Next Gen Wireless Architecture Cisco Catalyst 9800 Wireless ? Platform Support Cisco Catalyst 9800 Wireless Controller Appliances Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9 Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9 Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9 Cisco Catalyst 9800 use in Private and Public Cloud Environments Private Public Hybrid What is WiFi 6 and Why do we need it? Use Cases ? how WiFi 6 will change Buisness and Industry WIFI6 technical ? a leap from previous WiFi technologies Design Considerations Cisco WiFi6 Portfolio and Interoperability Configure WiFi6 on Cat 9800 Cisco Catalyst 9800 Series Embedded Controller for SDA SD-Access Everywhere Wireless Assurance with DNA Center Catalyst 9800 SD-Access Wireless Catalyst 9800 SD-Access Embedded Wireless Controllers High Availability Reducing downtime for Upgrades and Unplanned Events High Availability (Client SSO) High Availability (AP & Client SSO) Software Updates Software Updates SSO Patching Rolling Upgrades Wireless Controller SMU Rolling AP Update Image Upgrade Programmability and Telemetry Flexible management options with Cisco Catalyst 9800 Wireless Controllers Wireless Programmability ?Stack? Config vs Operational YANG data models Model Driven Telemetry Security and Threat Detection Intent-based wireless networks Security Security and Threat Mitigation Catalyst 9800 Wireless Controller Configuration Model New Configuration Model AireOS vs. Catalyst 9800 Config Model Catalyst 9800 Config Model Wireless Basic Setup Wireless Basic Configuration Model Adding Local Site Adding Remote Site Provisioning APs to Site Day 0 AP PnP Wireless Advanced Guided UI Configuration Workflow WLAN Profile Policy Profile AP Join profile RF Profile Static and Rule-Based AP Tagging Migration AireOS Config Translator Using the Tool Migration using Prime AireOS Config Translator on PI 3.5 Troubleshooting IOS-XE logging architecture Packet tracing and packet captures Embedded Packet Capture web interface Useful commands and tools Additional course details: Nexus Humans Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Audience for this course This course is designed for system administrators responsible for creating OpenShift Enterprise instances, deploying applications, creating process customizations, managing instances and projects. Prerequisites for this course Have taken Red Hat Enterprise Linux Administration I and II (RH124 and RH134), or equivalent Red Hat Enterprise Linux© system administration experience Be certified as a Red Hat Certified System Administrator (RHCSA), or equivalent Red Hat Enterprise Linux system administration experience Be certified as a Red Hat Certified Engineer (RHCE©) Overview Learn to install, configure, and manage OpenShift Enterprise by Red Hat instances - OpenShift Enterprise Administration (DO280) prepares the system administrator to install, configure, and manage OpenShift Enterprise by Red Hat© instances. OpenShift Enterprise, Red Hat's platform-as-a-service (PaaS) offering, provides pre-defined deployment environments for applications of all types through its use of container technology. This creates an environment that supports DevOps principles such as reduced time to market and continuous delivery. - In this course, students will learn how to install and configure an instance of OpenShift Enterprise, test the instance by deploying a real world application, and manage projects/applications through hands-on labs. - Course content summary - Container concepts - Configuring resources with the command line interface - Building a pod - Enabling services for a pod - Creating routes - Downloading and configuring images - Rolling back and activating deployments - Creating custom S2I images This course will empower you to install and administer the Red Hat© OpenShift© Container Platform, with hands-on, lab-based materials that show you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. This course is based on Red Hat© Enterprise Linux© 7.5 and Openshift Container Platform 3.9. OpenShift is a containerized application platform that allows your enterprise to manage container deployments and scale your applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). 1 - INTRODUCTION TO RED HAT OPENSHIFT ENTERPRISE Review features and architecture of OpenShift Enterprise. 2 - INSTALL OPENSHIFT ENTERPRISE Install OpenShift Enterprise and configure a master and node. 3 - EXECUTE COMMANDS Execute commands using the command line interface. 4 - BUILD APPLICATIONS Create, build, and deploy applications to an OpenShift Enterprise instance. 5 - PERSISTENT STORAGE Provision persistent storage and use it for the internal registry. 6 - BUILD APPLICATIONS WITH SOURCE-TO-IMAGE (S2I) Create and build applications with S2I and templates. 7 - MANAGE THE SYSTEM Use OpenShift Enterprise components to manage deployed applications. 8 - CUSTOMIZE OPENSHIFT ENTERPRISE Customize resources and processes used by OpenShift Enterprise. 9 - COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in the course. 10 - NOTE: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us. Additional course details: Nexus Humans Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who wish to use Microsoft Word to create and modify complex documents and use tools that allow them to customize those documents. Overview In this course, you will learn to create and modify complex documents and use tools that allow you to customize those documents. You will: Organize content using tables and charts. Customize formats using styles and themes. Insert content using Quick Parts. Use templates to automate document formatting. Control the flow of a document. Simplify and manage long documents. Use mail merge to create letters, envelopes, and labels. After you master the basics of creating, editing, and printing Microsoft© Word documents, you're ready to move on to tackling the more advanced features. In this course, you will work with features such as formats, styles, and templates to create professional documents with a consistent look and feel. You will add visual interest to your documents by using the tables and charts features. Quick Parts and templates provide efficiency and consistency when adding content, and long complex documents can be simplified and managed in Master Documents. Finally, you will use the mail merge feature to automate sending individual letters to customers. Creating professional-looking documents can give you and your organization a competitive edge. Implementing time-saving features such as document templates and automated mailings can help reduce expenses. Mastering these techniques will make you a valued employee in your organization. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Word Associate (Office 365 and Office 2021): Exam MO-100 and Word Expert (Office 365 and Office 2021): Exam MO-101 certifications. Organizing Content Using Tables and Charts Topic A: Sort Table Data Topic B: Control Cell Layout Topic C: Perform Calculations in a Table Topic D: Create a Chart Topic E: Add an Excel Table to a Word Document (Optional) Customizing Formats Using Styles and Themes Topic A: Create and Modify Text Styles Topic B: Create Custom List or Table Styles Topic C: Apply Document Themes Inserting Content Using Quick Parts Topic A: Insert Building Blocks Topic B: Create and Modify Building Blocks Topic C: Insert Fields Using Quick Parts Using Templates to Automate Document Formatting Topic A: Create a Document Using a Template Topic B: Create and Modify a Template Topic C: Manage Templates with the Template Organizer Controlling the Flow of a Document Topic A: Control Paragraph Flow Topic B: Insert Section Breaks Topic C: Insert Columns Topic D: Link Text Boxes to Control Text Flow Simplifying and Managing Long Documents Topic A: Insert Blank and Cover Pages Topic B: Insert an Index Topic C: Insert a Table of Contents Topic D: Insert an Ancillary Table Topic E: Manage Outlines Topic F: Create a Master Document Using Mail Merge to Create Letters, Envelopes, and Labels Topic A: Use Mail Merge Topic B: Merge Envelopes and Labels Additional course details: Nexus Humans Microsoft Office Word 2021: Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Office Word 2021: Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for Pardot Marketers and Salesforce Administrators responsible for designing, building, and implementing marketing workflows and reports in the Pardot Lightning App. It's also for Business Users looking to learn more about the Pardot Lightning App. This course is a great foundation builder for anyone looking to take the Salesforce Pardot Specialist Certification Exam. Overview When you complete this course, you will be able to: Enable the Pardot Lightning App. Explain the relationship created between Pardot and Salesforce once the Pardot Lightning App has been enabled. Generate leads with Pardot Lightning App's various lead generation tools including forms, landing pages, and custom redirects. Manage leads with Pardot Lightning App's lead management tools including page actions, automation rules, segmentation rules, dynamic lists, and completion actions. Engage leads with Pardot Lightning App's lead engagement tools including email, personalization, dynamic content, and Engagement Studio. Qualify leads with Pardot Lightning App's scoring and grading functionality. Interpret data generated via Pardot Lightning App's reporting capabilities. Design and execute successful end-to-end marketing workflows using the Pardot Lightning App. Discover how to drive more qualified leads, nurture prospects through the sales cycle, and sell more effectively using the Pardot Lightning App. In this 3-day class, Pardot experts will show you how to design and implement marketing workflows in the Pardot Lightning App to make data-driven decisions and drive your company?s business forward. Learn how to create and automate dynamic emails, generate and qualify leads, and leverage reports and data to boost sales. Course Introduction Review Course Objectives Set Learner Expectations Review Housekeeping Items Review Additional Course Resources Explore Course Case Study Salesforce Integration Understand the Pardot-Salesforce Relationship Sync Data Between Salesforce and Pardot Enable the Pardot Lightning App in Salesforce Create Custom Fields Review Salesforce Campaigns Administration Create a Pardot Dashboard Authenticate Your Email Sending Domains Sync with Third-Party Applications Using Connectors Restore Assets from the Recycle Bin Create and Assign Users and User Groups Understand Usage Governance Visitors and Prospects Understand Pardot Visitors Understand Pardot Prospects List Management Create List Types Organize Prospects Using Static Lists Test Emails Using Test Lists Personalization and Email Marketing Personalize Your Emails with HML and Advanced Dynamic Content Automate Email Marketing Create Email Templates See What Works Best for Your Audience Using AB Testing Track Email Performance Using Email Reports Forms and Landing Pages Capture Leads with Forms Convert Visitors to Leads Using Landing Pages Track Leads with Forms and Landing Page Reports Track Clicks Using Custom Redirects Create Custom Redirect Reports Lead Management Trigger Page Actions Automate Actions from a Marketing Element Using Completion Actions Create a List of Prospects and Apply a Segmentation Action Using Segmentation Rules Create Repeatable, Criteria-Based Automation Rules Create Dynamic Lists Choose an Automation Tool Lead Qualification Understand Prospect Scoring Grade Prospects Based on Profiles Lead Nurturing Build an Engagement Program Create Engagement Program Reports Additional course details: Nexus Humans Salesforce Drive Sales with the Pardot Lightning App (PDX101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Drive Sales with the Pardot Lightning App (PDX101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.