Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client⢠to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority⢠to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi⢠host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms
Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Partners and customers interested in the Catalyst 9800 wireless controller Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe Cisco Catalyst 9800 Understand the Benefits for Catalyst 9800 Configure Catalyst 9800 Migrate to the Catalyst 9800 Troubleshoot the Catalyst 9800 Understand and Discuss WIFI6 Configuring Cisco Catalyst 9800 and Intro to WIFI6 v1.0 is a three-day course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course. Introduction Cisco Catalyst 9800 Overview Intent Based Networking (IBN) Cisco Catalyst Next Gen Wireless Architecture Cisco Catalyst 9800 Wireless ? Platform Support Cisco Catalyst 9800 Wireless Controller Appliances Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9 Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9 Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9 Cisco Catalyst 9800 use in Private and Public Cloud Environments Private Public Hybrid What is WiFi 6 and Why do we need it? Use Cases ? how WiFi 6 will change Buisness and Industry WIFI6 technical ? a leap from previous WiFi technologies Design Considerations Cisco WiFi6 Portfolio and Interoperability Configure WiFi6 on Cat 9800 Cisco Catalyst 9800 Series Embedded Controller for SDA SD-Access Everywhere Wireless Assurance with DNA Center Catalyst 9800 SD-Access Wireless Catalyst 9800 SD-Access Embedded Wireless Controllers High Availability Reducing downtime for Upgrades and Unplanned Events High Availability (Client SSO) High Availability (AP & Client SSO) Software Updates Software Updates SSO Patching Rolling Upgrades Wireless Controller SMU Rolling AP Update Image Upgrade Programmability and Telemetry Flexible management options with Cisco Catalyst 9800 Wireless Controllers Wireless Programmability ?Stack? Config vs Operational YANG data models Model Driven Telemetry Security and Threat Detection Intent-based wireless networks Security Security and Threat Mitigation Catalyst 9800 Wireless Controller Configuration Model New Configuration Model AireOS vs. Catalyst 9800 Config Model Catalyst 9800 Config Model Wireless Basic Setup Wireless Basic Configuration Model Adding Local Site Adding Remote Site Provisioning APs to Site Day 0 AP PnP Wireless Advanced Guided UI Configuration Workflow WLAN Profile Policy Profile AP Join profile RF Profile Static and Rule-Based AP Tagging Migration AireOS Config Translator Using the Tool Migration using Prime AireOS Config Translator on PI 3.5 Troubleshooting IOS-XE logging architecture Packet tracing and packet captures Embedded Packet Capture web interface Useful commands and tools Additional course details: Nexus Humans Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Catalyst 9800 and Intro to WIFI6 (C98WF6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities
Duration 4 Days 24 CPD hours This course is intended for The audience for this course is either: a Dynamics 365 consultant who wants to learn Commerce, or a retail analyst with core Dynamics 365 experience who wants to apply their skills to the Dynamics product family. Overview After completing this course, students will be able to: Configure Dynamics 365 Commerce Headquarters Configure products, prices, discounts, loyalty, and affiliations Manage Point of Sale (POS) in Dynamics 365 Commerce Configure and Manage Dynamics 365 Commerce call centers Manage e-commerce Dynamics 365 Commerce functional consultants set up and use the application functionality in Dynamics 365 Commerce, and provide support for the application. The functional consultant typically has a strong understanding of unified commerce business operations, and experience configuring, deploying, maintaining, and using Microsoft Dynamics 365 Commerce. This four-day course covers the essentials for the role Module 1: Get started with Dynamics 365 Commerce Introduction to Unified Commerce platform Dynamics 365 Commerce architecture Deployment of Dynamics 365 Commerce Hardware and peripherals Module 2: Configure Commerce Headquarters Configure prerequisites and Commerce parameters Configure and maintain payment processing Configure Commerce Data Exchange (CDX) Configure delivery modes and charges Configure and work with statements Module 3: Products and Merchandising Product information management Merchandising in Dynamics 365 Commerce Product recommendations and product discovery Module 4: Retail Pricing Manage Pricing Manage discounts and promotions Module 5: Loyalty and customer experience Customer Management Loyalty and affiliations Module 6: Point of sale Introduction to POS Channel Setup Configure Cash and Shift management Worker Setup Point of Sale Setup Customer management at POS Transaction processing Inventory processing End of day processing Reporting Configure and work with Task management Test POS Maintain registers and devices Localization Module 7: Configure and work with call centers in Dynamics 365 Commerce Configure channel Configure Product Catalogs Configure Order Holds Create call center orders Configure call center directed selling Configure Returns and Refunds Configure continuity orders and installment billing Module 8: Work with E-Commerce in Dynamics 365 Commerce Describe e-commerce core capabilities Configure an E-Commerce Channel in Dynamics 365 HQ Configure an E-Commerce site Configure and manage E-Commerce site content Describe & Demonstrate digital asset management Configure business-to-business (B2B) site Configure Ratings and reviews functionality Demonstrate E-Commerce Order Processing Module 9: Manage order fulfillment and inventory in Dynamics 365 Commerce Configure and work with Stock replenishment Configure and work with Order fulfillment Module 10: Work with Dynamics 365 Fraud Protection Overview of Dynamics Fraud Protection Describe Dynamics Fraud Protection Services Configure and work with Dynamics Fraud Protection with Dynamics 365 Commerce Additional course details: Nexus Humans MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-340T00: Microsoft Dynamics 365 Commerce Functional Consultant course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview This skills-focused course combines expert instructor-led discussions with practical hands-on labs that emphasize useful, current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, you'll learn about and explore: Review of the File System Introduction to Shells: sh, bash, and ksh Shell Programming Advanced Shell Features Text Manipulation Utilities File Processing Utilities Multitasking and Batch Processing Regular Expressions Intermediate Linux: Shell, Bash, Text Manipulation, Multitasking & More is a two-day course designed to provide you with hands on experience using standard Linux commands and utilities used for day-to-day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. Throughout the course you?ll explore key concepts to Linux core functionality, while learning the system's most commonly used commands. You?ll also learn the Bourne shell, Bash shell and Korn shell programming techniques you?ll need to read and modify existing shell scripts, and create your own. Data manipulation utilities and shell syntax for synthesizing command pipelines are also emphasized throughout the course. Review of the File System File System Organization File Types File and Directory Naming Rules and Conventions Commands for Navigating the File System Introduction to Inodes Ownership, Permissions, and Dates Manipulating Files and Links Manipulating Directories Determining Disk Usage Other File System Utilities Introduction to Shells: sh, bash, and ksh Shell Functions I/O Redirection and Pipes Command Separation and Grouping Background Execution Filename Expansion Shell Variables Command Substitution Quoting and Escaping Metacharacters Bash Shell Features Korn Shell Features Command Execution Startup Files Customizing the User Environment Shell Programming Shell Script Features and Capabilities Creating and Running a Script Working With Variables Environment Variables Working With Data Types Formatting Base Conversion Setting Special Attributes Input/Output Techniques Conditional Constructs if/then else/elif Looping Constructs for, while, until Math Operators Advanced Shell Features Manipulating Strings Writing and Calling Functions Controlling Process Priorities Interpreting Command Line Arguments Making Scripts Interactive Special Shell Variables Advanced I/O with Streams Improving Performance of Scripts Text Manipulation Utilities Editing a File from a Script Scripting with ed or sed UNIX and Linux Utilities to Manipulate Files Regular Expressions grep and egrep The Stream Editor sed Sorting in Scripts Generating Reports with awk Splitting Large Files Counting Words, Lines, and Characters Transforming File Contents File Processing Utilities Examining and Comparing Files Reporting Differences Between Files Comparing Files of Any Format Displaying Data in Octal and Hex Compressing Data Converting File Formats Extracting Text Strings Multitasking and Batch Processing Multitasking Scheduled Execution Using cron The at and batch Commands Regular Expressions Regular Expression Overview Regular Expression Implementations Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis Additional course details: Nexus Humans Intermediate Linux (TTLX2104) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate Linux (TTLX2104) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified
Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW Cisco SD-WAN Overview Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN Advanced Settings Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN High Availability Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN Templates Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates Bridging Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging Routing Protocols Static Routes Dynamic Routing Protocols Multicast Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP Network Optimization Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS Direct Internet Access (DIA) Overview SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring Unified Communications Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN Security Policy Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN Local Policy Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN Central Policy Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN Migration Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration Additional course details: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP Process Integration Architecture Describing SAP Process Integration Architecture Explaining the Functionality and Utilization of SAP Process Integration The System Landscape Directory (SLD) Maintaining Products and Software Components in the System Landscape Directory (SLD) Implementing Technical Systems in the System Landscape Directory Maintaining Business Systems for Use in the Integration Directory Interface Objects in the Enterprise Service Repository (ESR) Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository (ESR) Maintaining Interface Objects Defining Message Processing Types and Quality of Services Object Mapping in the Enterprise Service Repository (ESR) Creating Message Mapping Objects Mapping Between Service Interfaces Analyzing Asynchronous Integration Scenarios Configuration of Integration Directory Communication Objects Using Configuration Views Creating Communication Channels in the Integration Directory (ID) Configuration of Integration Directory Objects for ABAP Processing Analyzing Objects Used in the Configuration of Integration Engine (IE) Communication Analyzing Routing Objects Used in Integration Engine (IE) Communication Analyzing Multiple Receiver Objects Used in Integration Engine (IE) Communication Configuration of Integration Directory Objects for Java Processing Maintaining Objects for Advanced Adapter Engine (AAE)-Only Processing Maintaining Objects for Advanced Adapter Engine Extended (AEX) Message Processing Creating and Deploying Integration Flows to the Advanced Adapter Engine Extended (AEX) Operations of SAP Process Integration Using the Runtime Workbench Using the Process Integration Monitoring (PIMon) Home Using the SAP NetWeaver Administrator Connectivity Options for SAP Process Integration Analyzing Connectivity Options between Back-End Systems with SAP Process Integration HTTP Connectivity Options Configuring the Simple Object Access Protocol (SOAP) Adapter Using Proxy Technology Checking the HTTP ABAP Adapter Using the HTTP_AAE (Java) Adapter File Adapter Configuration Configuring the Receiver File Adapter Configuring a Sender File Adapter Intermediate Document (IDoc) Connectivity Options Using the Intermediate Document (IDoc) Adapter with the Receiver Intermediate Document Adapter for the ABAP Stack Using the Sender Intermediate Document (IDoc) Adapter Using the Intermediate Document (IDoc) Adapter in the Advanced Adapter Engine (AAE) Configuring a Complete Intermediate Document (IDoc) Scenario Configuration of SAP Business Application Programming Interfaces (BAPIs) Connectivity Configuring the Receiver Remote Function Call (RFC) Adapter Configuring the Sender Remote Function Call (RFC) Scenario Enterprise Services and B2B Connectivity Analyzing Enterprise Services Configuring Business-to-Business (B2B) Connectivity Cross-Component Business Process Management (ccBPM) Integration Processes Analyzing the Runtime of the Cross-Component Business Process Management (ccBPM) Identifying the Steps to Create and Use an Integration Process Additional course details: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.