• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7137 Opera courses delivered Online

Full Stack Web Development with Python and Django (TTPS4860)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This introductory-level Python course is geared for experienced web developers new to Python who want to use Python and Django for full stack web development projects. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Develop full-stack web sites based on content stored in an RDMS Use python data types appropriately Define data models Understand the architecture of a Django-based web site Create Django templates for easy-to-modify views Map views to URLs Take advantage of the built-in Admin interface Provide HTML form processing Geared for experienced web developers new to Python, Introduction to Full Stack Web Development with Python and Django is a five-day hands-on course that teaches students how to develop Web applications using the Django framework. Students will explore the basics of creating basic applications using the MVC (model-view-controller) design pattern, as well as more advanced topics such as administration, session management, authentication, and automated testing. This comprehensive, practical course provides an in-depth exploration of working with the programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world. The Python Environment Starting Python Using the interpreter Running a Python script Getting help Editors and IDEs Getting Started Using variables Built in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control Conditional expressions Relational and Boolean operators while loops Lists and Tuples About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Working with Files File overview The with statement Opening a file Reading/writing files Dictionaries and Sets About dictionaries Creating and using dictionaries About sets Creating and using sets Functions Returning values Function parameters Variable Scope Sorting with functions Errors and Exception Handling Exception overview Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages Creating Modules The import statement Module search path Creating packages Classes About OO programming Defining classes Constructors Properties Instance methods and data Class/static methods and data Inheritance Django Architecture Django overview Sites and apps Shared configuration Minimal Django layout Built in flexibility Configuring a Project Executing manage.py Starting the project Generating app files App configuration Database setup The development server Using cookiecutter Creating models Defining models Related objects SQL Migration Simplel model access Login for Nothing and Admin for Free Setting up the admin user Using the admin interface Views What is a view HttpResponse URL route configuration Shortcut: get_object_or_404() Class-based views Templates About templates Variable lookups The url tag Shortcut: render() Querying Models QuerySets Field lookups Chaining filters Slicing QuerySets Related fields Q objects Advanced Templates Use Comments Inheritance Filters Escaping HTML Custom filters Forms Forms overview GET and POST The Form class Processing the form Widgets Validation Forms in templates Automated Testing Why create tests? When to create tests Using Django's test framework Using the test client Running tests Checking code coverage

Full Stack Web Development with Python and Django (TTPS4860)
Delivered OnlineFlexible Dates
Price on Enquiry

CL464G IBM Db2 11.1 Advanced Database Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview This course is designed to teach you how to: Perform advanced monitoring using the Db2 administrative views and routines in SQL queries. Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer. Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation. Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images. Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements. Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity. Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory. Adjust database or Db2 instance configuration options to improve application performance or processing efficiency. Implement Db2 Self Tuning Memory management for specific database memory areas. This course is designed to teach you how to Perform advanced monitoring using the Db2 administrative views and routines in SQL queries. Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer. Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation. Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images. Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements. Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity. Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory. Adjust database or Db2 instance configuration options to improve application performance or processing efficiency. Implement Db2 Self Tuning Memory management for specific database memory areas. Course Outline Advanced Monitoring Db2 Table Space Management Db2 Database Memory Management Database rebuild supportDb2 database and tablespace relocation Db2 Incremental Backup Additional course details: Nexus Humans CL464G IBM Db2 11.1 Advanced Database Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CL464G IBM Db2 11.1 Advanced Database Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CL464G IBM Db2 11.1 Advanced Database Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Log Insight: Deploy and Manage [V8.4]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system integrators, and developers responsible for designing and implementing vRealize Log Insight Overview By the end of the course, you should be able to meet the following objectives: Identify features and benefits of vRealize Log Insight Determine the vRealize Log Insight cluster that meets your monitoring requirements Describe the vRealize Log Insight architecture and use cases Deploy and configure a vRealize Log Insight cluster Use the Interactive Analytics tab to get a deep understanding of log data Create and manage queries Managing vRealize Agents and Agent Groups Create various custom dashboards Describe and use the vRealize Log Insight widgets Extend the capabilities of vRealize Log Insight by adding content packs and configuring solutions This two-day course focuses on deploying, using, and managing VMware vRealize© Log Insight? product. It provides you with the knowledge and skills to deploy a vRealize Log Insight cluster that meets the monitoring requirements of your environment. This course covers the configuration and use of vRealize Log Insight to collect and manage logs from a variety of VMware and third-party products. This course discusses interfacing vRealize Log Insight with other systems to monitor, troubleshoot, and secure a data center. Course Introduction Introductions and course logistics Course objectives Introduction to vRealize Log Insight Describe a cloud management platform Explain the importance of efficient log management Describe the requirements for a log analytics solution Describe the key benefits of vRealize Log Insight Describe the key features of vRealize Log Insight Describe the various stages of log processing vRealize Log Insight Architecture and Deployment Identify the minimum requirements for deploying vRealize Log Insight Using vRealize Log Insight Sizing Calculator Describe vRealize Log Insight compatibility with other VMware products Describe the vRealize Log Insight architecture Determine the correct vRealize Log Insight deployment for an environment Install the vRealize Log Insight virtual appliance vRealize Log Insight Queries and Dashboards Describe the primary functions of the vRealize Log Insight UI Use the Interactive Analytics tab to get a deep understanding of log data Create and Manage queries Create vRealize Log Insight custom dashboards Describe and use the vRealize Log Insight widgets Administering vRealize Log Insight Describe User Access Control in vRealize Log Insight Describe User Management Access the vRealize Log Insight Administration page Configure vRealize Log Insight settings Manage certificates Configure system notifications Upgrade vRealize Log Insight Describe the vRealize Log Insight Importer vRealize Log Insight Integrations Describe how to integrate vRealize Operations with vRealize Log Insight Describe the advantages of integrating vRealize Operations with vRealize Log Insight Describe the advantages of using the vSAN content pack Install NSX content packs Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Log Insight: Deploy and Manage [V8.4] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Log Insight: Deploy and Manage [V8.4] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Log Insight: Deploy and Manage [V8.4]
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

E2E200 -SAP Change Control Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Change Managers: Responsible for documentation, approval and change processes System Landscape Architects: Responsible for the design of the transport landscape topology System Administrators: Responsible for executing transports Development Managers: Responsible for performing development changes Application Manager: Responsible for approving and performing changes in an application Support Manager and members of the customer's SAP competence center: Responsible for Reporting and Diagnostics capabilities Partners and System Integrators Overview This course will prepare you to: Describe the concept and methods of E2E Change Control Management. Leverage the SAP Solution Manager 7.2 as application platform for E2E Change Control Management. In this course you will learn how change control management coordinates changes that are introduced into a software landscape so that the changes do not conflict with each other and how to make sure the changes are executed without disrupting ongoing business. This results in improved quality of the software landscape, higher availability of IT solutions, and lower total cost of ownership. Also important, change control management ensures that the changes introduced remain transparent, traceable and are made available for reporting and change analysis. Becoming adept at change control management requires skill in the efficient use of standardized methods and procedures. In this ?how to use? training, SAP imparts best-in-class knowledge of solution operations. The End-to-End Change Control Management course introduces participants to what change control management is and the standard tools used to accomplish it, tools provided by SAP Solution Manager. Introduction to E2E Change Control Management Explain the scope of End-to-End Change Control Management Explain the role of SAP Solution Manager to manage changes in your solution landscape Enhanced Change and Transport System Explain how the Enhanced Change and Transport System (CTS+) works Understand the basic concepts of Enterprise Portal and how it is supported by CTS+ Describe the best practices for the setup and usage of CTS+ in different scenarios Configuration Validation Understand the concepts and architecture of E2E Change Diagnostics Find current configuration information with the Change Reporting tool Find recent changes in the solution landscape with the E2E Change Analysis tool Compare multiple systems with the Configuration Validation tool Create targets, use operators and run validation reports Know how to use predefined reports in the report directory Transport and Execution Analysis Service and Transport and Execution Analysis Service for Projects Know how to run and use this self-check services within SAP Solution Manager Understand how to interpret the software change management KPIïs that are collected for your landscape Software Change Strategy Understand the limitations of a three-system landscape Understand the benefits of bundling changes in cycles and synchronized releases Transport Management with SAP Solution Manager Understand the change control landscape concept for transport management in SAP Solution Manager 7.2 Understand the usage of critical objects, cross system object locking and downgrade protection Know how to use retrofit in a dual landscape Understand the features of cCTS, which can be used for Quality Gate Management and Change Request Management parallel to CTS. Quality Gate Management Explain the concept of Solution Transports and Track Synchronization Setup and use Quality Gate Scenario as a central Transport Management Tool Create and release transport requests centrally in SAP Solution Manager for ABAP and Non-ABAP environments Know how to work within the Quality Gate Scenario Change Request Management Understand the different use cases for Change Request Management Describe the various elements of Change Request Management as part of SAP Solution Manager Understand SAP?s best practices for transport management which are implemented in Change Request Management Know how to work with Change Request Management Release Management Learn how to manage Release Management with SAP Solution Manager Understand how to manage the successful deployment of all related changes into the productive environment.

E2E200 -SAP Change Control Management
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced SQL Programming (TTSQL005)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced SQL Programming (TTSQL005)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud on Dell: Deploy and Manage 2022

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Describe the business challenges that VMware Cloud on Dell EMC addresses Configure access to the vCenter Server instance Recognize the network configurations necessary to set up the VMware Cloud on Dell EMC Describe the NSX-T Data Center architecture in VMware Cloud on Dell EMC Recognize the storage options for VMware Cloud on Dell EMC Link a VMware Cloud on Dell EMC vCenter Server instance with an on-premises vCenter Single Sign-On domain Migrate workloads between your on-premises data center and VMware Cloud on Dell EMC Differentiate who is responsible for which maintenance tasks that correspond either to administrators or to VMware Recognize how VMware add-on solutions support VMware Cloud on Dell SDDC This course, equivalent to 4 days of training, provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud? on Dell EMC infrastructure. You explore the common use cases of the VMware Cloud on Dell EMC infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere© as well as workloads with compliance and residency requirements. In this course, you are introduced to various rapid and easy migration options for workloads based on vSphere to VMware Cloud on Dell EMC. In addition, you are presented with an overview of VMware HCX an application mobility platform that allows you to migrate your workloads between on-premises VMware vSphere and VMware Cloud on Dell EMC SDDC. Course Introduction Course Introduction Introduction to VMware Cloud on Dell EMC Choosing VMware Cloud on Dell EMC Management and operational structure Ordering and Site preparation Getting started with VMware Cloud on Dell EMC Ordering VMware Cloud on Dell EMC SDDC vSphere permissions on VMware Cloud on Dell EMC Billing and pricing on VMware Cloud services SDDC management Accessing vCenter Server SDDC Host management SDDC cluster management Creating Virtual Machines in SDDC Networking and Security SDDC Networks Networking and Security Options Storage Storage in VMware Cloud on Dell EMC Working with On-Premises vSphere Hybrid linked mode Migration Solutions for VMware Cloud on Dell EMC VM Migration with VMware HCX Maintaining and Troubleshooting Maintenance, Support, and Common Troubleshooting Steps Working with other VMware Products VMware vRealize Log Insight Cloud VMware Horizon with VMware Cloud on Dell EMC VMware vRealize Automation Using VMware vRealize Operations with VMware Cloud on Dell EMC Using VMware vRealize Network Insight? with VMware Cloud on Dell EMC Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud on Dell: Deploy and Manage 2022 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud on Dell: Deploy and Manage 2022 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud on Dell: Deploy and Manage 2022
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere 6.5 Optimize and Upgrade

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere 6.5 Optimize and Upgrade
Delivered OnlineFlexible Dates
Price on Enquiry

Python for Data Science: Hands-on Technical Overview (TTPS4873)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This introductory-level course is intended for Business Analysts and Data Analysts (or anyone else in the data science realm) who are already comfortable working with numerical data in Excel or other spreadsheet environments. No prior programming experience is required, and a browser is the only tool necessary for the course. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Throughout the hands-on course students, will learn to leverage Python scripting for data science (to a basic level) using the most current and efficient skills and techniques. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore (to a basic level): How to work with Python interactively in web notebooks The essentials of Python scripting Key concepts necessary to enter the world of Data Science via Python This course introduces data analysts and business analysts (as well as anyone interested in Data Science) to the Python programming language, as it?s often used in Data Science in web notebooks. This goal of this course is to provide students with a baseline understanding of core concepts that can serve as a platform of knowledge to follow up with more in-depth training and real-world practice. An Overview of Python Why Python? Python in the Shell Python in Web Notebooks (iPython, Jupyter, Zeppelin) Demo: Python, Notebooks, and Data Science Getting Started Using variables Builtin functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control White space Conditional expressions Relational and Boolean operators While loops Alternate loop exits Sequences, Arrays, Dictionaries and Sets About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Generator Expressions Nested sequences Working with Dictionaries Working with Sets Working with files File overview Opening a text file Reading a text file Writing to a text file Reading and writing raw (binary) data Functions Defining functions Parameters Global and local scope Nested functions Returning values Essential Demos Sorting Exceptions Importing Modules Classes Regular Expressions The standard library Math functions The string module Dates and times Working with dates and times Translating timestamps Parsing dates from text Formatting dates Calendar data Python and Data Science Data Science Essentials Pandas Overview NumPy Overview SciKit Overview MatPlotLib Overview Working with Python in Data Science Additional course details: Nexus Humans Python for Data Science: Hands-on Technical Overview (TTPS4873) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Python for Data Science: Hands-on Technical Overview (TTPS4873) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Python for Data Science: Hands-on Technical Overview (TTPS4873)
Delivered OnlineFlexible Dates
Price on Enquiry