Duration 3 Days 18 CPD hours Overview VMware vSphere: What's New [V8] https://lms.nhcms.neYou will learn essential Terraform concepts including: Writing Terraform HCL code Deploying into common clouds such as AWS, Azure, Docker, Kubernetes, and VMWare Where Terraform fits in the Enterprise CI/CD model Differences between Terraform and Ansible As enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use ?Infrastructure as Code? (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform?s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible. This class prepares you for Terraform Certifcation. Up and Running with Terraform Terraform Overview Defining ?declarative? How to think about Terraform (versus Ansible) Reviewing the Terraform Configuration Running the Terraform Configuration Provisioners Syntax Low Level? HCL syntax Style Conventions Comments Blocks Arguments JSON Configuration Syntax Resources Meta-Arguments depends_on count for_each provider lifecycle Data Sources Variables and Output Input Variables Output Values Local Values Functions String Collection Numeric Encoding Filesystem Date and Time Hash and Crypto IP Network Type Conversion Modules Module Blocks Module Sources Meta Arguments Terraform Templates templatefile Function Template Demonstration Introducing Data Sources Creating an External Data Source Building tftpl template files Expressions Types and Values Strings and Templates Reference to Values Operators Function Calls Conditionals For Expressions Splat Expressions Dynamic Blocks Type Constraints Version Constraints State Understanding the importants of states state storage and locking importing existing resources Remote State What to do when local state is lost CICD Piplines with Terraform Terraform and GitLab pipelines Terraform and Jenkins pipelines Enterprise Case Studies Terraform and Docker Terraform and Kubernetes Terraform and Amazon AWS Terraform and Azure Terraform and VMWare Understanding how to apply Terraform to your unique infrastructure Beyond Basics Intro to Go Programming Terraform Cloud Additional HashiCorp Offerings Backends Secrets Additional course details: Nexus Humans Terraform 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Terraform 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies
Duration 3 Days 18 CPD hours This course is intended for This is an Introductory level course for experienced Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. Ideally students should have familiarity with basic Python scripting. Attendees without programming skills can follow along with the scripting portion of the labs. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner attendees will explore how to: Describe Ansible concepts and install Red Hat Ansible Engine (optional - we can pre-install is as well if desired, depending on the audience) Deploy Ansible and Configure Ansible to manage hosts and run ad hoc Ansible commands. Implement playbooks Write a simple Ansible playbook and run it to automate tasks on multiple managed hosts. Manage variables and facts Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts. Implement task control; Manage task control, handlers, and task errors in Ansible playbooks. Deploy files to managed hosts Deploy, manage, and adjust files on hosts managed by Ansible. Manage large projects Write playbooks that are optimized for larger, more complex projects. Simplify playbooks with roles Use Ansible roles to develop playbooks more quickly and to reuse Ansible code. Troubleshoot Ansible Troubleshoot playbooks and managed hosts. Automate Linux administration tasks Automate common Linux system administration tasks with Ansible This lab-intensive course is geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows. Throughout the course you will explore core Ansible features such as automatic provisioning, configuration management, service deployment and operational processes. Ansible Overview Overview of Architecture Overview of Deployments Inventory Deploying Ansible Installing Configuration Files Running Ad Hoc Commands Dynamic Inventory Playbooks Writing YAML Files Modules Variables and Inclusions Variables Facts Inclusions Task Control Constructing Flow Control Handlers Tags Handling Errors Jinja2 Templates Jinja2 Templates Jinja2 Templates Roles Role Structure Creating Roles Deploying Roles with Ansible Galaxy Optimizing Ansible Configuring Connection Types Configuring Delegation Configuring Parallelism Ansible Vault Configuring Ansible Vault Executing with Ansible Vault Troubleshooting Ansible Troubleshooting Playbooks Troubleshooting Managed Hosts Ansible Tower Ansible Tower overview Installing Account management Hosts Jobs Optional: Ansible in a DevOps Environment Provisioning Vagrant Machines Deploying Vagrant in a DevOps Environment Deploying Docker in a DevOps Environment Additional course details: Nexus Humans Introduction to Ansible: Automation with Ansible (TTDV7580) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Ansible: Automation with Ansible (TTDV7580) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues
Duration 5 Days 30 CPD hours This course is intended for This course is designed for experienced integration specialists and senior-level developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of IBM App Connect Enterprise Develop, deploy, and test message flow applications Generate message flow applications from predefined patterns Use the IBM App Connect Enterprise Toolkit problem determination aids to diagnose and solve development and runtime errors Describe the function and appropriate use of IBM App Connect Enterprise processing nodes Write basic Extended Structured Query Language and Java programs to transform data Use the IBM Graphical Data Mapping editor to transform data Define, use, and test simple XML and Data Format Description Language (DFDL) data models Describe supported transport protocols and how to call them in message flows IBM App Connect Enterprise provides connectivity and universal data transformation in heterogeneous IT environments. It enables businesses of any size to eliminate point-to-point connections and batch processing, regardless of operating system, protocol, and data format. This course teaches you how to use IBM App Connect Enterprise to develop, deploy, and support message flow applications. These applications use various messaging topologies to transport messages between service requesters and service providers, and allow the messages to be routed, transformed, and enriched during processing. In this course, you learn how to construct applications to transport and transform data. The course explores how to control the flow of data by using various processing nodes, and how to use databases and maps to transform and enrich data during processing. You also learn how to construct data models by using the Data Format Description Language (DFDL) Course Outline Introduction to IBM App Connect Enterprise Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Additional course details: Nexus Humans WM668G IBM App Connect Enterprise V11 Application Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM668G IBM App Connect Enterprise V11 Application Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting. In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is best suited to systems administrators and IT managers. Overview Skills gained in this training include:Determining the correct hardware and infrastructure for your clusterProper cluster configuration and deployment to integrate with the data centerConfiguring the FairScheduler to provide service-level agreements for multiple users of a clusterBest practices for preparing and maintaining Apache Hadoop in productionTroubleshooting, diagnosing, tuning, and solving Hadoop issues Cloudera University?s four-day administrator training course for Apache Hadoop provides participants with a comprehensive understanding of all the steps necessary to operate and maintain a Hadoop cluster. The Case for Apache Hadoop Why Hadoop? Core Hadoop Components Fundamental Concepts HDFS HDFS Features Writing and Reading Files NameNode Memory Considerations Overview of HDFS Security Using the Namenode Web UI Using the Hadoop File Shell Getting Data into HDFS Ingesting Data from External Sources with Flume Ingesting Data from Relational Databases with Sqoop REST Interfaces Best Practices for Importing Data YARN & MapReduce What Is MapReduce? Basic MapReduce Concepts YARN Cluster Architecture Resource Allocation Failure Recovery Using the YARN Web UI MapReduce Version 1 Planning Your Hadoop Cluster General Planning Considerations Choosing the Right Hardware Network Considerations Configuring Nodes Planning for Cluster Management Hadoop Installation and Initial Configuration Deployment Types Installing Hadoop Specifying the Hadoop Configuration Performing Initial HDFS Configuration Performing Initial YARN and MapReduce Configuration Hadoop Logging Installing and Configuring Hive, Impala, and Pig Hive Impala Pig Hadoop Clients What is a Hadoop Client? Installing and Configuring Hadoop Clients Installing and Configuring Hue Hue Authentication and Authorization Cloudera Manager The Motivation for Cloudera Manager Cloudera Manager Features Express and Enterprise Versions Cloudera Manager Topology Installing Cloudera Manager Installing Hadoop Using Cloudera Manager Performing Basic Administration Tasks Using Cloudera Manager Advanced Cluster Configuration Advanced Configuration Parameters Configuring Hadoop Ports Explicitly Including and Excluding Hosts Configuring HDFS for Rack Awareness Configuring HDFS High Availability Hadoop Security Why Hadoop Security Is Important Hadoop?s Security System Concepts What Kerberos Is and How it Works Securing a Hadoop Cluster with Kerberos Managing and Scheduling Jobs Managing Running Jobs Scheduling Hadoop Jobs Configuring the FairScheduler Impala Query Scheduling Cluster Maintainence Checking HDFS Status Copying Data Between Clusters Adding and Removing Cluster Nodes Rebalancing the Cluster Cluster Upgrading Cluster Monitoring & Troubleshooting General System Monitoring Monitoring Hadoop Clusters Common Troubleshooting Hadoop Clusters Common Misconfigurations Additional course details: Nexus Humans Cloudera Administrator Training for Apache Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Administrator Training for Apache Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network engineer Systems engineer Wireless engineer Consulting systems engineer Technical solutions architect Network administrator Wireless design engineer Network manager Site reliability engineer Deployment engineer Sales engineer Account manager Overview After taking this course, you should be able to: Leverage the tools and APIs to automate Cisco ACI powered data centers. Demonstrate workflows (configuration, verification, healthchecking, monitoring) using Python, Ansible, and Postman. Leverage the various models and APIs of the Cisco Nexus OS platform to perform day 0 operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python. Describe the paradigm shift of Model Driven Telemetry and understand the building blocks of a working solution. Describe how the Cisco Data Center compute solutions can be managed and automated using API centric tooling, by using the Python SDK, PowerTool, and Ansible modules to implement various workflows on Cisco UCS, Cisco IMC, Cisco UCS Manager, Cisco UCS Director, and Cisco Intersight. The Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.1 course teaches you how to implement Cisco© Data Center automated solutions including programming concepts, orchestration, and automation tools. Through a combination of lessons and hands-on practice, you will manage the tools and learn the benefits of programmability and automation in the Cisco-powered Data Center. You will examine Cisco Application Centric Infrastructure (Cisco ACI©), Software-Defined Networking (SDN) for data center and cloud networks, Cisco Nexus© (Cisco NX-OS) platforms for device-centric automation, and Cisco Unified Computing System (Cisco UCS©) for Data Center compute. You will study their current ecosystem of Application Programming Interfaces (APIs), software development toolkits, and relevant workflows along with open industry standards, tools, and APIs, such as Python, Ansible, Git, JavaScript Object Notation (JSON), Yaml Ain't Markup Language (YAML), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Generation (YANG).This course prepares you for the 300-635 Automating Cisco Data Center Solutions (DCAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Data Center Solutions (DCAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification. Course Outline Describing the Cisco ACI Policy Model Describing the Cisco APIC REST API Using Python to Interact with the ACI REST API Using Ansible to Automate Cisco ACI Introducing Cisco NX-OS Programmability Describing Day-Zero Provisioning with Cisco NX-OS Implementing On-Box Programmability and Automation with Cisco NX-OS Implementing Off-Box Programmability and Automation with Cisco NX-OS Automating Cisco UCS Using Developer Tools Implementing Workflows Using Cisco UCS Director Describing Cisco DCNM Describing Cisco Intersight Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke security environment. Describe the function of the Cloud Management Extension. Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in AWS. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in AWS. Describe the workflow for configuring scaling solutions in AWS. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in AWS. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in AWS. Explain the steps required for troubleshooting Scaling Solution issues in AWS. Describe the steps required for troubleshooting clusters in AWS. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Create an SSH Key Pair. Create a VPC. Deploy an SMS. Connect to SmartConsole. Review the IAM Role. Configure the Cloud Management Extension. Configure the Access Control Policy. Create the AWS Data Center Object. Create Access Control Policy with a Data Center Object. Create the AWS VPC Spokes. Deploy the Web Servers into the Spoke VPCs. Create the AWS Auto Scale Deployment. Create the External and Internal Load Balancers. Create the VPC for the Auto Scale Deployment. Create the VPC Peers. Deploy the CloudGuard Cluster Template. Create the AWS VPN Gateway. Configure the Tunnel Interfaces. Configure the Static Routes. Configure the Network Objects. Configure the VPN Community. Configure the Security Policy. Test the Traffic. Troubleshoot the CloudGuard Controller. Debug the CloudGuard Controller. Debug the Cloud Management Extension Additional course details: Nexus Humans CNSE-AWS Check Point Network Security Expert for AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-AWS Check Point Network Security Expert for AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.