Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Architecture and course review Post course knowledge check Architecture review Course review
Duration 3 Days 18 CPD hours This course is intended for Application Developer Data Modeler BI / BW Consultant Data Scientist Database Administrator SAP HANA Support Personnel Overview This course will prepare you to: Push down data intensive tasks to the SAP HANA database using SQL and SQLScript Understand how to code using advanced SQLScript techniques Follow recommended practices for writing optimal SQL and SQLScript Debug and analyze SQL and SQLScript code This course provides students with basic SQL knowledge or refreshes their SQL knowledge, and enables them to use basic and some advanced SQL techniques for querying and manipulating data in an SAP HANA database. Getting Started What is SQL and SQLScript? Understanding how ABAP developers work with SQLScript Understanding XS Advanced and HDI Working with Web IDE for SAP HANA Understanding the course data SQL Logic Container Creating user-defined functions Creating database procedures Trapping errors in SQLScript User defined libraries Declarative Logic Using declarative logic Imperative Logic Using imperative Logic Transactional Savepoints How to implement transactional savepoints Analytic Operations Using OLAP Analytic features Implementing Temporal Tables Working with Hierarchies Working with Hierarchies Troubleshooting and Best Practices Tools for troubleshooting Best Practices Appendix Starting from the beginning with SQL fundamentals Additional course details: Nexus Humans HA150 SAP HANA 2.0 SPS05 SQLScript for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA150 SAP HANA 2.0 SPS05 SQLScript for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for z/OS system programmers, z/OS performance analysts, and z/OS performance administrators new to performance management for their z/OS system.Note: ES54 is intended for individuals new to WLM and the z/OS performance area Overview The objectives for this course are as follows:Describe a performance and tuning methodologyDevelop a systematic z/OS performance and tuning planDescribe the factors which could affect the performance of an z/OS systemUse the WLM ISPF applicationDescribe the components of a service definitionDefine workloads and service levels and classification rulesState which z/OS commands affect WLM operationIdentify the major WLM services for z/OS, including enclaves and application environments, and how they are used by DB2, WebSphere, and CICSAnalyze CPU performance when running in a shared LPAR environmentUtilize and monitor zIIP and zAAP specialty enginesMeasure and tune z/OS DASD, processor storage, and coupling facility configurationsExplain the functions and facilities of RMF and SMFAnalyze performance bottlenecks using RMFUse Workload License Charges (WLC), defined capacity and soft capping to manage software costsDescribe advanced z/OS environments that utilize Intelligent Resource Director (IRD), HiperDispatch, z/OSMF Workload Management, and I/O Priority ManagerUse the z/OSMF Workload Management (WLM) taskUse Performance Monitoring with z/OSMFModify a WLM service definition to meet the requirements for monitoring a specific system workloadCreate and customize Monitoring DesktopsReview any issues by using the Monitoring Desktops options displaysAssess the performance of the workloads running on the z/OS This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM. Day 1 Welcome Unit 1 - Tuning methodology Unit 2 - Using SMF and RMF to monitor performance Lab 1 - Introduction to your system Lab 2 - Using RMF Monitor I and Monitor II Day 2 Unit 3 - Performance impacts when running in a shared LPAR environment Unit 4 - Basic system workload management (part 1) Lab 3 - Implementing a WLM environment on z/OS (part 1) Day 3 Unit 4 - Basic system workload management (part 2) Lab 3 - Implementing a WLM environment on z/OS (part 2) Day 4 Unit 5 - WLM commands, internals, and service Lab 4 - Using RMF Monitor III to solve performance problems Day 5 Unit 6 - z/OS DASD performance topics Unit 7 - Tuning processor storage Unit 8 - Miscellaneous performance topics Lab 5 - z/OSMF and performance management
Duration 3 Days 18 CPD hours This course is intended for Technical professionals who support, install, deploy or administer Check Point Software Blades. Overview Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.Describe the key elements of Check Point?s unified Security Management Architecture.Recognize SmartConsole features, functions and tools.Understand Check Point deployment options.Describe the basic functions of Gaia.Describe the essential elements of a Security Policy.Understand how traffic inspection takes place in a unified Security Policy.Summarize how administration roles and permissions assist in managing policy.Recall how to implement backup techniques.Understand the Check Point policy layer concept.Recognize Check Point security solutions and products and how they work to protect your network.Understand licensing and contract requirements for Check Point security products.Identify tools designed to monitor data, determine threats and recognize performance improvements.Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.Understand Site-to-Site and Remote Access VPN deployments and communities.Understand how to analyze and interpret VPN traffic.Recognize how to define users and user groups.Understand how to manage user access for internal and external users.Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. Introduction to Check Point Technology Security Policy Management Policy Layers Check Point Security Solutions and Licensing Traffic Visibility Basic Concepts of VPNManaging User Access Working with ClusterXLAdministrator Task Implementation Additional course details: Nexus Humans Check Point Cyber Security Administrator (CCSA R80.10) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Check Point Cyber Security Administrator (CCSA R80.10) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for System installers System integrators System administrators Network administrators Overview After taking this course, you should be able to: Describe the Cisco SD-Branch solution and its architecture Explain the hardware components of the Cisco ENCS 5400 and Cisco Catalyst 8200 Series Edge Universal Customer Premises Equipment (uCPE) Install and access the Cisco Enterprise NFVIS on Cisco ENCS 5400 Understand the VNF Lifecycle management and its deployment Identify Cisco Enterprise NFVIS Security considerations Explain the Cisco SD-WAN solution and its components Describe the Cisco ENCS orchestrations systems and Representational State Transfer (REST) APIs Deploy the Cisco ENCS using orchestrators Monitor and troubleshoot Cisco ENFV components using Cisco vManage The Implementing Cisco Enterprise SD-Branch (ENSDBI) v1.0 course is designed to teach you to understand the Cisco© Software-Defined (SD)-Branch architecture and Cisco Enterprise Network Functions Virtualization (ENFV) solution. Through a series of in-person or e-learning lectures and labs, you will learn about the supported hardware platforms with a focus on the components, installation, and upgraded workflows of the Cisco Enterprise Network Compute System (ENCS) 5400 series. Additionally, this course will help you build your skills on Virtual Network Functions (VNF) deployment and orchestration solutions on Cisco ENCS. Course Outline Introducing Cisco SD-Branch Architecture and Cisco ENFV Solution Preparing Cisco ENCS Device for Deployment Deploying VNFs on Cisco ENCS Working with Cisco ENCS Orchestration Monitoring and Managing Cisco ENFV Components Additional course details: Nexus Humans Cisco Implementing Cisco Enterprise SD-Branch v1.0 (ENSDBI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Enterprise SD-Branch v1.0 (ENSDBI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). Planning an IoT Implementation Defining IoT IoT Infrastructure Identify Benefits and Challenges of IoT Undertaking an IoT Project Identify Real World Applications for IoT The IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Anyone responsible for maintaining, installing or migrating DB2 10 for z/OS to DB2 11 for z/OS, or installing DB2 11 for z/OS. Overview After completing this course, you should be able to:Prepare z/OS TSO environment to run the Install CLISTProvide appropriate parameters for the Install CLISTExecute the Install CLISTDefine DB2 10 for z/OS Define VSAM catalog and aliasDefine system data sets and databasesInitialize system data sets and databasesDefine DB2 10 for z/OS initialization parametersDefine user authorization exitsRecord DB2 11 for z/OS data to SMFEstablish subsystem securityVerify the DB2 10 for z/OS installationUpdate subsystem parametersCreate a new subsystem parameter moduleMigrate DB2 10 for z/OS to DB2 11 for z/OS Conversion ModeEnable DB2 11 for z/OS New Function ModeVerify migrationConvert the BSDS and Catalog/Directory to 10-byte RBA and LRSN usage This course is for installers of DB2 10 z/OS and/or migration to DB2 11 for z/OS using the Install CLIST. The participants are involved in lectures that explain DB2 11 components and pointers, and the processes used to install or migrate from DB2 10. Course Outline Installation preparation for DB2 10 for z/OS Installation CLIST Installing the DB2 10 subsystem Verification of DB2 10 with the sample applications Performing parameter update Migrating to DB2 11 conversion mode DB2 10 enabling-new-function and new-function modes Verification of DB2 11 with the sample applications 10-byte RBA and LRSN (new) Additional course details: Nexus Humans CV862 IBM DB2 11 for zOS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV862 IBM DB2 11 for zOS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers and engineers including: Network Engineer Systems Engineer Data Center Engineer Consulting Systems Engineer Technical Solutions Architect Cisco Integrators/Partners Field Engineer Server Administrator Network Manager Overview After taking this course, you should be able to: Describe the Cisco ACI built0in tools for operating and monitoring the fabric. Describe the complex challenges related to monitoring and Cisco tools that address them: Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights. Describe fabric installation upgrade, backup, restore, and best practices for Cisco NX-OS-to-ACI migration and Cisco ACI management access. Describe the tools and best practices for monitoring ACI fabric. Describe best practices for Cisco ACI naming conventions, Day-0 configuration, VMM integration, and Cisco ACI migrations. The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v5.2 course shows you how to manage, monitor, and troubleshoot Cisco© Nexus© 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. Through expert instruction and hands-on practice, you will learn about operational tools, best practices, caveats, and practice troubleshooting common issues on a live fabric. Based on lessons learned in wide range of production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment. Course Outline Describing Cisco ACI Day-0 to Day-2 Operations Describing Day-2 Operational Tools Describing Cisco ACI Configuration Management Describing Cisco ACI Monitoring Cisco ACI Best Practices Additional course details: Nexus Humans Cisco Application Centric Infrastructure Operations and Troubleshooting v5.2 (DCACIO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Application Centric Infrastructure Operations and Troubleshooting v5.2 (DCACIO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for application developers, business analysts, project managers and anyone who needs an introduction to application development in the IBM TRIRIGA Application Platform. Overview After completing this course you should be able to: Perform moderate-level IBM TRIRIGA application customizations by using the Platform Create and modify business objects by using the Data Modeler Create and modify user interfaces by using the Form Builder tool Define lists and classifications Import data by using the Data Integrator Implement business logic with workflows Create reports and queries by using the Report Manager and the IBM TRIRIGA Reporting Dashboard The course provides an introduction to the TRIRIGA Application platform and how to modify the existing TRIRIGA applications and processes or create new ones. The course covers navigation and mechanics of the TRIRIGA Application Platform toolset that is used for creating and modifying objects. Students are also provided background on importing data to TRIRIGA, how to use the Form Builder and the Reporting Dashboard. Course Outline Perform moderate-level IBM TRIRIGA application customizations by using the Platform Create and modify business objects by using the Data Modeler Create and modify user interfaces by using the Form Builder tool Define lists and classifications Import data by using the Data Integrator Implement business logic with workflows Create reports and queries by using the Report Manager and the IBM TRIRIGA Reporting Dashboard Additional course details: Nexus Humans 8D612 IBM TRIRIGA Application Platform v3.7 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 8D612 IBM TRIRIGA Application Platform v3.7 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.