Duration 3 Days 18 CPD hours This course is intended for This course is aimed at anyone who wants to harness the power of data analytics in their organization including: Business Analysts, Data Analysts, Reporting and BI professionals Analytics professionals and Data Scientists who would like to learn Python Overview This course teaches delegates with no prior programming or data analytics experience how to perform data manipulation, data analysis and data visualization in Python. Mastery of these techniques and how to apply them to business problems will allow delegates to immediately add value in their workplace by extracting valuable insight from company data to allow better, data-driven decisions. Outcome: After attending this course, delegates will: Be able to write effective Python code Know how to access their data from a variety of sources using Python Know how to identify and fix data quality using Python Know how to manipulate data to create analysis ready data Know how to analyze and visualize data to drive data driven decisioning across your organization Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. These programming languages are some of the most powerful and flexible tools in the data analytics toolkit. From business questions to data analytics, and beyond For data analytics tasks to affect business decisions they must be driven by a business question. This section will formally outline how to move an analytics project through key phases of development from business question to business solution. Delegates will be able: to describe and understand the general analytics process. to describe and understand the different types of analytics can be used to derive data driven solutions to business to apply that knowledge to their business context Basic Python Programming Conventions This section will cover the basics of writing R programs. Topics covered will include: What is Python? Using Anaconda Writing Python programs Expressions and objects Functions and arguments Basic Python programming conventions Data Structures in Python This section will look at the basic data structures that Python uses and accessing data in Python. Topics covered will include: Vectors Arrays and matrices Factors Lists Data frames Loading .csv files into Python Connecting to External Data This section will look at loading data from other sources into Python. Topics covered will include: Loading .csv files into a pandas data frame Connecting to and loading data from a database into a panda data frame Data Manipulation in Python This section will look at how Python can be used to perform data manipulation operations to prepare datasets for analytics projects. Topics covered will include: Filtering data Deriving new fields Aggregating data Joining data sources Connecting to external data sources Descriptive Analytics and Basic Reporting in Python This section will explain how Python can be used to perform basic descriptive. Topics covered will include: Summary statistics Grouped summary statistics Using descriptive analytics to assess data quality Using descriptive analytics to created business report Using descriptive analytics to conduct exploratory analysis Statistical Analysis in Python This section will explain how Python can be used to created more interesting statistical analysis. Topics covered will include: Significance tests Correlation Linear regressions Using statistical output to create better business decisions. Data Visualisation in Python This section will explain how Python can be used to create effective charts and visualizations. Topics covered will include: Creating different chart types such as bar charts, box plots, histograms and line plots Formatting charts Best Practices Hints and Tips This section will go through some best practice considerations that should be adopted of you are applying Python in a business context.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Microsoft 365 development platform or in passing the Microsoft 365 Developer Associate certification exam. Students should also have 1-2 years experience as a developer. This course assumes students know how to code and have a basic understanding of REST APIs, JSON, OAuth2, OData, OpenID Connect, Microsoft identities including Azure AD and Microsoft accounts, Azure AD B2C, and permission/consent concepts. Overview Implementing Microsoft Identity Working with Microsoft Graph Determining workload platform targets Integration Points, including Microsoft Teams, Office Add-ins, and SharePoint Framework This course covers five central elements of Microsoft 365 platform ? implementing Microsoft Identity, working with Microsoft Graph, extending and customizing SharePoint, extending Teams, and extending Office. In this course, students will learn how to implement Microsoft Identity and work with Microsoft Graph. Students will also gain the knowledge on UI elements (including Adaptive Cards and UI Fabric), Integration Points (including Microsoft Teams, Office Add-ins, SharePoint Framework, Actionable Messages), and determining workload platform targets. In implementing Microsoft Identity, students will learn to implement Microsoft identity including registering an application, implanting authentication, configuring permissions to consume an API, and creating a service to access Microsoft Graph. In working with Microsoft Graph, students will learn how to access user data, explore query parameters, manage a group lifecycle, access files, and optimize network traffic using Microsoft Graph. In extending and customizing SharePoint, students will learn about SharePoint Framework web parts, extensions, and how to package and deploy a SPFx solution. In extending Teams, students will look at the components of a Teams App, work with webhooks, tabs, and conversational bots. In extending Office, students work with Office Add-ins, task pane add-ins, JavaScript APIs, Office UI Fabric, and actionable messages with adaptive cards. Implement Microsoft Identity Microsoft Identity platform Register an Application Implement Authentication Configure Permissions to consume an API Implement Authorization to consume an API Implement Authorization in an API Create a Service to access Microsoft Graph Work with Microsoft Graph What is Microsoft Graph Access user data from Microsoft Graph Data usage with query parameters Manage a group lifecycle on Microsoft Graph Access files with Microsoft Graph Optimize network traffic Extend and Customize SharePoint SharePoint Framework web parts SharePoint Framework extensions Package and deploy a SPFx solution Consumption of Microsoft Graph Consumption of 3rd party APIs secured with Azure AD from within SPFx Web Parts as Teams Tabs Branding and theming in SharePoint Extend Teams Microsoft Teams App Webhooks in Microsoft Teams Tabs in Microsoft Teams Messaging extensions in Microsoft Teams Conversational bots in Microsoft Teams Extend Office Office Add-ins Office JS APIs Customization of Add-ins Testing, debugging, and deployment options Actionable message Additional course details: Nexus Humans MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Choosing a Database Programming Language What is Database Programming? PL?SQL Performance Advantages Integration wth Other Languages PL/SQL Language Fundamentals PL/SQL Program Structure LANGUAGE SYNTAX RULES EMBEDDING SQL WRITING READABLE CODE GENERATING DATABASE OUTPUT SQL*PLUS INPUT OF A PROGRAM BLOCK Declare Section About the Declare Section DECLARE PRIMITIVE TYPES DECLARATION OPTIONS NOT NULL CONSTANT DATA DICTIONARY INTEGRATION %TYPE DECLARE SIMPLE USER---DEFINED TYPES TYPE... TABLE TYPE... RECORD EXTENDED USER---DEFINED TYPES Begin Section About the Begin Section Manipulating Program Data Logic Control & Branching GOTO LOOP IF-THEN-ELSE CASE Exception Section ABOUT THE EXCEPTION SECTION ISOLATING THE SPECIFIC EXCEPTION PRAGMA EXCEPTION_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT &SELECT...INTO Beyond the Basics: Explicit Cursors ABOUT EXPLICIT CURSORS EXTENDED CURSOR TECHNIQUES FOR UPDATE OF Clause WHERE CURRENT OF Clause Using FOR?LOOP Cursors Beyond the Basics: Nested BlocksBeyond the Basics: Declared Subprograms USING DECLARED SUBPROGRAMS DECLARED PROCEDURE DECLARED FUNCTION Introducing Databse-Resident Program Units ABOUT DATABASE---RESIDENT PROGRAMS PHYSICAL STORAGE & EXECUTION TYPES OF STORED PROGRAM UNITS STORED PROGRAM UNIT ADVANTAGES MODULAR DESIGN PRINCIPLES Creating Stored Procedures & Functions STORED PROCEDURES & FUNCTIONS CREATE PROCEDURE / CREATE FUNCTION CREATING PROCEDURES & FUNCTIONS RAISE_SALARY() Procedure SALARY_VALID() Function THE PARAMETER SPECIFICATION DEFAULT Clause SYSTEM & OBJECT PRIVILEGES USING THE DEVELOPMENT TOOLS Executing Stored Procedures & Functions CALLING PROCEDURES & FUNCTIONS UNIT TESTING WITH EXECUTE ANONYMOUS BLOCK UNIT TESTING SPECIFYING A PARAMETER NOTATION SQL WORKSHEET UNIT TESTING CALLING FUNCTIONS FROM SQL Maintaining Stored Program Units RECOMPILING PROGRAMS Mass Recompilation Using UTL_RECOMP() DROPPING PROCEDURES & FUNCTIONS DROP PROCEDURE / FUNCTION DATA DICTIONARY METADATA Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies DEPENDENCY INTERNALS TRACKING DEPENDENCIES THE DEPENDENCY TRACKING UTILITY SQL DEVELOPER DEPENDENCY INFO DEPENDENCY STRATEGY CHECKLISTS Creating & Maintaining Packages ABOUT PACKAGES CREATING PACKAGES MAINTAINING PACKAGES PERFORMANCE CONSIDERATIONS Advanced Package Capabilities DEFINER & INVOKER RIGHTS WHITE LITS & ACCESSIBLE BY PERSISTENT GLOBAL OBJECTS DEFINING INITIALIZATION LOGIC OBJECT ORIENTATION SUPPORT Advanced Cursor Techniques USING CUSROS VARIABLES USING SYS_REFCURSOR USING CURSOR EXPRESSIONS Using System-Supplied Package DBMS_OUTPUT() UTL_FILE() FOPEN() EXAMPLE Database Trigger Concepts ABOUT DATABASE TRIGGERS DML EVENT TRIGGER SUB---TYPES DATABASE TRIGGER SCENARIO TRIGGER EXECUTION MECHANISMS TRIGGERS WITHIN SQL WORKSHEET Creating Database Triggers STATEMENT-LEVEL TRIGGERS Using RAISE_APPLICATION_ERROR() ROW---LEVEL TRIGGERS EXAMPLES OF TRIGGERS EMPLOYEE_SALARY_CHECK Example EMPLOYEE_JOURNAL Example BUDGET_EVENT Example INSTEAD OF TRIGGERS TRIGGERS WITHIN AN APPLICATION Maintaining Database Triggers CALL SYNTAX TRIGGER MAINTENANCE TASKS SHOW ERRORS TRIGGER DROP TRIGGER ALTER TRIGGER MULTIPLE TRIGGERS FOR A TABLE HANDLING MUTATING TABLE ISSUES Implementing System Event Triggers WHAT ARE SYSTEM EVENT TRIGGERS? DEFININGTHE SCOPE AVAILABLE SYSTEM EVENTS SYSTEM EVENT ATTRIBUTES
Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced Programmers and Systems Administrators. Overview Throughout the course students will be led through a series of progressively advanced topics, where each topic consists of lecture, group discussion, comprehensive hands-on lab exercises, and lab review. This course is ?skills-centric?, designed to train attendees in core Python and web development skills beyond an intermediate level, coupling the most current, effective techniques with best practices. Working within in an engaging, hands-on learning environment, guided by our expert Python practitioner, students will learn to: ? Create working Python scripts following best practices ? Use python data types appropriately ? Read and write files with both text and binary data ? Search and replace text with regular expressions ? Get familiar with the standard library and its work-saving modules ? Use lesser-known but powerful Python data types ? Create 'real-world', professional Python applications ? Work with dates, times, and calendars ? Know when to use collections such as lists, dictionaries, and sets ? Understand Pythonic features such as comprehensions and iterators ? Write robust code using exception handling An introductory and beyond-level practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features. An Overview of Python What is python? 1 -- An overview of Python What is python? Python Timeline Advantages/Disadvantages of Python Getting help with pydoc The Python Environment Starting Python Using the interpreter Running a Python script Python scripts on Unix/Windows Editors and IDEs Getting Started Using variables Built-in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control White space Conditional expressions Relational and Boolean operators While loops Alternate loop exits Sequences About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Generator Expressions Nested sequences Working with files File overview Opening a text file Reading a text file Writing to a text file Reading and writing raw (binary) data Converting binary data with struct Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Parameters Global and local scope Nested functions Returning values Sorting The sorted() function Alternate keys Lambda functions Sorting collections Using operator.itemgetter() Reverse sorting Errors and Exception Handling Syntax errors Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages The import statement Module search path Creating Modules Using packages Function and Module aliases Classes About o-o programming Defining classes Constructors Methods Instance data Properties Class methods and data Regular Expressions RE syntax overview RE Objects Searching and matching Compilation flags Groups and special groups Replacing text Splitting strings The standard library The sys module Launching external programs Math functions Random numbers The string module Reading CSV data Dates and times Working with dates and times Translating timestamps Parsing dates from text Formatting dates Calendar data Working with the file system Paths, directories, and filenames Checking for existence Permissions and other file attributes Walking directory trees Creating filters with fileinput Using shutil for file operations 17 ? Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Network services Grabbing web content Sending email Using SSH for remote access Using FTP Writing real-life applications Parsing command-line options Detecting the current platform Trapping signals Implementing logging Python Timeline Advantages/Disadvantages of Python Getting help with pydoc
Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws
Duration 3 Days 18 CPD hours This course is intended for This course is for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface. Overview After completing this course, students will be able to: Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Use intersite connectivity features including VNet Peering and VNet-to-VNet connections Work with Azure Active Directory (AAD) and Azure AD Connect As an IT Professionals experienced in SAP solutions, you will discover how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. You will also be introduced to concepts, scenarios, procedures, and hands-on labs that will empower you to best plan and implement migration and operation of an SAP solution on Azure. You will also receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. Introduction Contains an overview of the SAP and Microsoft partnership. Foundations of SAP on Azure Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services. SAP Certified Offerings on Azure Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP. Lab : Online Lab: Implementing Linux clustering on Azure VMs Lab : Online Lab: Implementing Windows clustering on Azure VMs SAP on Azure Reference Architecture Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs. Planning for Implementing SAP Solutions on Azure Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations. Planning for Migrating SAP Workloads to Azure Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist. Implementing Azure VM-based SAP Solutions Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication. Module 8-Deploying HANA Large Instances (HLI) Contains a lesson on implementing HANA Large Instances (HLI). Migrating SAP Workloads to Azure Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure. Lab : Online Lab-Implement SAP architecture on Azure VMs running Linux Lab : Online Lab-Implement SAP architecture on Azure VMs running Windows Maintaining SAP on Azure Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR). Monitoring and Troubleshooting SAP on Azure Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. Implement Azure Active Directory Overview of Azure Active Directory Users and Groups Domains and Custom Domains Azure AD Identity Protection Implement Conditional Access Configure Fraud Alerts for MFA Implement Bypass Options Configure Guest Users in Azure AD Configure Trusted IPs Manage Multiple Directories Implement and Manage Hybrid Identities Install and Configure Azure AD Connect Configure Password Sync and Password Writeback Configure Azure AD Connect Health Implement Virtual Networking Virtual Network Peering Implement VNet Peering Implement VMs for Windows and Linux Select Virtual Machine Size Configure High Availability Implement Azure Dedicated Hosts Deploy and Configure Scale Sets Configure Azure Disk Encryption Implement Load Balancing and Network Security Implement Azure Load Balancer Implement an Application Gateway Understand Web Application Firewall Implement Azure Firewall Implement Azure Front Door Implementing Azure Traffic Manager Implement Storage Accounts Storage Accounts Blob Storage Storage Security Managing Storage Accessing Blobs and Queues using AAD Implement NoSQL Databases Configure Storage Account Tables Select Appropriate CosmosDB APIs Implement Azure SQL Databases Configure Azure SQL Database Settings Implement Azure SQL Database Managed Instances High-Availability and Azure SQL Database In this module, you will learn how to Create an Azure SQL Database (single database) Create an Azure SQL Database Managed Instance Recommend high-availability architectural models used in Azure SQL Database Automate Deployment and Configuration of Resources Azure Resource Manager Templates Save a Template for a VM Evaluate Location of New Resources Configure a Virtual Hard Disk Template Deploy from a template Create and Execute an Automation Runbook Implement and Manage Azure Governance Create Management Groups, Subscriptions, and Resource Groups Overview of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) Roles Azure AD Access Reviews Implement and Configure an Azure Policy Azure Blueprints Manage Security for Applications Azure Key Vault Azure Managed Identity Manage Workloads in Azure Migrate Workloads using Azure Migrate VMware - Agentless Migration VMware - Agent-Based Migration Implement Azure Backup Azure to Azure Site Recovery Implement Azure Update Management Implement Container-Based Applications Azure Container Instances Configure Azure Kubernetes Service Implement an Application Infrastructure Create and Configure Azure App Service Create an App Service Web App for Containers Create and Configure an App Service Plan Configure Networking for an App Service Create and Manage Deployment Slots Implement Logic Apps Implement Azure Functions Implement Cloud Infrastructure Monitoring Azure Infrastructure Security Monitoring Azure Monitor Azure Workbooks Azure Alerts Log Analytics Network Watcher Azure Service Health Monitor Azure Costs Azure Application Insights Unified Monitoring in Azure