Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting
Duration 4 Days 24 CPD hours This course is intended for This course is best suited to systems administrators and IT managers. Overview Skills gained in this training include:Determining the correct hardware and infrastructure for your clusterProper cluster configuration and deployment to integrate with the data centerConfiguring the FairScheduler to provide service-level agreements for multiple users of a clusterBest practices for preparing and maintaining Apache Hadoop in productionTroubleshooting, diagnosing, tuning, and solving Hadoop issues Cloudera University?s four-day administrator training course for Apache Hadoop provides participants with a comprehensive understanding of all the steps necessary to operate and maintain a Hadoop cluster. The Case for Apache Hadoop Why Hadoop? Core Hadoop Components Fundamental Concepts HDFS HDFS Features Writing and Reading Files NameNode Memory Considerations Overview of HDFS Security Using the Namenode Web UI Using the Hadoop File Shell Getting Data into HDFS Ingesting Data from External Sources with Flume Ingesting Data from Relational Databases with Sqoop REST Interfaces Best Practices for Importing Data YARN & MapReduce What Is MapReduce? Basic MapReduce Concepts YARN Cluster Architecture Resource Allocation Failure Recovery Using the YARN Web UI MapReduce Version 1 Planning Your Hadoop Cluster General Planning Considerations Choosing the Right Hardware Network Considerations Configuring Nodes Planning for Cluster Management Hadoop Installation and Initial Configuration Deployment Types Installing Hadoop Specifying the Hadoop Configuration Performing Initial HDFS Configuration Performing Initial YARN and MapReduce Configuration Hadoop Logging Installing and Configuring Hive, Impala, and Pig Hive Impala Pig Hadoop Clients What is a Hadoop Client? Installing and Configuring Hadoop Clients Installing and Configuring Hue Hue Authentication and Authorization Cloudera Manager The Motivation for Cloudera Manager Cloudera Manager Features Express and Enterprise Versions Cloudera Manager Topology Installing Cloudera Manager Installing Hadoop Using Cloudera Manager Performing Basic Administration Tasks Using Cloudera Manager Advanced Cluster Configuration Advanced Configuration Parameters Configuring Hadoop Ports Explicitly Including and Excluding Hosts Configuring HDFS for Rack Awareness Configuring HDFS High Availability Hadoop Security Why Hadoop Security Is Important Hadoop?s Security System Concepts What Kerberos Is and How it Works Securing a Hadoop Cluster with Kerberos Managing and Scheduling Jobs Managing Running Jobs Scheduling Hadoop Jobs Configuring the FairScheduler Impala Query Scheduling Cluster Maintainence Checking HDFS Status Copying Data Between Clusters Adding and Removing Cluster Nodes Rebalancing the Cluster Cluster Upgrading Cluster Monitoring & Troubleshooting General System Monitoring Monitoring Hadoop Clusters Common Troubleshooting Hadoop Clusters Common Misconfigurations Additional course details: Nexus Humans Cloudera Administrator Training for Apache Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Administrator Training for Apache Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Microsoft 365 development platform or in passing the Microsoft 365 Developer Associate certification exam. Students should also have 1-2 years experience as a developer. This course assumes students know how to code and have a basic understanding of REST APIs, JSON, OAuth2, OData, OpenID Connect, Microsoft identities including Azure AD and Microsoft accounts, Azure AD B2C, and permission/consent concepts. Overview Implementing Microsoft Identity Working with Microsoft Graph Determining workload platform targets Integration Points, including Microsoft Teams, Office Add-ins, and SharePoint Framework This course covers five central elements of Microsoft 365 platform ? implementing Microsoft Identity, working with Microsoft Graph, extending and customizing SharePoint, extending Teams, and extending Office. In this course, students will learn how to implement Microsoft Identity and work with Microsoft Graph. Students will also gain the knowledge on UI elements (including Adaptive Cards and UI Fabric), Integration Points (including Microsoft Teams, Office Add-ins, SharePoint Framework, Actionable Messages), and determining workload platform targets. In implementing Microsoft Identity, students will learn to implement Microsoft identity including registering an application, implanting authentication, configuring permissions to consume an API, and creating a service to access Microsoft Graph. In working with Microsoft Graph, students will learn how to access user data, explore query parameters, manage a group lifecycle, access files, and optimize network traffic using Microsoft Graph. In extending and customizing SharePoint, students will learn about SharePoint Framework web parts, extensions, and how to package and deploy a SPFx solution. In extending Teams, students will look at the components of a Teams App, work with webhooks, tabs, and conversational bots. In extending Office, students work with Office Add-ins, task pane add-ins, JavaScript APIs, Office UI Fabric, and actionable messages with adaptive cards. Implement Microsoft Identity Microsoft Identity platform Register an Application Implement Authentication Configure Permissions to consume an API Implement Authorization to consume an API Implement Authorization in an API Create a Service to access Microsoft Graph Work with Microsoft Graph What is Microsoft Graph Access user data from Microsoft Graph Data usage with query parameters Manage a group lifecycle on Microsoft Graph Access files with Microsoft Graph Optimize network traffic Extend and Customize SharePoint SharePoint Framework web parts SharePoint Framework extensions Package and deploy a SPFx solution Consumption of Microsoft Graph Consumption of 3rd party APIs secured with Azure AD from within SPFx Web Parts as Teams Tabs Branding and theming in SharePoint Extend Teams Microsoft Teams App Webhooks in Microsoft Teams Tabs in Microsoft Teams Messaging extensions in Microsoft Teams Conversational bots in Microsoft Teams Extend Office Office Add-ins Office JS APIs Customization of Add-ins Testing, debugging, and deployment options Actionable message Additional course details: Nexus Humans MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke cloud security environment. Describe the function of the Cloud Management Extension Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in Azure. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in Azure. Describe the workflow for configuring scaling solutions in Azure. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in Azure. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in Azure. Explain the steps required for troubleshooting Scaling Solution issues in Azure. Describe the steps required for troubleshooting clusters in Azure. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Deploy a Security Management Server. Connect to SmartConsole. Configure Azure Active Directory and the Service Principle. Install the Cloud Management Extension. Configure the Cloud Management Extension. Configure the Access Control Policy. Assign the Service Principle. Create the CloudGuard Controller Object. Configure Access Control Policy with a Data Center Object. Deploy the Spoke vNets. Create the Spoke Route Table. Deploy Web Servers into the Spoke vNets. Deploy the Virtual Machine Scale Set. Assign the Service Principle to the VMSS Resource Group. Enable Indentity Awareness on the VMSS. Create Load Balancer Rules. Create vNet Peers. Create Web Server Access Control policy. Deploy the Azure High Availability Solution. Create the Cluster Object. Configure the vNet Peering. Create the Internal User Defined Routes. Create the Security Policy for Internal Traffic. Test the Internal Traffic. Troubleshoot the CloudGuard Controller. Debugs the CloudGuard Controller. Debug the Cloud Management Extension. Additional course details: Nexus Humans CNSE-Azure Check Point Network Security Expert for Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-Azure Check Point Network Security Expert for Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is aimed at anyone who wants to harness the power of data analytics in their organization including: Business Analysts, Data Analysts, Reporting and BI professionals Analytics professionals and Data Scientists who would like to learn Python Overview This course teaches delegates with no prior programming or data analytics experience how to perform data manipulation, data analysis and data visualization in Python. Mastery of these techniques and how to apply them to business problems will allow delegates to immediately add value in their workplace by extracting valuable insight from company data to allow better, data-driven decisions. Outcome: After attending this course, delegates will: Be able to write effective Python code Know how to access their data from a variety of sources using Python Know how to identify and fix data quality using Python Know how to manipulate data to create analysis ready data Know how to analyze and visualize data to drive data driven decisioning across your organization Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. These programming languages are some of the most powerful and flexible tools in the data analytics toolkit. From business questions to data analytics, and beyond For data analytics tasks to affect business decisions they must be driven by a business question. This section will formally outline how to move an analytics project through key phases of development from business question to business solution. Delegates will be able: to describe and understand the general analytics process. to describe and understand the different types of analytics can be used to derive data driven solutions to business to apply that knowledge to their business context Basic Python Programming Conventions This section will cover the basics of writing R programs. Topics covered will include: What is Python? Using Anaconda Writing Python programs Expressions and objects Functions and arguments Basic Python programming conventions Data Structures in Python This section will look at the basic data structures that Python uses and accessing data in Python. Topics covered will include: Vectors Arrays and matrices Factors Lists Data frames Loading .csv files into Python Connecting to External Data This section will look at loading data from other sources into Python. Topics covered will include: Loading .csv files into a pandas data frame Connecting to and loading data from a database into a panda data frame Data Manipulation in Python This section will look at how Python can be used to perform data manipulation operations to prepare datasets for analytics projects. Topics covered will include: Filtering data Deriving new fields Aggregating data Joining data sources Connecting to external data sources Descriptive Analytics and Basic Reporting in Python This section will explain how Python can be used to perform basic descriptive. Topics covered will include: Summary statistics Grouped summary statistics Using descriptive analytics to assess data quality Using descriptive analytics to created business report Using descriptive analytics to conduct exploratory analysis Statistical Analysis in Python This section will explain how Python can be used to created more interesting statistical analysis. Topics covered will include: Significance tests Correlation Linear regressions Using statistical output to create better business decisions. Data Visualisation in Python This section will explain how Python can be used to create effective charts and visualizations. Topics covered will include: Creating different chart types such as bar charts, box plots, histograms and line plots Formatting charts Best Practices Hints and Tips This section will go through some best practice considerations that should be adopted of you are applying Python in a business context.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Choosing a Database Programming Language What is Database Programming? PL?SQL Performance Advantages Integration wth Other Languages PL/SQL Language Fundamentals PL/SQL Program Structure LANGUAGE SYNTAX RULES EMBEDDING SQL WRITING READABLE CODE GENERATING DATABASE OUTPUT SQL*PLUS INPUT OF A PROGRAM BLOCK Declare Section About the Declare Section DECLARE PRIMITIVE TYPES DECLARATION OPTIONS NOT NULL CONSTANT DATA DICTIONARY INTEGRATION %TYPE DECLARE SIMPLE USER---DEFINED TYPES TYPE... TABLE TYPE... RECORD EXTENDED USER---DEFINED TYPES Begin Section About the Begin Section Manipulating Program Data Logic Control & Branching GOTO LOOP IF-THEN-ELSE CASE Exception Section ABOUT THE EXCEPTION SECTION ISOLATING THE SPECIFIC EXCEPTION PRAGMA EXCEPTION_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT &SELECT...INTO Beyond the Basics: Explicit Cursors ABOUT EXPLICIT CURSORS EXTENDED CURSOR TECHNIQUES FOR UPDATE OF Clause WHERE CURRENT OF Clause Using FOR?LOOP Cursors Beyond the Basics: Nested BlocksBeyond the Basics: Declared Subprograms USING DECLARED SUBPROGRAMS DECLARED PROCEDURE DECLARED FUNCTION Introducing Databse-Resident Program Units ABOUT DATABASE---RESIDENT PROGRAMS PHYSICAL STORAGE & EXECUTION TYPES OF STORED PROGRAM UNITS STORED PROGRAM UNIT ADVANTAGES MODULAR DESIGN PRINCIPLES Creating Stored Procedures & Functions STORED PROCEDURES & FUNCTIONS CREATE PROCEDURE / CREATE FUNCTION CREATING PROCEDURES & FUNCTIONS RAISE_SALARY() Procedure SALARY_VALID() Function THE PARAMETER SPECIFICATION DEFAULT Clause SYSTEM & OBJECT PRIVILEGES USING THE DEVELOPMENT TOOLS Executing Stored Procedures & Functions CALLING PROCEDURES & FUNCTIONS UNIT TESTING WITH EXECUTE ANONYMOUS BLOCK UNIT TESTING SPECIFYING A PARAMETER NOTATION SQL WORKSHEET UNIT TESTING CALLING FUNCTIONS FROM SQL Maintaining Stored Program Units RECOMPILING PROGRAMS Mass Recompilation Using UTL_RECOMP() DROPPING PROCEDURES & FUNCTIONS DROP PROCEDURE / FUNCTION DATA DICTIONARY METADATA Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies DEPENDENCY INTERNALS TRACKING DEPENDENCIES THE DEPENDENCY TRACKING UTILITY SQL DEVELOPER DEPENDENCY INFO DEPENDENCY STRATEGY CHECKLISTS Creating & Maintaining Packages ABOUT PACKAGES CREATING PACKAGES MAINTAINING PACKAGES PERFORMANCE CONSIDERATIONS Advanced Package Capabilities DEFINER & INVOKER RIGHTS WHITE LITS & ACCESSIBLE BY PERSISTENT GLOBAL OBJECTS DEFINING INITIALIZATION LOGIC OBJECT ORIENTATION SUPPORT Advanced Cursor Techniques USING CUSROS VARIABLES USING SYS_REFCURSOR USING CURSOR EXPRESSIONS Using System-Supplied Package DBMS_OUTPUT() UTL_FILE() FOPEN() EXAMPLE Database Trigger Concepts ABOUT DATABASE TRIGGERS DML EVENT TRIGGER SUB---TYPES DATABASE TRIGGER SCENARIO TRIGGER EXECUTION MECHANISMS TRIGGERS WITHIN SQL WORKSHEET Creating Database Triggers STATEMENT-LEVEL TRIGGERS Using RAISE_APPLICATION_ERROR() ROW---LEVEL TRIGGERS EXAMPLES OF TRIGGERS EMPLOYEE_SALARY_CHECK Example EMPLOYEE_JOURNAL Example BUDGET_EVENT Example INSTEAD OF TRIGGERS TRIGGERS WITHIN AN APPLICATION Maintaining Database Triggers CALL SYNTAX TRIGGER MAINTENANCE TASKS SHOW ERRORS TRIGGER DROP TRIGGER ALTER TRIGGER MULTIPLE TRIGGERS FOR A TABLE HANDLING MUTATING TABLE ISSUES Implementing System Event Triggers WHAT ARE SYSTEM EVENT TRIGGERS? DEFININGTHE SCOPE AVAILABLE SYSTEM EVENTS SYSTEM EVENT ATTRIBUTES
Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws