• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6889 Courses in Birmingham delivered Live Online

Junos Space Network Director

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course benefits individuals responsible for managing Junos switching with EX Series, QFX Series, QFabric and virtualized devices using the Network Director software in an enterprise network environment. Overview After successfully completing this course, you should be able to: Explain the role of the Network Director.Describe the Network Director modes.Describe how to build and deploy profiles.Explain how to monitor managed devices.Discuss how to generate reports through Network Director. This course is designed to provide students with the knowledge required to manage the Junos Space Network Director application and to manage devices with that application. Students will gain in-depth knowledge of how to work with Network Director. Through demonstrations and hands-on labs, students will gain experience with the features of Network Director. Chapter 1: Course IntroductionChapter 2: Network Director Modes Network Director Overview Network Director Modes Chapter 3: Wired Device Management Wired Device Management Configuring and Deploying Wired Device Profiles Working with Network Director Lab Chapter 4: Implementing Zero Touch Provisioning Function and Internal Workings of ZTP Configure and Implement ZTP with Network Director Implementing ZTP Lab Chapter 5: Virtualization Management in Network Director Virtual Systems and Network Director Overview Discovering and Managing Virtual Systems Enabling and Using Orchestration Managing Virtual Systems Lab Appendix A: QFabric Management Discovering and Managing QFabric Systems Generating Reports in QFabric Additional course details: Nexus Humans Junos Space Network Director training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Junos Space Network Director course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Junos Space Network Director
Delivered OnlineFlexible Dates
Price on Enquiry

iPhone Mobile App Development

By Nexus Human

Duration 5 Days 30 CPD hours The iPhone combines technologies of smartphones and personal computing. With a multitouch screen, built-in accelerometer and virtual keyboard, the iPhone also requires the mobile application developer to adopt a vastly different software design philosophy. With over a billion mobile apps sold, iPhone Programming is a critical part of the future of mobile technology. This five day course teaches the attendee all aspects of iOS mobile app development Introduction and Setup Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement Overview of Swift Functions The Basics of Object Oriented Programming in Swift Swift Subclassing and Extensions Arrays and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, and Storyboards Creating an Interactive iOS App Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Size Classes to Design Adaptable Universal iOS User Interfaces Using Storyboards in Xcode Organizing Scenes over Multiple Xcode Storyboard Files Using Xcode Storyboards to Create an iOS Tab Bar Application Working with the iOS Stack View Class iOS Stack View Tutorial iOS Split View Master-Detail Example Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController iOS UIPageViewController Application Data Storage with Files, iCloud, and Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS iOS Directory Handling and File I/O in Swift Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite SQLite based iOS Application using Swift and FMDB Working with iOS Databases using Core Data iOS Core Data Introduction to CloudKit Data Storage on iOS iOS CloudKit Example iOS CloudKit Subscription Example Touch, Taps, and Gestures An Overview of iOS Multitouch, Taps and Gestures iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS Gesture Recognition iOS 3D Touch Force Handling iOS 3D Touch Quick Actions iOS 3D Touch Peek and Pop Advanced View Options Basic iOS Animation using Core Animation iOS UIKit Dynamics ? An Overview Introduction to iOS Sprite Kit Programming iOS Sprite Kit Level Editor Game iOS Sprite Kit Collision Handling Extensions Introduction to Extensions in iOS iOS Today Extension Widget Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Multimedia, Facebook, and Twitter Accessing the iOS Camera and Photo Library iOS Camera Application iOS Video Playback using AVPlayer and AVPlayerViewController iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder The App Store Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iPhone Mobile App Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPhone Mobile App Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

iPhone Mobile App Development
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to PHP Training

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is Intended for students with HTML Experience. Overview At the completion of the course, you will be able to: How PHP works. The basic syntax of PHP. Create dynamic interactive pages with PHP. Manipulate files with PHP. Work with arrays in PHP. Validate forms with PHP. Write functions in PHP. Manipulate and manage database data with PHP. Authenticate users with PHP. Manage sessions with PHP. Work with the MDB2 package. Learn advanced form validation with regular expressions. Send email with PHP. In this PHP training course, students will learn to create database-driven websites using PHP and MySQL or the database of their choice. PHP Basics How PHP Works The php.ini File Basic PHP Syntax Variables First PHP Script PHP Operators Creating Dynamic Pages Passing Variables via the Query String Flow Control Conditional Processing Working with Conditions Loops Working with Loops Arrays Enumerated Arrays Working with Enumerated Arrays Associative Arrays Working with Associative Arrays Two-dimensional Arrays Array Manipulation Functions PHP and HTML Forms HTML Forms Processing Form Input String Manipulation Formatting Strings Working with String Manipulation Functions Magic Quotes Reusing Code and Writing Functions Including Files Adding a Header and Footer User Functions Form Processing Form Validation and Presentation Functions Managing Data Querying a Database Inserting Records Authentication with PHP and SQL A Database-less Login Form Authenticating Users Regular Expressions Perl-compatible Regular Expression Functions Regular Expression Syntax Form Validation Functions with Regular Expressions Session Control and Cookies Sessions Cookies Authentication with Session Control Sending Email with PHP mail() PHPMailer Sending a Password by Email File System Management Opening a File Reading from a File Writing to a File Writing to a File File Locking Uploading Files via an HTML Form Getting File Information More File Functions Directory Functions Creating a Resume Management Page

Introduction to PHP Training
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

ICCC-CT-Installing and Configuring Cisco Cube/Gateways

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer In this 3 Day Cisco Course, students will learn how to deploy Voice Gateways/CUBE and setup Cisco Unified Communication Manager (CUCM) to deploy SIP Trunking. The course starts out with an overview of Cisco gateways and their uses. Next, students learn about MGCP and SIP and how to implement each protocol. Students will then learn how to use Cisco CUBE to connect CUCM, Gateways and Service Providers together. This course details how to connect a Cisco environment to a Service Provider using a Cisco CUBE. Introduction to Voice Gateways Cisco UC Networks and the Role of Gateways Gateway Call Routing and Call Legs Configuring Gateway Voice Ports DSP Functionality, Codecs, and Codec Complexity Router Requirements for CUBE SIP Protocol Overview Gateway Dial Plans VoIP Call Legs Dial Plan Implementation Configuring (CUCM) Cisco Unified Communication Manager 12.5 Cisco UCM Audio Codec Preference List Cisco UCM Region Configuration Device Pool Configuration Annunciator Configuration Conference Bridge Configuration Media Termination Point Configuration Music on Hold Server Configuration Music on Hold Service (IP Voice Media Streaming App) Parameter Settings Music on Hold Service (Duplex Streaming) Parameter Settings Media Resource Group Configuration Media Resource Group List Configuration UC Service Configuration Service Profile Configuration End User Configuration SIP Trunk Security Profile Configuration used by SIP trunk to Cisco UBE SIP Profile Configuration used by SIP trunk to Cisco UBE SIP Trunk to Cisco UBE Configuration Route Pattern Configuration Configuring Cisco Unified Border Element (CUBE) Deploying Cisco VCUBE CUCM to CUBE Integration Configuration Steps to connecting to a SIP Trunk Provider Interworking Security and Call Admission Control Media Manipulation, Enhancement & Optimization SIP UA Translation Rules VoIP Dial Peer SIP Registration SIP attributes of CUBE Transcoding services Creating and configuring Sip Trunks CUBE Configuration CUBE Call Flow CUBE Dial-Peers Call Routing CUBE Advanced Call Routing Media Manipulation External/PSTN Call Recording Call Admission Control Multiple Non-Authenticated SIP Trunks on a CUBE Multiple Authenticated/Registered SIP Trunks on a CUBE Configuring High Availability High availability on ISR G2 High availability on ISR 4k High availability on ASR Cisco Unified Border Element (CUBE) Security Five Layers of Security in CUBE SIP TLS Support with SRTP Monitoring and Troubleshooting Cisco CUBE Dialed Number Analyzer (DNA) for CUBE SIP Profile Test Tool Troubleshooting Serviceability

ICCC-CT-Installing and Configuring Cisco Cube/Gateways
Delivered OnlineFlexible Dates
Price on Enquiry

GRC100 Principles of SAP Governance, Risk, and Compliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration

GRC100 Principles of SAP Governance, Risk, and Compliance
Delivered OnlineFlexible Dates
Price on Enquiry

Google Cloud Fundamentals for Azure Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Platform Developers, systems operations professionals, and solution architects getting started with Google Cloud Platform Executives and business decision makers evaluating the potential of Google Cloud Platform to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for Azure IaaS, Azure PaaS, Azure SQL, Azure Blob Storage, Azure Application Insights, and Azure Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing,storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This 1-day instructor led course introduces Azure professionals to the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database. It is designed for Azure system administrators, Solution Architects and SysOps Administrators familiar with Azure features and setup; and want to gain experience configuring Google Cloud products immediately. With presentations, demos, and hands-on labs, participants get details of similarities, differences, and initial how-tos quickly. Introducing Google Cloud Explain the advantages of Google Cloud. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Identify the purpose of projects on Google Cloud. Understand how Azure's resource hierarchy differs from Google Cloud's Understand the purpose of and use cases for Identity and Access Management. Understand how Azure AD differs from Google Cloud IAM. List the methods of interacting with Google Cloud. Launch a solution using Cloud Marketplace. Virtual Machines in the Cloud Identify the purpose and use cases for Google Compute Engine Understand the basics of networking in Google Cloud. Understand how Azure VPC differs from Google VPC. Understand the similarities and differences between Azure VM and Google Compute Engine. Understand how typical approaches to load-balancing in Google Cloud differ from those in Azure. Deploy applications using Google Compute Engine Storage in the Cloud Understand the purpose of and use cases for: Cloud Storage, Cloud SQL, Cloud Bigtable and Cloud Datastore. Understand how Azure Blob compares to Cloud Storage. Compare Google Cloud?s managed database services with Azure SQL. Learn how to choose among the various storage options on Google Cloud. Load data from Cloud Storage into BigQuery Containers in the Cloud Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Understand how Azure Kubernetes Service differs from from Google Kubernetes Engine. Provision a Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl Applications in the Cloud Understand the purpose of and use cases for Google App Engine. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand how App Engine differs from Azure App Service. Understand the purpose of and use cases for Google Cloud Endpoints. Developing, Deploying and Monitoring in the Cloud Understand options for software developers to host their source code. Understand the purpose of template-based creation and management of resources. Understand how Google Cloud Deployment Manager differs from Azure Resource Manager. Understand the purpose of integrated monitoring, alerting, and debugging Understand how Google Monitoring differs from Azure Application Insights and Azure Log Analytics. Create a Deployment Manager deployment. Update a Deployment Manager deployment. View the load on a VM instance using Google Monitoring. Big Data and Machine Learning in the Cloud Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Understand how Google Cloud BigQuery differs from Azure Data Lake. Understand how Google Cloud Pub/Sub differs from Azure Event Hubs and Service Bus. Understand how Google Cloud?s machine-learning APIs differ from Azure's. Load data into BigQuery from Cloud Storage. Perform queries using BigQuery to gain insight into data Summary and Review Review the products that make up Google Cloud and remember how to choose among them Understand next steps for training and certification Understand, at a high level, the process of migrating from Azure to Google Cloud.

Google Cloud Fundamentals for Azure Professionals
Delivered OnlineFlexible Dates
Price on Enquiry

WM646 IBM Integration Bus V10 System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IBM Integration Bus administrators and developers who administer IBM Integration Bus. Overview After completing this course, you should be able to:Install and configure an IBM Integration Bus instanceEstablish, maintain, and manage an integration nodeAdminister IBM Integration Bus components and message flow applications by using the IBM Integration web user interface and command interfaceConfigure connectivity to IBM MQ to enable IBM Integration Bus to get messages from, or put messages to, queues on a local or remote queue managerImplement IBM Integration Bus administration and message flow securityUse problem determination aids to diagnose and solve development and runtime errorsUse the IBM Integration web user interface to generate and display message flow statisticsUse IBM MQ or MQTT to publish and subscribe to IBM Integration Bus topicsImplement an IBM Integration Bus global cache to store, reuse, and share data between integration nodesUse workload management policies to adjust the processing speed of messages and control the actions that are taken on unresponsive flows and threadsUse the IBM Integration web user interface and a database to record events and replay messagesEnable an integration node to connect to a database with ODBC and JDBCConfigure a Java Message Services (JMS) provider for use with the JMS nodesConfigure IBM Integration Bus for the secure file transfer protocol (SFTP)Find and install IBM Integration Bus SupportPac components In this course, students learn how to administer IBM Integration Bus on distributed operating systems, such as Windows and AIX, by using the IBM Integration Bus administrative interfaces. Course Outline Course introduction IBM Integration Bus overview Product installation, configuration, and security planning Exercise: Integration node setup and customization Connecting to IBM MQ Exercise: Connecting to IBM MQ Administration in the IBM Integration Toolkit Exercise: Using the IBM Integration Toolkit Administration basics Exercise: Administering the IBM Integration Bus runtime components Implementing IBM Integration Bus administration security Exercise: Using file-based security to control administration access Exercise: Using queue-based security to control administration access Implementing IBM Integration Bus message flow security Administering web services and web service security Exercise: Implementing web services and web services security Diagnosing problems Exercise: Using problem diagnosis tools Exercise: Identifying runtime problems Monitoring the integration node and message flow performance Publish/subscribe implementation overview Exercise: Viewing runtime statistics Configuring IBM Integration Bus for high availability Exercise: Administering workload management policies Monitoring, recording, and replaying message flow events Exercise: Recording and replaying message flow data Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM646 IBM Integration Bus V10 System Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM646 IBM Integration Bus V10 System Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM646 IBM Integration Bus V10 System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

WD515G Create, Secure, and Publish APIs with IBM API Connect 10

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WD515G Create, Secure, and Publish APIs with IBM API Connect 10
Delivered OnlineFlexible Dates
Price on Enquiry

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for WebSphere administrators who have experience with stand-alone application server environments, and want to learn about creating and managing a federated environment. Overview After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practicalexperience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. Course Introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment
Delivered OnlineFlexible Dates
Price on Enquiry