• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7084 Courses delivered Live Online

VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators and system engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for VMware Aria Suite Lifecycle Deploy and configure VMware Aria Suite Lifecycle Manage certificates in VMware Aria Suite Lifecycle environments Create, manage, and scale VMware Aria Suite Lifecycle environments Add VMware Aria Suite products to VMware Aria Suite Lifecycle Manage VMware Aria Suite products with VMware Aria Suite Lifecycle Use VMware Aria Suite Lifecycle to perform content life cycle management Migrate a legacy VMware Aria Suite Lifecycle instance Explain the VMware Aria Suite Lifecycle component settings Troubleshoot day-to-day operations of VMware Aria Suite Lifecycle This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite Lifecycle?, which manages products such as VMware Aria Operations?, VMware Aria Operations? for Logs, and VMware Aria Automation?. This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Suite Lifecycle Describe the use cases for VMware Aria Suite Lifecycle List the features of VMware Aria Suite Lifecycle List system requirements for VMware Aria Suite Lifecycle Use Easy Installer to deploy VMware Aria Suite Lifecycle VMware Aria Suite Lifecycle Configuration Create Certificate Signing Requests (CSRs) for VMware Aria Suite product instances Configure VMware Aria Suite Lifecycle settings Add certificates to VMware Aria Suite product instances Add VMware Aria Suite Lifecycle environments Add VMware Aria Suite product binaries Adding VMware Aria Suite Products Deploy a new VMware Aria Suite product Manage a VMware Aria Suite product using VMware Aria Suite Lifecycle Add an existing VMware Aria Suite product to an environment VMware Aria Suite Lifecycle Day 2 Operations Perform ongoing management tasks Monitor the health of the environment Use content from the marketplace Use VMware Aria Suite Lifecycle to perform content life cycle management VMware Aria Suite Lifecyle Migration Prepare a legacy VMware Aria Suite Lifecycle instance for migration Migrate VMware Aria Suite Lifecycle using Easy Installer Troubleshooting VMware Aria Suite Lifecycle Identify the VMware Aria Suite Lifecycle component settings Describe the procedure to generate and download the log bundle Use Linux commands to assist with troubleshooting VMware Aria Suite Lifecycle Recognize entries in commonly accessed VMware Aria Suite Lifecycle log files Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry

ES10 IBM Fundamental System Skills in z/OS

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This basic course is for IT personnel with a theoretical background of z/OS. Overview Review the main concepts of z/OS Log on to TSO and start ISPF/PDF Navigate through ISPF/PDF dialogs and use the basic ISPF/PDF functions and the ISPF Editor Use ISPF/PDF to allocate data sets and edit data sets (including hierarchical file system (HFS) files) via the ISPF Editor primary and line commands Use ISPF to create and manipulate (copy, rename, delete, list, sort and merge) data sets Identify security considerations for Multiple Virtual Storage (MVS) data sets and HFS files Describe and use TSO/E commands Perform simple modifications to existing ISPF/PDF panels Invoke a REXX exec and TSO CLIST Tailor existing JCL and submit batch jobs Review job status and job output using SDSF Invoke UNIX processes Manipulate HFS directories and file systems using the UNIX System Services ISHELL This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. Review of the z/Architecture and z/OS An Introduction to ISPF, ISPF/PDF, and RACF System familiarization Working with ISPF/PDF (Part 1 & 2) Allocate new data sets ISPF editor primary commands ISPF editor line command Copy/move/rename/delete data sets and members Data set lists Working with TSO/E Using TSO/E commands Working with JCL Submit a job JCL exercises Working with UNIX System Services Procedures ISHELL and hierarchical file system Additional course details: Nexus Humans ES10 IBM Fundamental System Skills in z/OS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES10 IBM Fundamental System Skills in z/OS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ES10 IBM Fundamental System Skills in z/OS
Delivered OnlineFlexible Dates
Price on Enquiry

AN610 IBM PowerHA 7 Planning, Implementing, Customizing and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This advanced course is for individuals who are experienced AIX system administrators with TCP/IP networking and AIX Logical Volume Manager (LVM) experience, who are responsible for the planning and installation of a PowerHA SystemMirror 7.1 and later cluster on an IBM power systems server running AIX 6.1 or later. The lab exercises are conducted on an AIX 7.1 TL2-level system. Overview Explain what high availability is Outline the capabilities of PowerHA SystemMirror Design and plan a highly available cluster Install and configure PowerHA SystemMirror in the following modes of operation: Single resource group on a primary node with standby node Two resource groups in a mutual takeover configuration Implement the trusted execution feature of AIX 6.1 Configure resource group startup, fallover, and fallback policies Perform system administration tasks for PowerHA Perform customization for PowerHA Perform problem determination and recovery This course is designed to prepare you to perform administration on a highly available cluster using PowerHA SystemMirror for AIX. It introduces concepts; design and planning considerations; installation and configuration; customization; and maintenance. Day 1 Introduction to PowerHA SystemMirror Planning and configuring network and storage Day 2 Configuring applications for PowerHA SystemMirror Configuring a PowerHA SystemMirror cluster Day 3 Cluster validation and testing PowerHA SystemMirror administration Day 4 PowerHA SystemMirror event processing Basic Troubleshooting Day 5 PowerHA SystemMirror installation

AN610 IBM PowerHA 7 Planning, Implementing, Customizing and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Jenkins Automation Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for DevOps Engineers Software Developers Telecommunications Professionals Architects Quality Assurance & Site Reliability Professionals Overview Automate basic freestyle projects Jenkins Pipelines and Groovy Programming Software lifecycle management with Jenkins Popular plugins Scaling options Integrating Jenkins with Git and GitHub (as well as other Software Control Management platforms) Triggering Jenkins with Webhooks Deploying into Docker and Kubernetes CI / CD with Jenkins This course covers the fundamentals necessary to deploy and utilize the Jenkins automation server. Jenkins enables users to immediately begin automating both their individual and collaborative workflows. Jenkins is a proven solution for a wide variety of tasks ranging from the helpful automation of scripts (such as Python and Ansible) to creating complex pipelines that govern the technical parts of not only Continuous Integration, but Continuous Delivery (CI/CD) as well. Jenkins is free, open source, and easily controlled with a simple web- based UI- it can be expanded by third party plugins and is deployable on nearly any on-site (Linux, Windows and Mac) or cloud platform. Overview of Jenkins Overview of Continuous Integration and Continuous Deployment (CI/CD) Understanding Git and GitHub Git Branching Methods for Installing Jenkins Jenkins Dashboard Jenkins Jobs Getting Started with Freestyle Jobs Triggering builds HTTP Web Hooks Augmenting Jenkins with Plugins Overview of Docker and Dockerfile for Building and Launching Images Pipeline Jobs for Continuous Integration and Continuous Deployment Pipeline Build Stage Pipeline Testing Stage Post Build actions SMTP and Other Notifications Programming Pipelines with Groovy More Groovy Programming Essentials Extracting Jenkins Data Analytics to Support Project Management Troubleshooting Failures Auditing stdout and stderr with Jenkins Jenkins REST API Controlling Jenkins API with Python Jenkins Security Scaling Jenkins Jenkins CLI Building a Kubernetes Cluster and Deploying Jenkins How to start successfully using Jenkins to automate aspects of your job the moment this course ends.

Jenkins Automation Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

From Data to Insights with Google Cloud Platform

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform Overview This course teaches students the following skills: Derive insights from data using the analysis and visualization tools on Google Cloud Platform Interactively query datasets using Google BigQuery Load, clean, and transform data at scale Visualize data using Google Data Studio and other third-party platforms Distinguish between exploratory and explanatory analytics and when to use each approach Explore new datasets and uncover hidden insights quickly and effectively Optimizing data models and queries for price and performance Want to know how to query and process petabytes of data in seconds? Curious about data analysis that scales automatically as your data grows? Welcome to the Data Insights course! This four-course accelerated online specialization teaches course participants how to derive insights through data analysis and visualization using the Google Cloud Platform. The courses feature interactive scenarios and hands-on labs where participants explore, mine, load, visualize, and extract insights from diverse Google BigQuery datasets. The courses also cover data loading, querying, schema modeling, optimizing performance, query pricing, and data visualization. This specialization is intended for the following participants: Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform To get the most out of this specialization, we recommend participants have some proficiency with ANSI SQL. Introduction to Data on the Google Cloud Platform Highlight Analytics Challenges Faced by Data Analysts Compare Big Data On-Premises vs on the Cloud Learn from Real-World Use Cases of Companies Transformed through Analytics on the Cloud Navigate Google Cloud Platform Project Basics Lab: Getting started with Google Cloud Platform Big Data Tools Overview Walkthrough Data Analyst Tasks, Challenges, and Introduce Google Cloud Platform Data Tools Demo: Analyze 10 Billion Records with Google BigQuery Explore 9 Fundamental Google BigQuery Features Compare GCP Tools for Analysts, Data Scientists, and Data Engineers Lab: Exploring Datasets with Google BigQuery Exploring your Data with SQL Compare Common Data Exploration Techniques Learn How to Code High Quality Standard SQL Explore Google BigQuery Public Datasets Visualization Preview: Google Data Studio Lab: Troubleshoot Common SQL Errors Google BigQuery Pricing Walkthrough of a BigQuery Job Calculate BigQuery Pricing: Storage, Querying, and Streaming Costs Optimize Queries for Cost Lab: Calculate Google BigQuery Pricing Cleaning and Transforming your Data Examine the 5 Principles of Dataset Integrity Characterize Dataset Shape and Skew Clean and Transform Data using SQL Clean and Transform Data using a new UI: Introducing Cloud Dataprep Lab: Explore and Shape Data with Cloud Dataprep Storing and Exporting Data Compare Permanent vs Temporary Tables Save and Export Query Results Performance Preview: Query Cache Lab: Creating new Permanent Tables Ingesting New Datasets into Google BigQuery Query from External Data Sources Avoid Data Ingesting Pitfalls Ingest New Data into Permanent Tables Discuss Streaming Inserts Lab: Ingesting and Querying New Datasets Data Visualization Overview of Data Visualization Principles Exploratory vs Explanatory Analysis Approaches Demo: Google Data Studio UI Connect Google Data Studio to Google BigQuery Lab: Exploring a Dataset in Google Data Studio Joining and Merging Datasets Merge Historical Data Tables with UNION Introduce Table Wildcards for Easy Merges Review Data Schemas: Linking Data Across Multiple Tables Walkthrough JOIN Examples and Pitfalls Lab: Join and Union Data from Multiple Tables Advanced Functions and Clauses Review SQL Case Statements Introduce Analytical Window Functions Safeguard Data with One-Way Field Encryption Discuss Effective Sub-query and CTE design Compare SQL and Javascript UDFs Lab: Deriving Insights with Advanced SQL Functions Schema Design and Nested Data Structures Compare Google BigQuery vs Traditional RDBMS Data Architecture Normalization vs Denormalization: Performance Tradeoffs Schema Review: The Good, The Bad, and The Ugly Arrays and Nested Data in Google BigQuery Lab: Querying Nested and Repeated Data More Visualization with Google Data Studio Create Case Statements and Calculated Fields Avoid Performance Pitfalls with Cache considerations Share Dashboards and Discuss Data Access considerations Optimizing for Performance Avoid Google BigQuery Performance Pitfalls Prevent Hotspots in your Data Diagnose Performance Issues with the Query Explanation map Lab: Optimizing and Troubleshooting Query Performance Advanced Insights Introducing Cloud Datalab Cloud Datalab Notebooks and Cells Benefits of Cloud Datalab Data Access Compare IAM and BigQuery Dataset Roles Avoid Access Pitfalls Review Members, Roles, Organizations, Account Administration, and Service Accounts

From Data to Insights with Google Cloud Platform
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build System Architect Expertise (ARC902)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow

Salesforce Build System Architect Expertise (ARC902)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Video Infrastructure Implementation VII

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Video Operator and Administrator Voice / UC / Collaboration / Communications Engineer Collaboration Tools Engineer Collaboration Sales / Systems Engineer Overview Upon completing this course, the learner will be able to meet these overall objectives: Install, configure, maintain, and troubleshoot Cisco visual collaboration solutions. This course assists the student in preparing for the Cisco TelePresence Video Specialist Certification. Upon completing this course, the learner will be able to meet these overall objectives Module 1: Advanced Cisco Expressway Features Introducing Cisco video network solutions Exploring Cisco Expressway basic setup Explaining regular expressions in a Cisco Expressway environment Deploying components of Cisco Expressway Security Exploring the fundamentals of subzonesÿ Administering call control Implementing subzone bandwidth management Implementing zones Exploring clustering Applying troubleshooting Module 2: Advanced Cisco Meeting Server Features Introducing the Cisco meeting server Exploring API configuration Exploring resilient and scalable deployments Additional features Module 3: Cisco Collaboration Meeting Room Solutions with Cisco TelePresence Server Introducing Collaboration Meeting Room cloud, premises, and hybrid products Deploying the TelePresence Server and TelePresence conductor Applying troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite (TMS) Solution Explaining Cisco TMS Installation Describing TMS operation Explaining TMS conference scheduling and management Configuring permissions Applying troubleshooting Module 5: Cisco Cloud Solutions - WebEx and Spark Introducing WebEx and Spark cloud solutions Exploring Spark administration configuration Deploying Spark hybrid services Exploring Spark APIs and BOTs configuration Module 6: Cisco TelePresence Content Server (Optional Module) Examining Cisco TCS operation and configuration

Cisco Video Infrastructure Implementation VII
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
Price on Enquiry

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry