Duration 5 Days 30 CPD hours This course is intended for Network engineers and technicians that are working in the enterprise sector. Overview - Describe the factors that led to the development of IPv6 and possible uses of this new IP structure - Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software - Implement IPv6 services and applications - Understand the updates to IPv4 routing protocols needed to support IPv6 topologies - Understand multicast concepts and IPv6 multicast specifics - Evaluate the scenario and desired outcome and identify the best transition mechanism for the situation - Describe security issues, how security for IPv6 is different than for IPv4, and emerging practices for IPv6-enabled networks - Describe the standards bodies that define IPv6 address allocation, in addition to one of the leading IPv6 deployment issuesââ¬'multihoming - Describe the deployment strategies that service providers might consider when deploying IPv6 - Describe case studies for enterprise, service provider, and branch networks This course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. Introduction to IPv6 Explaining the Rationale for IPv6 Evaluating IPv6 Features and Benefits Understanding Market Drivers IPv6 Operations Understanding the IPv6 Addressing Architecture Describing the IPv6 Header Format Enabling IPv6 on Hosts Enabling IPv6 on Cisco Routers Using ICMPv6 and Neighbor Discovery IPv6 Services IPv6 Mobility Describing DNS in an IPv6 Environment Understanding DHCPv6 Operations Understanding QoS Support in an IPv6 Environment Using Cisco IOS Software Features IPv6-Enabled Routing Protocols Routing with RIPng Examining OSPFv3 Examining Integrated IS-IS Examining EIGRP for IPv6 Understanding MP-BGP Configuring IPv6 Policy-Based Routing Configuring FHRP for IPv6 Configuring Route Redistribution IPv6 Multicast Services Implementing Multicast in an IPv6 Network Using IPv6 MLD IPv6 Transition Mechanisms Implementing Dual-Stack Describing IPv6 Tunneling Mechanisms IPv6 Security Configuring IPv6 ACLs Using IPsec, IKE, and VPNs Discussing Security Issues in an IPv6 Transition Environment Understanding IPv6 Security Practices Configuring Cisco IOS Firewall for IPv6 Deploying IPv6 Examining IPv6 Address Allocation Understanding the IPv6 Multihoming Issue Identifying IPv6 Enterprise Deployment Strategies IPv6 and Service Providers Identifying IPv6 Service Provider Deployment Understanding Support for IPv6 in MPLS Understanding 6VPE Understanding IPv6 Broadband Access Services IPv6 Case Studies Planning and Implementing IPv6 in Enterprise Networks Planning and Implementing IPv6 in Service Provider Networks Planning and Implementing IPv6 in Branch Networks Lab Exercises Lab 2-1: Enabling IPv6 on Hosts Lab 2-2: Using Neighbor Discovery Lab 3-1: Using Prefix Delegation Lab 4-1: Routing with OSPFv3 Lab 4-2: Routing with IS-IS Lab 4-3: Routing with EIGRP Lab 4-4: Routing with BGP and MP-BGP Lab 5-1: Multicasting Lab 6-1: Implementing Tunnels for IPv6 Lab 7-1: Configuring Advanced ACLs Lab 7-2: Implementing IPsec and IKE Lab 7-3: Configuring Cisco IOS Firewall Lab 9-1: Configuring 6PE and 6VPE Configuration Files Summary Lab Activity Solutions Teardown and Restoration Additional course details: Nexus Humans Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 45.625 Days 273.75 CPD hours Overview Live, instructor-led virtual classes: Benefit from an interactive classroom with added flexibility and convenience. Access to Red Hat certified instructors: Virtual classes are taught by the same experienced subject matter experts who lead classroom trainings. Flexible scheduling options: Various class topics and time options facilitate incorporating learning and preferences into busy schedules. Focused training sessions: Participants can narrow their learning to more specific topic areas. Choice of learning modality: A combination of self-paced materials and expert-taught classes maximizes learning. Train without traveling: Learn when, where, and how it is best for you Red Hat© Learning Subscription Premium provides a customizable learning experience with self-paced and live training options. Users can tailor their learning with recorded video classes, e-books, online content, and live virtual classes. A subscription provides access to content across the entire Red Hat product portfolio, content that is continuously updated by Red Hat experts. Live, instructor-led classes create an engaging, immersive learning experience. These interactive sessions compliment the on-demand, self-paced learning materials available with a Red Hat Learning Subscription for highly effective, flexible training for everyone from beginners to experienced professionals.This subscription provides an array of additional features to complement the learning experience. Cloud-based labs give the opportunity for hands-on practice in actual Red Hat environments. Expert extras are short, on-demand videos where Red Hat practitioners demonstrate innovative technologies in practical scenarios. Skills paths and pre-assessments are available for course selection guidance. Red Hat Learning Subscription Premium also includes certification exams. Red Hat?s exams are industry-recognized and performance-based. These exams validate that holders have the skills needed to undertake even the most ambitious technology projects. Reporting capabilities to track progress toward training and certification goals. 24x7 self-paced access to Red Hat online training and video classroom courses Content is created by Red Hat experts who build and use Red Hat technology and is directly related to Red Hat certification exams. Early access Be the first to explore in-development technology before it is officially released by accessing courses and labs in development. Cloud-based labs Get hands-on practice in authentic Red Hat environments, delivered 24x7 on six continents. Skills paths Map your learning and certification goals to one of the skills paths inside the platform to develop a strong foundation for a specific skill set. Certification exams and retakes Validate your skills through performance-based exams remotely or at a testing station. Exams can be taken when and where it's most convenient. Expert extras Red Hat field practitioners present short demo videos to supplement courses by showing innovative technologies and practices based on actual use cases. Expert chat Get direct answers and guidance from curriculum experts via a 30-minute chat session per day. Machine translations provide chat dialogue in local languages. E-book Downloads Download course e-books to continue learning offline. Reporting An individual?s dashboard provides a summary of training progress, courses and labs taken, and exam status. Management reports provide insights so a team?s engagement and progress can be measured. Globally available,translated content Access Red Hat?s most popular courses in as many as 11 languages: English, International Spanish, Brazilian Portuguese, French, Italian, German, Simplified Chinese, Korean, Japanese, Hindi, and Czech. Additional course details: Nexus Humans Red Hat Learning Subscription Premium training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Learning Subscription Premium course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network engineer Systems engineer Wireless engineer Consulting systems engineer Technical solutions architect Network administrator Wireless design engineer Network manager Sales engineer Account manager Overview Upon completing this course, the learner will be able to meet these overall objectives: Get familiar with different API styles (REST, RPC) and synchronous and asynchronous API requests Learn how to use Postman software development tool in order to test the API calls Learn how to automate repetitive tasks using Ansible automation engine Explore a Python programming language, Python libraries and Python virtual environments and learn how can they be used for automation of network configuration tasks Get introduced to GIT version control system and its common operations Learn how to leverage the various models and APIs of the Cisco IOS XE platform to perform day-zero operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python Learn about the paradigm shift of model-driven telemetry and the building blocks of a working solution Learn how to leverage the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center⢠Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman Understand Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure Learn how to leverage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and Postman Implementing Automation for Cisco Enterprise Solutions (ENAUI) v.1.2 teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools. This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification. This course will help you:Gain high-demand skills using modern programming languages, APIs, and systems such as Python, Ansible, and Git to automate, streamline, and enhance business operationsAcquire the skills and knowledge to customize tools, methods, and processes that improve network performance and agilityPrepare for the 300-435 ENAUTO exam Course Outline Network Programmability Foundation Automating APIs and Protocols Managing Configuration with Python and Ansible Implementing On-Box Programmability and Automation with Cisco IOS XE Software Implementing Model-Driven Telemetry Day 0 Provisioning with Cisco IOS-XE Software Implementing Automation in Enterprise Networks Building Cisco DNA Center Automation with Python Automating Operations using Cisco DNA Center Introducing Cisco SD-WAN Programmability Building Cisco SD-WAN Automation with Python Building Cisco SD-WAN Automation with Ansible Automating Cisco Meraki Implementing Meraki Integration APIs Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developers Administrators Overview Understand why Blockchain is needed and where Explore the major components of Blockchain Learn about Hyperledger Fabric v1.1 and the structure of the Hyperledger Architecture Lean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership Services Perform comprehensive labs on writing chaincode Explore the architecture of Hyperledger Fabric v1.1 Understand and perform in depth labs on Bootstrapping the Network Gain a detailed understanding of the benefits, components and architecture of Hyperledger Composer Learn Hyperledger Explorer and Hyperledger Composer Playground Perform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contract Build applications on Hyperledger Fabric v1.1 This instructor-led Hyperledger training course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric and Hyperledger Composer. This Hyperledger training course has several comprehensive labs, giving you real world experience.In 3 days, you will learn the need for blockchain applications, where blockchain is used, and about Hyperledger Fabric, the open source framework for developing blockchain applications and solutions with a modular architecture. Introduction to Blockchain Introduction to Blockchain What is Blockchain Types of network Public network Permissioned network Private network Need for Blockchain Components of Blockchain Consensus Provenance Immutability Finality Where can Blockchain be used Example on Blockchain How Blockchain Works How Blockchain Works Structure of Blockchain Block Hash Blockchain Distributed Lifecycle of Blockchain Smart Contract Consensus Algorithm Proof of Work Proof of Stake Practical Byzantine Fault Tolerance Actors of Blockchain Blockchain developer Blockchain operator Blockchain regulator Blockchain user Membership service provider Building A Small Blockchain Application Introduction to Hyperledger Fabric v1.1 Introduction to Hyperledger What is Hyperledger Why Hyperledger Where can Hyperledger be used Hyperledger Architecture Membership Blockchain Transaction Chaincode Hyperledger Fabric Features of Hyperledger Fabric Installation of prerequisite Getting Started With Fabric Model The Fabric Model Features of Fabric Model Chaincode SDKs Ledger Privacy through channels Security and Membership services Assets Consensus Components of Fabric Model Peer Orderer Certificate Authority Building your network Chaincode Chaincode Chaincode API How to write a Chaincode Lab Work Architecture of Hyperledger Fabric v1.1 Architecture of Hyperledger Fabric Transaction Ledger Nodes Peer Endorser Ordering Nodes Channels Certificate Authority Transaction Flow Lab Work Bootstrapping Bootstrapping the Network Introduction Lab Work Task 1 - Generate the crypto material for the various participants. Task 2 - Generate the genesis block for the Orderer node and start ordering service (solo node). Task 3 - Generated the configuration transaction block to create a new channel. Task 4 - Sign the configuration block and create the new channel. Task 5 - Make peers of all the organizations join the channel that we created in Task 4 Introdcution to Hyperledger Explorer Introduction To Hyperledger Explorer Block Details Peer List Chaincode List Transaction Details Installation of Hyperledger Explorer Starting the Explorer App Introduction to Hyperledger Composer Introduction Components of Hyperledger Composer Benefits of Hyperledger Composer Key Concepts Hyperledger Composer Solution Installation Hyperledger Composer Playground Hyperledger Composer Playground Introduction Playground Overview Lab Work Additional course details: Nexus Humans Hyperledger Training - Developing on Hyperledger Fabric training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Hyperledger Training - Developing on Hyperledger Fabric course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for project managers, Scrum masters, business analysts, and team leaders looking to effectively manage their development projects using Team Foundation Server 2017. Overview The course also demonstrates how TFS facilitates the use of storyboards to prototype experiences, request stakeholder feedback, foster team collaboration, and generate reports. The final two modules of the course provide an overview of how testers and developers can work effectively using appropriate tools in the Visual Studio family. In this course, attendees will plan a new software development project and go through the steps to initiate the project using Visual Studio 2017. This includes recording requirements, creating a product backlog, and estimating effort for backlog items. Introducing the Microsoft Visual Studio 2017 Family What?s new in Visual Studio 2017 Overview of the Visual Studio 2017 family Overview of product features Project workflow across the Visual Studio 2017 suite of products Initiating a New Project Organizing projects in TFS Understanding process templates Creating a new team project Setting team project properties Switching between team projects Work Item Primer Overview of work items Traceability between work items Searching and creating custom queries Work item charting and pinning charts Work item tagging Configuring project notifications Creating our Product Backlog Examining requirement types Creating backlog items Creating requirement hierarchies using features The importance of acceptance criteria Agile Estimation Introduction to estimation Using story points Planning Poker and other popular estimation techniques Adding your estimates to TFS work items Working from the Product Backlog Introducing the Kanban board Entering and editing details on the Kanban board Customizing columns, including using split columns and limiting WIP Recording our Definition of Done (DoD) Understanding the Cumulative Flow Diagram Working in Sprints Specifying your sprint schedule and your team capacity Selecting items for the sprint backlog using forecasting Decomposing requirements into tasks Using burndown charts to track progress Monitoring work using the task board Working with unparented work items Retrospectives The importance of retrospectives Conducting an efficient sprint retrospective What you should avoid in your retrospective Working with TFS Teams Configuring teams in our team project Managing work from a master backlog Allocating work to our teams Configuring iterations for TFS teams Enhancing Requirements Using Storyboards Overview of storyboarding capabilities Creating a storyboard to illustrate a requirement Linking a storyboard to a work item Getting Stakeholder Feedback Introducing the Microsoft Feedback Client Using the Microsoft Feedback Client to provide rich feedback to the team Adding continuous feedback into your workflow Fostering Team Collaboration An overview of the various clients The use of email in sharing information Choosing the appropriate client tool Creating and Customizing Reports Overview of reporting architecture Reviewing the out of the box reports Adding new reports Creating ad hoc reports using Excel Overview of Agile Testing The role of the tester in a sprint planning meeting A lap around web-based test management Creating a test plan Creating manual test cases from requirements Overview of Agile Development Using My Work to select tasks from the sprint backlog Understanding the value of linking changesets to work items The importance of unit testing Creating a continuous integration build Additional course details: Nexus Humans Managing Agile Projects Using TFS 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Agile Projects Using TFS 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.