• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11087 Professional Skills Course (PSC) courses

Introduction to Premiere Pro CC

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Anyone who'd like to learn Adobe Premiere Pro CC Those that plan to take the Adobe Certfied Expert (ACE) exam Overview Introduction to Premiere Pro CC will allow you to learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. In this three-day course, you?ll get a thorough overview of the interface, tools, features, and production flow for Premiere Pro CC. The course is an ideal combination of instructor-led demonstration and hands-on practice to introduce you to Adobe Premiere Pro software, a revolutionary 64-bit nonlinear video-editing application. You will learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. Touring Adobe Premiere Pro CC Nonlinear editing in Adobe Premiere Pro Expanding the workflow Touring the Adobe Premiere Pro interface Setting up a Project Setting up a project Setting up a sequence Importing Media Importing assets Working with the Media Browser Importing images The media cache Capturing the videotape Organizing Media The Project panel Working with bins Organizing media with content analysis Monitoring footage Modifying clips Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential editing commands Working with Clips and Markers Program Monitor controls Controlling resolution Using markers Using Sync Lock and Track Lock Finding gaps in the Timeline Moving clips Extracting and deleting segments Adding Transitions What are transitions? Edit points and handles Adding video transitions Using A/B mode to fine-tune a transition Adding audio transitions Advanced Editing Techniques Four-point editing Retiming clips Replacing clips and footage Nesting sequences Regular trimming Advanced trimming Trimming in the Program Monitor panel Putting Clips in Motion Adjusting the Motion effect Changing clip position, size, and rotation Working with keyframe interpolation Using other motion-related effects Multi-camera Editing The multi-camera process Creating a multi-camera sequence Switching multiple cameras Finalizing multi-camera editing Additional multi-camera editing tips Editing and Mixing Audio Setting up the interface to work with audio Examining audio characteristics Adjusting audio volume Adjusting audio gain Normalizing audio Creating a split edit Adjusting audio levels in a sequence Working with the Audio Mixer Sweetening Sound Sweetening sound with audio effects Adjusting EQ Applying effects in the Audio Mixer Cleaning up noisy audio Adding Video Effects Working with effects Keyframing effects Effects presets Frequently used effects Color Correction and Grading Color-oriented workflow An overview of color-oriented effects Fixing exposure problems Fixing color balance Specials color effects Creating a look Exploring Compositing Techniques What is an alpha channel? Using compositing in your projects Working with the Opacity effect Working with alpha-channel transparencies Color keying a greenscreen shot Using mattes Creating Titles An overview of the Titler window Video typography essentials Creating titles Stylizing text Working with shapes and logos Making text roll and crawl Managing Your Projects The File menu Using the Project Manager Final project managment steps Importing projects or sequences Managing collaboration Managing your hard drives Exporting Frames, Clips, and Sequences Overview of export options Exporting single frames Exporting a master copy Working with Adobe Media Encoder Exchanging with other editing applications Recording to tape Additional course details: Nexus Humans Introduction to Premiere Pro CC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Premiere Pro CC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Premiere Pro CC
Delivered OnlineFlexible Dates
Price on Enquiry

Network Automation with Python and Ansible

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. Day 1 ? Critical Python Catchup & Review Overview of Python and Ansible Python white space rules & best practices Printing and more Printing Date types and Variables Packing and Unpacking Variables f Strings Conditional expressions Relational and Boolean operators Lists, Tuples, Dictionaries Indexing and slicing Built-in functions Iterating with Loops (for and while) Working with files Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) Using Python to access REST interfaces Working with JSON Python, Ansible and Paramiko Using Paramiko to SSH with keys and passwords RESTful API review API keys Paramiko Review Using Paramiko to SFTP with keys and passwords Day 02 ? Python and Network Automation Introduction to Netmiko (automating routers and switches) Using Netmiko to send commands to / from network devices Working with YAML Converting JSON to YAML with Python Ansible keywords YAML and JSON for data exchange Ansible and YAML Ansible Playbook components Tying together Python and Ansible ? Using Python within Ansible Ansible Network Modules What is new in Ansible (most current updates / release notes) Network Agnostic modules Writing network playbooks Reviewing the construction of network playbooks Writing Ansible playbooks that respond to network failures Day 03 ? Blending Python and Ansible Skillsets Review how to use Python within Ansible Calling Python scripts with Ansible Jinja2 Templating Engine for Python (and Ansible) Using Templates in Ansible playbooks Jinja2 filters, looping, and other useful tricks for automating with Ansible Playbook tagging for selective runs When to use Python and when to use Ansible ?Big Picture? options for using Python & Ansible within your Network Ansible Roles Day 04 ? Customizing Ansible with Python Review ? Running Scripts with Ansible Prompting for Ansible user input Ansible Galaxy & Getting at Roles Writing a custom Ansible Module with Python Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. Case Study: Automate your Enterprise Network When to use Python and when to use Ansible Writing your own Ansible modules in Python ?Big Picture? options for using Python & Ansible within your Network Overview ? NETCONF / YANG and what they mean for Python and Ansible Molecule ? Testing your roles Additional course details: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Automation with Python and Ansible
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce.com - Sales Cloud Administration Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who need to manage instances of Salesforce Sales Cloud©. Target students have Sales Cloud user skills and are often existing Sales, Administrative, or Operations support employees, IT employees who are given the additional responsibilities of Salesforce.com© system administration, or external consultants who have been engaged to provide administrative support for an organization.This course can also be an important component of preparing for the Salesforce Certified Administrator exam for students who are seeking the Salesforce Certified Administrator certification. Overview In this course, students will perform the basic skills required of a typical Salesforce system administrator.Students will:- Describe basic concepts related to Salesforce administration.- Set up an organization.- Manage user accounts.- Implement security controls.- Configure the Salesforce Classic user interface.- Support the Lightning Experience user interface.- Customize pages.- Manage Opportunities.- Implement additional Opportunity features.- Implement data validation and workflows.- Manage Leads.- Manage Accounts.- Manage Contacts.- Manage Campaigns.- Manage Cases.- Manage custom objects.- Manage data.- Configure views, reports, and dashboards.- Integrate and extend Salesforce. In this course, students will identify information about the five native business processes every company can manage using Salesforce, regardless of the License Edition. Students will also gain insight into each of the functional groups of users (Inside Sales, Outside Sales, Marketing, Customer Support, and Management), and they will establish patterns of critical thinking that can help them to ensure that they are indeed taking the right approach and providing the necessary support for each request they receive. Introduction to Salesforce Administration The Salesforce Data Model SMART Administration Principles Setting Up an Organization Manage the Company Profile Configure Organizational Settings Managing User Accounts Create User Accounts Manage Users Implementing Security Controls Salesforce Security Essentials Configure Profiles Establish Organization-Wide Sharing Defaults Configure Roles Create Sharing Rules Perform a Health Check Configuring the Salesforce Classic User Interface Configure User Interface Settings Customize the Home Page in Salesforce Classic Configure Search in Salesforce Classic Supporting the Lightning Experience User Interface Implement Lightning Experience Customize Lightning Experience Home Pages Customizing Pages Create Page Layouts in Salesforce Classic Customize Record Pages in Lightning Experience Introduction to Opportunity Management Opportunity Management Essentials Design and Implement Opportunity Fields Design and Implement Opportunity Stages Design and Implement Opportunity Contact Roles Design and Create Opportunity Record Types Implementing Additional Opportunity Features Implement and Maintain Opportunity Products and Price Books Implement the Similar Opportunities Function Implement Opportunity Teams Create a Big Deal Alert Implementing Data Validation and Workflows Create and Test Validation Rules Create and Test Workflows Managing Leads Lead Management Essentials Design and Implement Lead Fields Design and Implement Custom Lead Sources Design and Implement Web-to-Lead Forms Design and Implement Lead Assignment Rules Managing Accounts Design an Account Management Model Implement an Account Management Model Managing Contacts Design a Contact Management Strategy Implement a Contact Management Strategy Managing Campaigns Prepare for Campaign Management Administer a Campaign Management Strategy Managing Cases Case Management Essentials Design and Implement Case Fields Design and Implement Case Origins Automate Case Management Providing Apps and Custom Objects Supply Apps in Salesforce Classic Supply Apps in Lightning Experience Managing Data Data Management Essentials Import and Update Data Back Up and Restore Data Configuring Views, Reports, and Dashboards Create Views Create and Manage Reports Create and Manage Dashboards Integrating and Extending Salesforce Integrate Salesforce and Outlook Implement Salesforce1 Implement SalesforceA Additional course details: Nexus Humans Salesforce.com - Sales Cloud Administration Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce.com - Sales Cloud Administration Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce.com - Sales Cloud Administration Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Plan and Deploy [v7]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced VMware vSphere administrators Overview By the end of the course, you should be able to meet the following objectives: Explain the key features and use cases for vSAN Detail the underlying vSAN architecture and components Describe the different vSAN deployment options Detail vSAN cluster requirements and considerations Apply recommended vSAN design considerations and capacity sizing practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Explain Maintenance Mode use and its impacts on vSAN Apply best practices for vSAN network configurations Manually configure a vSAN cluster using VMware vSphere Client™ Explain and configure vSAN fault domains Understand and apply vSAN storage policies Define encryption in the vSAN cluster Describe the architecture and use cases for stretched clusters Describe the architecture and use cases for two-node clusters Understand the steps involved in creating the vSAN iSCSI target services This two-day, hands-on training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Deploy and configure a vSAN cluster using the Cluster Quickstart wizard Manually configure a vSAN cluster using vSphere Client Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status Introduction to Advanced vSAN Configurations Define and configure compression and deduplication in the vSAN cluster Define and configure encryption in the vSAN cluster Understand the remote vSAN datastore topology Identify the operations involved in managing the remote vSAN datastore Understand the steps involved in creating the vSAN iSCSI target service vSAN Stretched and Two-Node Clusters Describe the architecture and use cases for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Plan and Deploy [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Plan and Deploy [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Plan and Deploy [v7]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Troubleshooting and Operations [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise networks Overview By the end of the course, you should be able to meet the following objectives: Use the native tools available in NSX to identify and troubleshoot the problems. Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to identify and troubleshoot problems related to the NSX environment. Explain the NSX infrastructure components and the communications between them. Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX. Identify, analyze, and troubleshoot problems related to infrastructure preparation and VMware NSX Edge deployments. Identify, analyze, and troubleshoot problems related to logical switching and logical routing. Identify, analyze, and troubleshoot network security problems related to the Distributed firewalls, Gateway firewalls, and Distributed IDS/IPS. Identify, analyze, and troubleshoot problems related to VPN and VMware NSX Advanced Load Balancer. Identify the components and packet flows involved in the NSX datapath and troubleshoot related problems. This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure. This course introduces you to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your VMware NSX environment.In addition, various types of technical problems are presented to you, which you will identify, analyze, and solve through a systematic process. Course Introduction Introduction and course logistics Course objectives NSX Operations and Tools Explain and validate the native troubleshooting tools for NSX Configure syslog, IPFIX, and log collections for the NSX environment Integrate NSX with VMware Aria Operations for Logs and VMware Aria Operations for Networks Validate and review the API methods available to configure the NSX environment Troubleshooting the NSX Management Cluster Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Troubleshooting Infrastructure Preparation Describe the data plane architecture, components, and communication channels Explain and troubleshoot VMware ESXi transport node preparation issues Explain and troubleshoot NSX Edge deployment issues Troubleshooting Logical Switching Describe the architecture of logical switching List the modules and processes involved in configuring logical switching Explain the importance of VDS in transport nodes Review the architecture and workflows involved in attaching workloads to segments Identify and troubleshoot common logical switching issues Troubleshooting Logical Routing Review the architecture of logical routing Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways Explain the high availability modes and validate logical router placements Identify and troubleshoot common logical routing issues using both BGP and OSPF Troubleshooting Security Review the architecture of the Distributed Firewall Explain the workflows involved in configuring the Distributed Firewall Review the architecture of the Gateway Firewall Explain the workflows involved in configuring the Gateway Firewall Identify and troubleshoot common Distributed firewall and Gateway Firewall issues Review the architecture and workflows involved in configuring Distributed IDS/IPS Identify and troubleshoot common Distributed IDS/IPS problems. Troubleshooting Services Review the NSX Advanced Load Balancer architecture and components Identify and troubleshoot common NSX Advanced Load Balancer issues Review the IPsec and L2 VPN architecture and components Identify and troubleshoot common IPsec and L2 VPN issues Datapath Walkthrough Verify and validate the path of the packet on the NSX datapath Identify and perform packet captures at various points in the datapath Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX: Troubleshooting and Operations [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX: Troubleshooting and Operations [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX: Troubleshooting and Operations [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring BGP on Cisco Routers v4.0 (BGP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: • This course is intended primarily for network administrators, network engineers, network managers and systems engineers who would like to implement BGP. The secondary audience for this course is as follows: • This course is intended for network designers and project managers. The course is also recommended to all individuals preparing for BGP exam. Overview After completing this course the student should be able to: - Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains - Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario In which you must support connections to multiple ISPs - Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections - Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented - Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems - Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems - Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network This covers the theory of BGP, configuration of BGP on Cisco IOS© routers, detailed troubleshooting information, and hands-on exercises that provide learners with the skills that they need to configure and troubleshoot BGP networks in customer environments. BGP Overview Introducing BGP Understanding BGP Path Attributes Establishing BGP Sessions Processing BGP Routes Configuring Basic BGP Monitoring and Troubleshooting BGP Lab 1-1: Initial Lab Setup Lab 1-2: Configuring Basic BGP BGP Transit Autonomous Systems Working with a Transit AS Interacting with IBGP and EBGP in a Transit AS Forwarding Packets in a Transit AS Configuring a Transit AS Monitoring and Troubleshooting IBGP in a Transit AS Lab 2-1: Configuring a Transit AS Route Selection Using Policy Controls Using Multihomed BGP Networks Employing AS-Path Filters Filtering with Prefix-Lists Using Outbound Route Filtering Applying Route-Maps as BGP Filters Implementing Changes in BGP Policy Lab 3-1: Using Multihomed BGP Networks Lab 3-2: Employing AS-Path Filters Lab 3-3: Filtering with Prefix-Lists Lab 3-4: Implementing Changes in BGP Policy Route Selection Using Attributes Influencing BGP Route Selection with Weights Setting BGP Local Preference Using AS-Path Prepending Understanding BGP Multi-Exit Discriminators Addressing BGP Communities Lab 4-1: Influencing BGP Route Selection with Weights Lab 4-2: Setting BGP Local Preference Lab 4-3: Understanding BGP Multi-Exit Discriminators Lab 4-4: Addressing BGP Communities Customer-to-Provider Connectivity with BGP Understanding Customer-to-Provider Connectivity Requirements Implementing Customer Connectivity Using Static Routing Connecting a Multihomed Customer to a Single Service Provider Connecting a Multihomed Customer to Multiple Service Providers Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks Introducing Route Reflectors Designing Networks with Route Reflectors Configuring and Monitoring Route Reflectors Introducing Confederations Configuring and Monitoring Confederations Lab 6-1: Introducing Route Reflectors Lab 6-2: Configuring and Monitoring Confederations Optimizing BGP Scalability Improving BGP Convergence Limiting the Number of Prefixes Received from a BGP Neighbor Implementing BGP Peer Groups Using BGP Route Dampening Lab 7-1: Limiting the Number of Prefixes Received from a BGP Neighbor Lab 7-2: Implementing BGP Peer Groups Lab 7-3: Using BGP Route Dampening Additional course details: Nexus Humans Cisco Configuring BGP on Cisco Routers v4.0 (BGP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring BGP on Cisco Routers v4.0 (BGP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring BGP on Cisco Routers v4.0 (BGP)
Delivered OnlineFlexible Dates
Price on Enquiry

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry