Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. Overview Teach participants the basic functions of inventory management and physical inventory, and how to create different goods movements in the SAP system.Familiarize participants with the special functions of inventory management and physical inventory, and the Customizing settings relevant to inventory management and physical inventory. This course will give students an overview and in depth knowledge of the inventory management process in SAP. After attending this class, students will understand the major business processes, functions & configuration in inventory management. Introduction to Inventory Management Defining Inventory Management and Physical Inventory Moving Goods with the MIGO Transaction Goods Receipts (GRs) Posting a GR Without Reference Posting a GR with Reference Posting a GR with Automatic Generation of a PO Posting Cancellations, Return Deliveries, and Returns Applying Order Price Unit in Inventory Management Applying Tolerances and the Delivery Completed Indicator Adding Date Checks to GRs for a PO Stock Transfers and Transfer Postings Performing Transfer Postings Performing Stock Transfers Between Storage Locations Performing Stock Transfers Between Plants Reservations Creating Manual Reservations Evaluating Reservations Checking Availability and Missing Parts Goods Issues (GIs) Posting Unplanned GIs Posting a GI with Reference Configuring Stock Determination Allowing Negative Stock Special Forms of Procurement and Special Stocks Performing the Process of Subcontracting Performing Vendor Consignment Operating Pipeline Processes Posting Goods Movements for Special Stocks Special Features of Material Valuation Posting Goods Movements for Material Types UNBW and NLAG Configuring Split Valuation Physical Inventory Conducting Physical Inventory Analyzing the Determination of Book Inventory Simplifying Physical Inventory Applying Cycle Counting Applying Inventory Sampling Analyses Applying Stock Lists and Document Lists Applying Periodic Processing Customizing Implementing Settings for Documents Setting Up Movement Types Applying Other Customizing Settings Logistics Execution Managing Logistics Execution Processes Posting a GR Against a PO Posting a GI for a Sales Order Additional course details: Nexus Humans SCM510 SAP Inventory Management and Physical Inventory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM510 SAP Inventory Management and Physical Inventory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants and Business Process Owners/Team Leads/Power Users. Overview This course is organized in a fashion that mimics the step by step process planners will undergo in executing production planning tasks on a daily basis. We start with setup up alert profiles to manage the day to day exceptions. Participants will walk through a detailed analysis of the net requirements calculation process that is executed during product heuristics. Gain an understanding of how scheduling is performed as new orders are created. This will include analyzing source determination rules as well as scheduling strategies. Participants will analyze the pegging functionality and the master data parameters that can control the outcome of pegging. Additionally, we will perform an analysis of process, service and REM heuristics. Lastly, perform an overview of the detailed scheduling activities involved in developing an execution schedule. In this course, students gain an in-depth understanding of the advanced topics required to implement production planning in SAP SCM APO. Introduction to Production Planning in SAP Advanced Planning and Optimization (SAP APO) Planning Demand in the Supply Chain Using Production Planning and Detailed Scheduling (PP/DS) Production Planning Results Evaluation Evaluating the Planning Run Results with Alerts Evaluating the Planning Results Evaluating the Planning Run with Advanced Tools Planning Procedure Configuring Basic Parameters for Planning Executing the Production Planning Run Planning a Product Using the Planning Procedure Order Creation with Product Heuristics Using Demand Management in PP/DS Planning Make-to-Order Production Using PP/DS Using Firming in PP/DS Configuring Product Heuristics Managing the Reuse of Procurement Proposals Using the Lot-Size Calculation In Production Planning Scheduling in Production Planning Determining the Source of Supply of the Order Scheduling Operations with the Strategy Profile Scheduling a Planned Order for Production Pegging in Production Planning Configuring Dynamic and Fixed Pegging Additional Heuristics in Production Planning Planning Production Using Process Heuristics Planning Production Using Service Heuristics Configuring Bottom-Up Heuristics Planning Production Using Repetitive Manufacturing (REM) Heuristics Outlining the Integration of Supply Network Planning (SNP) in PP/DS Detailed Scheduling Scheduling Operations with the Detailed Scheduling Planning Board Planning Production with Detailed Scheduling Strategies and Heuristics Managing Setup Times with the Setup Matrix Managing Scheduling with the PP/DS Optimizer Using MRP-Based Detailed Scheduling Additional course details: Nexus Humans SCM250 SAP Production Planning in SAP APO training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM250 SAP Production Planning in SAP APO course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This intermediate course is designed for integration specialists and senior-level developers with experience in IBM Integration Bus application development. Overview After completing this course, you should be able to:Use event driven message processing to control the flow of messages by using message aggregation, message collections, message sequences, and time-sensitive nodesTransform data by using Microsoft .NET and XML stylesheetsAnalyze and filter information in complex XML documentsExtend DFDL message modelsUse message sets and the Message Repository Manager (MRM) parserProvide a message flow application as a web serviceRequest a web service from within a message flowDescribe how to implement WS-Addressing and WS-Security standards in IBM Integration BusCreate an integration serviceCreate and implement an IBM MQ request and response service definitionCreate and implement a database service definitionConfigure security-enabled message processing nodesCreate a decision service that implements business rules to provide routing, validation, and transformationExpose a set of integrations as a RESTful web serviceUse a global cache to store static dataRecord and replay data that a message flow application processesImplement publish and subscribe with IBM Integration BusDescribe the workload management options for adjusting the message processing speed, and controlling the actions that are taken on unresponsive flows and threadsConstruct user-defined patternsDescribe how IBM Integration Bus integrates with other IBM products such as IBM WebSphere Enterprise Service Bus and IBM DataPower Appliances This course focuses on using IBM Integration Bus to develop, deploy, and support platform-independent message flow applications and integration services. Course Outline Course introduction Using event driven processing nodes Exercise: Implementing message aggregation Transforming data with Microsoft .NET Transforming data with XSL stylesheets Analyzing XML documents Modeling complex data with DFDL Exercise: Extending a DFDL model Working with message sets and the MRM domain Supporting web services Exercise: Implementing web services Developing integration solutions by using integration services Exercise: Creating an integration service Connecting a database by using a discovered service Connecting IBM MQ by using a discovered service Exercise: Creating IBM MQ and database services Creating a decision service Exercise: Creating a decision service Developing integration solutions by using a REST API Using the global cache Implementing message flow security Exercise: Implementing IBM Integration Bus runtime security Implementing publish/subscribe Monitoring message flow events Exercise: Recording and replaying message flow data Managing the workload Creating patterns for reusability Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM676 IBM Integration Bus V10 Application Development II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM676 IBM Integration Bus V10 Application Development II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementer Overview Enrolling in this course will help you better understand and leverage PeopleSoft Payroll for North America (USA) payroll requirements and processes. This knowledge will help you create, adjust and troubleshoot your organization's employee payroll. Learn Off-Cycle Payroll Events In addition to typical on-cycle payroll processing, Payroll for North America provides functionality for a variety of off-cycle payroll events and other payroll requirements. This course will illustrate how to reverse a paycheck, record a manual check, produce online checks and final checks and create a gross up check. In addition, you'll also learn the necessary steps to set up and process mid-period job changes and multiple jobs. Finally, you'll set up and processes benefit deductions and garnishments. This PeopleSoft Payroll - US Rel 9.2 training teaches you how to set up and maintain employee tax data, additional pay, general deductions and direct deposits. Expert Oracle University instructors will show you how to use this solution to calculate payroll, review calculation results, identify and correct errors, confirm payroll and more. Setting Up PeopleSoft HRMS Tables for Payroll Processing Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc Setting Up Payroll Tables Identifying Payroll Setup Tables Setting Up Source Bank Accounts Creating Special Accumulators Setting Up Earnings Codes Setting Up Earnings Programs Describing Shift Pay Setup Creating a Pay Group Creating a Rate Code Setting Up U.S. Payroll Tax Tables Identifying Tax Table Maintenance Responsibility Describing PeopleSoft-Maintained Tax Tables Setting Up Customer-Maintained Tax Tables Setting Up Employee Data Identifying Sources of Employee Data Setting Up an Employee Instance Entering and Viewing Employee Job Data Identifying Employee Pay Data Updating Employee Tax Data Assigning Additional Pay to Employees Assigning General Deductions to Employees Updating P Creating and Updating Paysheets Describing Paysheets in Payroll for North America Describing Balance ID Creation Creating Pay Calendars Setting Up Pay Run IDs Creating Paysheets Viewing and Updating Paysheets and Paylines Describing the Payroll Unsheet Process Calculating Payroll Describing Payroll Calculation Running Preliminary Payroll Calculation Running Final Payroll Calculation Confirming Payroll and Producing Checks and Reports Confirming a Payroll Viewing Confirmed Payroll Results Online Printing Checks and Advices Describing Check Reprinting Describing Direct Deposit Transmittals and Reports Describing Payroll and Tax Reports Identifying Methods of Reversing Payroll Confirmati Processing Off-Cycle Payrolls Identifying Off-Cycle Payroll Processing Reversing a Paycheck Describing Reversal/Adjustment Processing Recording a Manual Check Producing an Online Check Describing Retroactive Processing Setting Up and Processing Additional Payroll Functionality Setting Up a Holiday Schedule Setting Up Advanced Earnings Options Setting Up Multiple Jobs Processing Setting Up and Processing Mid-period Job Changes Processing Gross Ups Setting Up and Processing Benefit Deductions in Payroll Setting Up Deductions and Earnings for Benefits Calculations Updating a Benefit Program and Enrolling Employees Analyzing Benefits-Related Payroll Reports Setting Up and Processing Garnishments Identifying Garnishment Setup Steps Describing PeopleSoft-Maintained Garnishment Tables Setting Up Company-Level Tables for Garnishment Processing Assigning an Employee Garnishment Deduction Setting Up Employee Garnishment Specification Data Reviewing Emp Describing PeopleSoft Enterprise ePay Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc
Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: System installers System integrators System administrators Network administrators Solutions designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the system architecture of Cisco WAN Automation Engine and Cisco WAE network abstraction Plan and deploy Cisco WAE Planning components, including Collector, WAE Design, and WAE Live Plan and deploy Cisco WAE Automation and explain the basics of Cisco WAE APIs Explain how to deploy changes to the network using Cisco WAE and XR Traffic Controller (XTC) Explain how to use the Cisco WAE Design application to solve problems and achieve business goals WAE200, Operating and Implementing Cisco WAN Automation Engine v3.0 is a 5-day course that gives you the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco© WAN Automation Engine (WAE) solution. Extensive hands-on labs help you gain the necessary skills to install and maintain Cisco WAE systems.This course will help you:Learn to install Cisco WAN Automation EngineGain confidence with WAE configuration and basic troubleshootingPractice designing and managing bandwidth and traffic engineering WAE Solution and Architecture Overview Examining WAE Examining WAE Architecture and Design Examining WAE Applications and Use Cases WAE Solution Implementation Planning a WAE Deployment Deploying WAE Describing WAE Integration Options Network Model Configuration Describing the Collection Process Describing Network Interface Modules Creating Network Models Configuring WAE Modeling Daemon WAE Automation Bandwidth Applications Deploying Bandwidth on Demand Application Deploying Bandwidth Optimization Application WAE Design Fundamentals Getting Started with WAE Design Describing Demands and Traffic Tools Modeling Interior Gateway Protocol (IGP) and BGP Describing Failures and Simulation Analysis WAE Design Traffic Engineering and Optimization Engineering Traffic by Using Metrics Engineering Traffic by Using Resource Reservation Protocol with Traffic Engineering (RSVP-TE) Engineering Traffic by Using Segment Routing-Traffic Engineering (SR-TE) Engineering Traffic by Using Latency Constraints Modeling Quality of Service (QoS) Introduction to WAE API Introducing WAE Design Remote Procedure Call (RPC) API Introducing WAE Optimization and Prediction Module (OPM) API Introducing WAE Server Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) APIs WAE Live Deployment Describing the Components of WAE Live Configuring WAE Live Explaining WAE Live Features Maintenance and Troubleshooting Maintaining WAE Troubleshooting WAE Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for system administrators, network administrators and application developers responsible for the customization of traffic flow through a BIG-IP system. This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Getting Started with iRules Customizing Application Delivery with iRules Triggering an iRule Leveraging the DevCentral Ecosystem Creating and Deploying iRules Module 3: Exploring iRule Elements Introducing iRule Constructs Understanding iRule Events and Event Context Working with iRule Commands Logging from an iRule Using SYSLOG-NG (LOG Command) Working with User-Defined Variables Working with Operators and Data Types Working with Conditional Control Structures (IF and SWITCH) Incorporating Best Practices in iRules Module 4: Developing and Troubleshooting iRules Mastering Whitespace and Special Symbols Grouping Strings Developing and Troubleshooting Tips Using Fiddler to Test and Troubleshoot iRules Module 5: Optimizing iRule Execution Understanding the Need for Efficiency Measure iRule Runtime Efficiency Using Timing Statistics Modularizing iRules for Administrative Efficiency Using Procedures to Modularize Code Optimizing Logging Using High-Speed Logging Commands in an iRule Implementing Other Efficiencies Using Looping Control Structures (WHILE, FOR, FOREACH Commands) Module 6: Securing Web Applications with iRules Integrating iRules into Web Application Defense Mitigating HTTP Version Attacks Mitigating Path Traversal Attacks Using iRules to Defends Against Cross-Site Request Forgery (CSRF) Mitigating HTTP Method Vulnerabilities Securing HTTP Cookies with iRules Adding HTTP Security Headers Removing Undesirable HTTP Headers Module 7: Working with Numbers and Strings Understanding Number Forms and Notation Working with Strings (STRING and SCAN Commands) Combining Strings (Adjacent Variables, CONCAT and APPEND Commands) Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands) Module 8: Processing the HTTP Payload Reviewing HTTP Headers and Commands Accessing and Manipulating HTTP Headers (HTTP::header Commands) Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri) Parsing the HTTP URI (URI::path, URI::basename, URI::query) Parsing Cookies with HTTP::cookie Selectively Compressing HTTP Data (COMPRESS Command) Module 9: Working with iFiles and Data Groups Working with iFiles Introducing Data Groups Working with Old Format Data Groups (MATCHCLASS, FINDCLASS) Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH) Module 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles Implementing Universal Persistence (PERSIST UIE Command) Working with the Stream Profile (STREAM Command) Collecting Statistics Using a Statistics Profile (STATS Command) Collecting Statistics Using iStats (ISTATS Command) Module 11: Incorporating Advanced Variables Reviewing the Local Variable Namespace Working with Arrays (ARRAY Command) Using Static and Global Variables Using the Session Table (TABLE Command) Processing Session Table Subtables Counting ?Things? Using the Session Table
Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services Create Azure App Service Web Apps Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Implement Azure functions Azure Functions overview Developing Azure Functions Implement Durable Functions Develop solutions that use blob storage Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Create an Azure Resource Manager Template Develop solutions that use Cosmos DB storage Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Create and deploy ARM templates Implement user authentication and authorization Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Implement secure cloud solutions Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Implement API Management API Management overview Defining policies for APIs Securing your APIs Develop event-based solutions Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Develop message-based solutions Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Monitor and optimize Azure solutions Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Additional course details: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.