Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Running a successful project requires skills in planning, budgeting, tracking deliverables and stakeholder management. An area that can be neglected by project managers is the 'people side' - not the project team themselves but the end-users, those who will be affected by the project. Too often there is a single line at the end of the project plan that says 'Comms and Training'. If people are going to have to work differently and learn some new processes, then there is work to be done by the project team to help them through the emotional side of the change. This session explores why it's important to bring people along when a change is being made. It will provide project teams with the skills and knowledge either to manage the people change plan themselves or to secure the right resources for their project. Understand the importance of the 'people side' of change 8 'Golden Rules' of change management - overview How to create a simple but effective change plan Adoption Benefits of good change management 1 Introduction Objectives and agenda People and projects - why is it important? The Change Curve - the emotional side of change 2 8 'Golden Rules' of change management - including... Role of the sponsor Communication Resistance to change 3 Change plan Elements of a change plan Change impact assessment Alignment with the project plan 4 Adoption Who owns the change? The vital role of the manager Feedback and action loops 5 Benefits Estimating the costs / benefits 6 Next steps Summary of key learning points Reflection on next steps 7 Close
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview Ensure a smooth, rapid implementation of PeopleSoft Time and Labor. Better understand how to facilitate the management, planning, reporting and approving of time, and calendar and schedule creation and usage. Set Up System and Time and Labor Tables Learn about and set up the tables that support your Time and Labor system. Identify how to track employee time by period and define workgroups and task groups to group time reporters into useful segments for processing. Manage Time Reporting Enroll time reporters into Time and Labor, and assign them to work schedules. Report time using different tools. Process reported time using the rules you defined to match your business processes. This PeopleSoft Time and Labor - North America Rel. 9.2 training will show you how to implement the PeopleSoft Time and Labor product encompassing features and functionality , and develop a solid foundation of knowledge that allows you to enroll time reporters into Time and Labor, assign them to work schedules, and report and process reported time. Setting Up PeopleSoft Human Resources, Payroll, and Benefits Tables Indentifying Prerequisite Human Resources, Benefits, and Payroll Tables Defining Prerequisite Tables Defining Holiday Schedules Defining Earnings Codes and Programs Defining Pay Groups and Pay Calendars Setting Up Basic PeopleSoft Time and Labor Tables Setting Up Time Zone Offsets Setting Up the Time and Labor Installation Table Setting Up Manager Time Calendar View Options Selecting the Labor Distriution and Labor Dilution Options Establishing Time Reporting Codes Describing Time Reporting Codes (TRC) Defining Time Reporting Code Categories Establishing Time Reporting Codes Defining TRC Programs Defning Compensatory Time Plans Establishing Time Periods Describing Time Periods Establishing Time Periods Establishing Planned Overtime Describing Planned Overtime Features Establishing Planned Overtime Creating Workgroups Describing Key Workgroup Concepts Creating Workgroups Defining Template Built Rules Identifying Online Rule Definition Tools Identifying Steps to Define Rules Defining Template Built Rules Defining Rule Programs Exporting and Importing Rules Describing Rule Template Creation Creating Task Groups Identifying Task Functinlaity Concepts Creating Task Templates Creating Task Profiles Creating Taskgroups Describing Task Profile Reporting Precedence Building Schedules Identifying Scheduling Concepts Describing Scheduling Integrations Identifying the Steps to Create a Schedule Setting Up Schedules Validating Schedules Setting Up Time Reporters Creating Time Reporter Data Maintaining Time Reporter Data Assigning Time Reporters to a Schedule Assigning and Viewing Compensatory Time Off Plans Setting Up Groups and Security Describing PeopleSoft Time and Labor Groups and Security Setting Up Group Creating Security Setting Up Dynamic Groups Setting Up Static Groups Viewing Time Reporters in Groups Setting Up Group Security Reporting Time Using Rapid Entry Describing Time Reporting Establishing Rapid Time Templates Performing Rapid Entry Running the Time Administration Process Describing the Time Administration Process Describing Time Reporter and Payable Time Status Reporting Time Using Self-Service Identifying Time Reporting Defining Time Reoprting Templates Defining User Preferences Reporting Time Using Timesheets Reporting Time Using the Web Clock Identifying Mass Time Reporting Requesting Overtime Requesting Absence Managing Exceptions Defining Exceptions Managing Exceptions Using Fluid and Workforce Availability Setting Up the Time and Labor Mobile Applications Entering Time Reporting as an Employee Managing Time Administration as a Manager Setting Up Workforce Availability Viewing Workforce Availability for Daily and Weekly Time Integrating with PeopleSoft Payroll for North America Integrating with Absence Management Preparing for a Payrun Running the Time and Labor Load Process Setting Up and Using Auto Enrollment Setting Up Auto Enrollment Defining Auto Enrollment Groups Previewing the Enrollment Data Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Additional course details: Nexus Humans Oracle PeopleSoft Time and Labor - North America Rel. 9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle PeopleSoft Time and Labor - North America Rel. 9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco technical customers (IT, telephony members, etc.) Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the CUIC High-Level Architecture and Deployment considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Describe the installation and function of both the Controller Node Member Nodes. CUIC Configurations as well as how to upgrade the product is discussed. Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Describe what a Value List is and its function in CUIC Describe how Value Lists are created Describe what a Collection is and when you would use it when running reports Describe what are Report Definitions Describe the creation of Report Definitions and how to build a new Report using the new Report Definition The Cisco Unified Intelligence Center 11.6 for Advanced Users v1.1 (CUIC11.6AU v1.1) course is a 2-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview for the Advanced User Understanding Cisco Unified Intelligence Center Deployment Considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Installing Cisco Unified Intelligence Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Using CUIC Value Lists and Collections as well as Report Definitions Using Value Lists and Collections Using Report Definitions
Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary
Own Your Success is delighted to bring you the 'Bitesize Masterclass' with Sophie Chapman. Not everyone has the flexibility to step away from the office for in-person events or dedicate extended periods from their packed schedules for full or half-day sessions. So we've put together our 'Bitesize Masterclasses' to help assistants develop and learn from professionals such as Sophie - shorter sessions, same big impact! Bitesize Masterclass with Sophie Chapman Sophie Chapman EA to Steven Bartlett Although Sophie initially aspired to be a talent agent, she swiftly realised that her career passions lay within the administrative/operational aspects of working life. Following her graduation in Entertainment Management from LIPA in 2008, she gained extensive work experience across renowned entities such as Sony BMG and Sky One, operating within the spheres of TV, music, radio, and the events industry. Her pivotal entry into a PA role came while supporting musician Eliza Doolittle. After five years, Sophie opted to move home to Liverpool and accept a contract supporting Sir Dave Brailsford of Team Sky. Once complete, Sophie received an offer for a position based in the US with an A-list musician. However, her journey led her to discover her "forever role", providing support to Steven Bartlett. Steven, the Founder and former Group CEO of Social Chain, is a multifaceted individual—a published author, podcaster, entrepreneur, and presently, the youngest-ever Dragon on BBC's Dragon's Den. Sophie has been instrumental as Steven's Executive Assistant, operating on a global scale, in both private and corporate realms for six years. Kate Wood Masterclass Facilitator Kate will aid the facilitation of this Bitesize Masterclass, ensuring that crucial topics are covered while prioritising an environment where every participant feels acknowledged, valued, and heard throughout the session. Kate is a business owner, qualified coach, consultant, facilitator, trainer, podcaster and public speaker with a background in learning & development, employee engagement strategy, continuous improvement, communications and marketing. After 25 years working across the board in blue-chip, non-profit and civil service organisations she now provides support to businesses looking to evolve and become great places for people to work in and with. Having worked with a wide variety of clients from school-age students to senior executives, she has been designing and running workshops, seminars and classes in person or via web events since she left long commutes and corporate roles behind in 2014 when she created her first two businesses. Her passion is improving working relationships between roles and functions and supporting people to discover their best selves at work. She does this in the automotive industry, financial services, medical teams, charities, global media, retail, education systems and the arts. When she’s not working, she and her classic car Monty Morgan can be found zipping around the English countryside. Session topics: How to establish your self-leadership position in your EA capacity Transition from a PA to EA Career development Boundary setting and wellbeing Q&A with the audience - Open-Book Q&A What is a Bitesize Masterclass? Short burst session. Keynote speakers discuss key themes/topics they are passionate about. Q&A with the audience attendees - ask the questions you don't usually get to ask! Run time of 90 minutes (max 2 hours) - we block out two hours in case we overspill on questions. 😊 Virtually delivered - attend from anywhere that's convenient for you! Packed with content, tips and tricks and from industry professionals who can share their experiences with you. Who will attend? PA's EA's Administrative roles --------------------------- At Own Your Success, we strongly believe in fostering an inclusive environment where diversity is celebrated and discrimination of any form is unwelcome. We welcome attendees from all backgrounds, regardless of race, ethnicity, gender identity, sexual orientation, religion, age, ability, or any other characteristic. Discrimination has no place in our workshops, and we are committed to creating a respectful and supportive space for all participants to learn and grow together. ---------------------------
Duration 2 Days 12 CPD hours This course is intended for Professional Scrum Master Foundation is appropriate for Scrum Masters and people who are interested in Scrum projects. It will be useful for: Product Owners Scrum Masters Developers Team Leaders Overview The emphasis of the training is the practical application of Scrum. The course gives various knowledge on the logic of Scrum and the way it functions. You will learn about the roles of all participants in a Scrum project. You will also learn about different challegnes you may encounter and how to resolve them. The Professional Scrum Master Foundations course is the perfect introduction, reboot or refresher to Scrum. This course is for teams or anyone wanting to experience the Scrum way of working. The case for Agility Learn about Agile Manifesto, values and principles and how can agile bring more value and manage risks compared with traditional delivery approaches. Scrum Framework Understand Scrum Framework and the life cycle of Scrum including the events, artifacts and roles and responsibilities. Running a Sprint Deep dive into each of the events and discuss user stories, estimations, groomings, Definition of Done and Definition of Ready and how can we deliver value incrementaly. The role of the Scrum Master How can you be a servant leader of your team and support different stakeholders engagement? ÿFacilitation, coaching and ensuring transparency. Backlog and estimations Learn the importance of Product backlog in Scrum, prioritization and estimations at different levels (ex: release; sprint) Working with people and teams We will discuss motivation, communication and clarity, giving feedback, team development and effective conflict resolution. Continuous Improvement Assist your team to improve both the means and ends of their work by supporting them in problem detection and resolution as well as foster the culture of continuous improvement.
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices