• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1215 Security courses in Sutton Coldfield delivered Live Online

Cisco Implementing Segment Routing on Cisco IOS XR v1.0 (SEGRTE201)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. The primary audience for this course includes: Systems and network engineersTechnical architectsTechnical support personnelChannel partners and resellers Overview After completing this course, you should be able to: Describe the current network security landscape and the Cisco Integrated Threat Defense (ITD) solutionDescribe the key components of the ITD solution and their use in the networkConfigure the ISE for a baseline of operation in the ITD solutionConfigure the integration between the Stealthwatch and ISE platformsConfigure the integration between the Cisco Firepower and ISE platformsConfigure the integration between Cisco Firepower and AMP for Endpoints This course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch©, Cisco Firepower© NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. Course Outline Integrated Threat Defense Introduction Itd Products Identity Services Engine Setup Integration Of Stealthwatch With Identity Services Engine Integration Of Firepower With Identity Services Engine Integration Of Firepower With Amp For Endpoints

Cisco Implementing Segment Routing on Cisco IOS XR v1.0 (SEGRTE201)
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Access Advanced - In-company / Bespoke

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Do advance Table design Do advance Query design and Action Querys Do advance Form design with the use of macros and buttons Export and import data to and from different sources. 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Advanced Table Design Advanced Field Properties Table Properties Advanced Query Design Advanced Naming Conventions Join Tables in Queries Manage Query Joins Use Self-Joins in Queries Summarise Data in Queries Parameter Queries Action Queries Crosstab Queries Advanced Form Design Create Subforms and Linked Forms Form Controls Command Buttons Form Properties Interface, Start-Up and Navigations Forms Working with Macros Create Single Macros Run Macros Work with Sub Macros Use Conditional Macros Run Macros from Buttons Assign Macros to Events Extending Data Reach Import Data Export Data Work with Linked Tables Managing Databases Object Dependencies Database Documenter Performance Analyzers Regular Management of a Database Access Database Security Who is this course for? Who is this course for? The course is aimed at all users who would like to obtain the necessary skills to create advanced table, query, form and reports as well as to automate tasks with the use of macros. Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills

Microsoft Access Advanced - In-company / Bespoke
Delivered in London or UK Wide or OnlineFlexible Dates
£550

Data Protection (GDPR) Foundation Certificate

By CloudLearn

The Data Protection (GDPR) Foundation Certificate is the course for people who need a formal qualification to demonstrate a clear, concise and generic understanding of the UK General Data Protection Regulation and Data Protection Act 2018, in support of the practical knowledge often acquired in the workplace. It is suitable for the public, private and third sectors and will teach participants essential UK GDPR skills and sufficient knowledge to assist their organisation toward their data protection implementation and UK GDPR accountability requirement. The course is suitable for beginners but anyone with significant data protection knowledge will also get considerable benefit from it. This Foundation Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. Copies of the slides for the course are sent out a few days in advance. As the course covers a lot of ground in a short time we recommend attendees who know nothing about data protection to read through these. Note: This course is delivered live, online, using Zoom. It will be delivered 9.30 - 12.30 and 13.30 - 16.30 approx. Course Content Topics covered include: Background to Data Protection Legislation Scope Essential Definitions The Core of Data ProtectionPrinciplesLegal BasisTransparency/Privacy NoticesRights and Their Management Data Security Obligations and Breach Notification International Transfers (including cloud) Data Processors and ContractsDue Diligence Data Sharing and Joint ControllersAd Hoc and Planned Data Protection by DesignData Protection Impact Assessments Data Protection Officers Accountability and Action Plan The ICO and Enforcement Questions/discussion throughout the course Suitability - Who should attend? Anyone with an interest in data protection or needing a detailed introduction. Anyone involved in supporting data protection compliance in an organisation. Outcome / Qualification etc. Learning Outcomes: Be aware of the importance of data protection legislation and the GDPR Understand the key obligations of the GDPR and DPA Understand the rationale behind a data protection audit and gap analysis Assist with policies and procedures required for data protection compliance and accountability

Data Protection (GDPR) Foundation Certificate
Delivered OnlineFlexible Dates
£300

Microsoft Power BI Desktop (live online classes)

By Microsoft Office Training

This course will allow you to explore the potential of self-service business intelligence using Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, to create Visualizations, and publish Reports to different platforms . Course Objectives At the end of this course you will be able to: Connect to data from different sources. Use the Query Editor Perform Power BI desktop data Shaping and Transformation. Create Power BI desktop Modelling. Create Power BI desktop Visualizations and Reports. ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level and Business Intelligence. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke course Tailored training courses: in in company training, you can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Introduction to Power BI Power BI Jargon explained A quick look at Power BI Desktop A quick look at the Power BI service Helpful resources Power BI and Excel Introduction to using Excel data in Power BI Upload Excel data to Power BI Import Power View and Power Pivot to Power BI Getting started with Power BI Desktop Overview of Power BI Desktop Accessing Help and Helpful resources Connect to data sources in Power BI Desktop Shaping and Transforming Data with Query Editor Introduction to the Query Editor Data Sources Power BI Desktop can Connect to Introduction to Steps and M code Combining Data Using Merge and Append Queries Data Type Properties Working with Delimiters Clean and transform your data with the Query Editor Text Specific Transformation Tools Number Specific Transformation Tools Date Specific Transformation Tools Split and Merge columns Creating an Index Column Adding Conditional Columns Columns From Examples Grouping and Aggregating data Pivoting and Unpivoting Using filters Modeling the data Introduction to modeling your data How to manage your data relationships Create calculated columns Optimizing data models Create calculated measures Show Values As and Quick Measures Create calculated tables Explore your time-based data Introduction to DAX DAX calculation types DAX functions Visualizations Introduction to visuals in Power BI Create and customize simple visualizations Modify colors in charts and visuals Shapes, text boxes, and images Page layout and formatting Group interactions among visualizations Visual hierarchies and drill-down Using custom visualizations Create a KPI Visualization Geo-Data and Maps Reports, Publishing and Sharing Introduction to the Power BI service Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Introduction to content packs, security, and groups Publish Power BI Desktop reports Print and export dashboards and reports Create groups in Power BI Use content packs Update content packs Publish to web Who is this course for? Who is this course for? This course facilitates you with knowledge on the potential for Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, and to create Visualizations, and publish Reports to different platforms. Requirements Requirements Before attending this course, delegates should have: - A general knowledge of database concepts (fields, records and relationships) - Familiarity with Excel. Career path Career path Business Intelligence Data Analysis ETL & Data Warehousing

Microsoft Power BI Desktop (live online classes)
Delivered OnlineFlexible Dates
£750

Salesforce Implement and Manage Tableau CRM (ANC301)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is ideal for integration specialists or Salesforce Administrators who want to learn more about connecting and securing data in Tableau CRM. This course is also great for business analysts or developers interested in creating advanced dashboards. Overview When you complete this course, you will be able to: Determine your user, data, and security requirements, and establish a development process. Set up apps and control what users can do in Tableau CRM by assigning them licenses, permission sets, and app permissions. Load external data to Tableau CRM. Create and run dataflows to load Salesforce data, and join it with data from other datasets. Understand and use Data Sync effectively. Understand Recipes and Data Prep. Understand and implement data security in Tableau CRM, and override security for implementation and testing. Understand how filters on dashboards function and be able to use interactions when necessary. Understand a dashboard's JSON file. Explain the process of dashboard queries and modify a query to meet specific analytic requirements. Modify dataset metadata. Take your Tableau CRM skills to the next level. In this 3-day, expert-led class, you?ll learn how to develop and implement a Tableau CRM environment that contains both Salesforce and non-Salesforce data. Our team of experts will walk you through Tableau CRM features and settings, user setup, how to load and transform data, data security, and how to modify queries to customize dashboards so you can work more efficiently, spot trends, and predict outcomes faster. Discovery and Planning Discovery Meeting Establishing Your Users and Development Process Set Up Users and Apps Overview of User Access on the Tableau CRM Platform Creating Tableau CRM Permission Sets Assigning Licenses and Permission Sets to Users Creating and Sharing Tableau CRM Apps Connect Data Overview of Connecting Data Data Mapping Overview of the Dataflow Process Designing a Dataflow Loading External CSV Data Creating Dataflows Optimizing Dataflows Running, Monitoring, and Scheduling a Dataflow Preparing Datasets with Recipes with Data Prep Data Connectors Additional Transformations Data Security Overview of Security in Tableau CRM Determining Security Requirements Overview of Using Predicate Filters Implementing Ownership-Based Row-Level Security Implementing Role-Based Row-Level Security Implementing Team-Based Row-Level Security Overriding Security for Implementation and Testing Sharing Inheritance Extended Metadata in a Dataset Overview of Extended Metadata (XMD) Updating Field Metadata Adding Quick Action Menus for Records in Tableau CRM Dashboard Templates and Mobile Dashboards Overview of Tableau CRM Dashboard Templates Overview of JSON for Dashboards Building a Dashboard Using a Template Optimizing Dashboards for a Mobile Device Bindings in Dashboards Understanding Filters in Lenses and Dashboards Multi-Dataset Dashboards Filters with Interactions Custom Queries Query Modification Overview of Modifying Queries Maximizing the Use of the Compare Table Salesforce Analytics Query Language (SAQL) SAQL Queries in a Tableau CRM Dashboard Additional course details: Nexus Humans Salesforce Implement and Manage Tableau CRM (ANC301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Implement and Manage Tableau CRM (ANC301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Implement and Manage Tableau CRM (ANC301)
Delivered OnlineFlexible Dates
Price on Enquiry

Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE?s ArubaOS-Switches. Overview Upon completion of this course, students will be able to: Implement spanning tree protocol and loop protections Ensure redundancy for a network?s default gateway by configuring VRRP on Aruba switches Implement and manage an VSF fabric Deploy ArubaOS switches in single-area and multi-area OSPF systems Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicasts within VLANs Implement PIM-DM to route multicast traffic Establish and monitor BGP sessions between your routers and ISP routers Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on ArubaOS switches to select given traffic Implement 802.1X on ArubaOS switch ports Configure captive portal authentication on ArubaOS switches to integrate them with an Aruba ClearPass solution Configure tunneled-node on ArubaOS switches Configure ArubaOS switches to select traffic, apply the appropriate QoS marking, and place the traffic in the proper priority queues Implement DHCP snooping and ARP protection to defend networks against DHCP exploits, ARP snooping, and ARP poisoning attacks Implement the proper port security measures for various use cases Implement connection rate filtering to provide a first layer of protection against viruses and worms This course teaches students how to implement and operate enterprise-level Aruba campus switching solutions. Hand-on labs gives students experience with ArubaOS-Switches, including securing access, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with HPE?s Virtual SwitchingFramework (VSF). Students will also learn to configure dynamic routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP), network optimization via Quality of Service (QoS), IP multicast routing leveraging Protocol Independent Multicast (PIM), and protecting the network using Access Control Lists (ACLs). This course is approximately 30% lecture and 70% hands on lab exercises. Introduction to Aruba SolutionsData Link Layer Redundancy TechnologiesVirtual Router Redundancy Protocol (VRRP)Aruba Backplane Stacking and Advanced Virtual Switch Framework (VSF)Advanced Open Shortest Path First (OSPF)Internet Group Management Protocol (IGMP)Border Gateway Protocol (BGP)Access Control Lists (ACLs)MAC AuthenticationCaptive Portal and Other Guest OptionsIntegrating with Aruba Mobility SolutionsSecure Device ManagementQuality of Service (QoS)Additional Security Features Additional course details: Nexus Humans Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Developing iRules for BIG-IP

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system administrators, network administrators and application developers responsible for the customization of traffic flow through a BIG-IP system. This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Getting Started with iRules Customizing Application Delivery with iRules Triggering an iRule Leveraging the DevCentral Ecosystem Creating and Deploying iRules Module 3: Exploring iRule Elements Introducing iRule Constructs Understanding iRule Events and Event Context Working with iRule Commands Logging from an iRule Using SYSLOG-NG (LOG Command) Working with User-Defined Variables Working with Operators and Data Types Working with Conditional Control Structures (IF and SWITCH) Incorporating Best Practices in iRules Module 4: Developing and Troubleshooting iRules Mastering Whitespace and Special Symbols Grouping Strings Developing and Troubleshooting Tips Using Fiddler to Test and Troubleshoot iRules Module 5: Optimizing iRule Execution Understanding the Need for Efficiency Measure iRule Runtime Efficiency Using Timing Statistics Modularizing iRules for Administrative Efficiency Using Procedures to Modularize Code Optimizing Logging Using High-Speed Logging Commands in an iRule Implementing Other Efficiencies Using Looping Control Structures (WHILE, FOR, FOREACH Commands) Module 6: Securing Web Applications with iRules Integrating iRules into Web Application Defense Mitigating HTTP Version Attacks Mitigating Path Traversal Attacks Using iRules to Defends Against Cross-Site Request Forgery (CSRF) Mitigating HTTP Method Vulnerabilities Securing HTTP Cookies with iRules Adding HTTP Security Headers Removing Undesirable HTTP Headers Module 7: Working with Numbers and Strings Understanding Number Forms and Notation Working with Strings (STRING and SCAN Commands) Combining Strings (Adjacent Variables, CONCAT and APPEND Commands) Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands) Module 8: Processing the HTTP Payload Reviewing HTTP Headers and Commands Accessing and Manipulating HTTP Headers (HTTP::header Commands) Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri) Parsing the HTTP URI (URI::path, URI::basename, URI::query) Parsing Cookies with HTTP::cookie Selectively Compressing HTTP Data (COMPRESS Command) Module 9: Working with iFiles and Data Groups Working with iFiles Introducing Data Groups Working with Old Format Data Groups (MATCHCLASS, FINDCLASS) Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH) Module 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles Implementing Universal Persistence (PERSIST UIE Command) Working with the Stream Profile (STREAM Command) Collecting Statistics Using a Statistics Profile (STATS Command) Collecting Statistics Using iStats (ISTATS Command) Module 11: Incorporating Advanced Variables Reviewing the Local Variable Namespace Working with Arrays (ARRAY Command) Using Static and Global Variables Using the Session Table (TABLE Command) Processing Session Table Subtables Counting ?Things? Using the Session Table

F5 Networks Developing iRules for BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Video Infrastructure Implementation v1.0 (VII)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Field Engineers Employees Overview After taking this course, you should be able to: Define Cisco Business TelePresence Solutions components and architectures Implement Cisco TelePresence Video Communication Server (Expressway) for basic and advanced video networks Implement Cisco TelePresence Management Suite (TMS) Configure Cisco Meeting Server Features Define integration of Cisco Collaboration Premise Solutions with Cisco Cloud, including Cisco Spark, Cisco Spark Hybrid, and WebEx Cisco Video Infrastructure Implementation (VII) v1.0 will provide you with the necessary knowledge and skills to implement a complete Cisco TelePresence solution, including TelePresence endpoints, integration of premise with cloud solutions, meeting solutions, and management software. It describes Cisco business TelePresence solutions and enables students to implement and troubleshoot basic and advanced TelePresence network solutions. Module 1: Advanced Cisco Expressway Features Lesson 1: Introducing Cisco Video Network Solutions Lesson 2: Exploring Cisco Expressway Basic Setup Lesson 3: Explaining Regular Expressions in a Cisco Expressway Environment Lesson 4: Deploying Components of Cisco Expressway Security Lesson 5: Exploring the Fundamentals of Subzones on a Cisco Expressway Lesson 6: Administering Call Control on a Cisco Expressway Lesson 7: Implementing Subzone Bandwidth Management on a Cisco Expressway Lesson 8: Implementing Zones on a Cisco Expressway Lesson 9: Exploring Clustering on the Cisco Expressway Lesson 10: Applying Troubleshooting on the Cisco Expressway Module 2: Advanced Cisco Meeting Server Features Lesson 1: Introducing the Cisco Meeting Server Lesson 2: Exploring Cisco Meeting Server API Configuration Lesson 3: Exploring Cisco Meeting Server Resilient and Scalable Deployments Lesson 4: Exploring Additional Features with Cisco Meeting Server Module 3: Cisco Collaboration Meetin gRoom Solutions wiht Cisco TelePresence Server Lesson 1: Introducing Cisco Collaboration Meeting Room Cloud, Premises, and Hybrid Products Lesson 2: Deploying the Cisco TelePresence Server and Cisco TelePresence Conductor Lesson 3: Applying Troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite Solution Lesson 1: Explaining Cisco TMS Installation Lesson 2: Describing Cisco TMS Operation Lesson 3: Explaining Cisco TMS Conference Scheduling and Management Lesson 4: Configuring Permissions on Cisco TMS for Administration Lesson 5: Applying Troubleshooting to Cisco TMS Module 5: Cisco Cloud Solutions?WebEx and Spark Lesson 1: Introducing Cisco WebEx and Cisco Spark Cloud Solutions Lesson 2: Exploring Cisco Spark Administration Configuration Lesson 3: Deploying Cisco Spark Hybrid Services Lesson 4: Exploring Cisco Spark APIs and BOTs Configuration Module 6: Cisco TelePresence Content Server (Optional Module) Lesson 1: Examining Cisco TCS Operation and Configuration

Cisco Video Infrastructure Implementation v1.0 (VII)
Delivered OnlineFlexible Dates
Price on Enquiry

Definitive Salt for engineers

5.0(3)

By Systems & Network Training

Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.

Definitive Salt for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

F2810G IBM FileNet P8 Platform Administration (V5.5.x)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system

F2810G IBM FileNet P8 Platform Administration (V5.5.x)
Delivered OnlineFlexible Dates
Price on Enquiry