Duration 4 Days 24 CPD hours This course is intended for This course is aimed at IT professionals who support Windows 11 desktops, devices, users, and associated network and security resources. The secondary audience for this course is Desktop/Device Support Technicians (DSTs) who provide Tier 2 support to users with computers that are running the Windows 11 operating system (OS) in a on-premises environment. Overview After completing this course, you will be able to: Install and configure Windows 11 desktops and devices in a Windows Server domain corporate environment Install and customize Windows 11 operating systems and apps Configure local and remote network connectivity and storage Configure data security, device security, and network security Maintain, update, and recover Windows 11. This is a 4-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. Module 1: Installing Windows 11 Introducing Windows 11 Installing Windows 11 Module 2: Upgrading and updating Windows 11 Upgrading to Windows 11 Migrating user state Managing Windows 11 updates Module 3: Configuring Windows 11 devices Local configuration tools in Windows 11 Using Windows Admin Center Using Windows PowerShell Implementing Remote Management Module 4: Configuring network connectivity Configuring network connectivity Implementing name resolution Implementing remote access Module 5: Managing storage Overview of storage options Managing local storage Managing Storage Spaces Module 6: Managing resources Configuring and managing file access Configuring and managing shared folders Implementing Work Folders Managing printers Module 7: Managing apps in Windows 11 Deploying apps Managing access to the Microsoft Store Configuring Microsoft Edge Module 8: Implementing and managing security Managing user and group accounts Configuring User Account Control Implementing BitLocker Implementing Windows 11 security features Securing against network threats Module 9: Monitoring Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Module 10: Troubleshooting Windows 11 Managing Windows 11 startup Recovering Windows 11 Managing devices and drivers Understanding the registry Recovering files
Duration 2 Days 12 CPD hours This course is intended for Data Modelers Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing a dynamic cube, and enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Dynamic Cubes Define and differentiate Dynamic Cubes Dynamic Cubes characteristics Examine Dynamic Cube requirements Examine Dynamic Cube components Examine high level architecture IBM Cognos Dynamic Query Review Dimensional Data Structures Dynamic Cubes caching Create & Design a Dynamic Cube Explore the IBM Cognos Cube Designer Review the cube development process Examine the Automatic Cube Generation Manual development overview Create dimensions Model the cube Best practice for effective modeling Deploy & Configure a Dynamic Cube Deploy a cube Explore the Estimate Hardware Requirements Identify cube management tasks Examine Query Service administration Explore Dynamic Cube properties Schedule cube actions Use the DCAdmin comment line tool Advanced Dynamic Cube Modelling Examine advanced modeling concepts Explore modeling caveats Calculated measures and members Model Relative Time Explore the Current Period property Define period aggregation rules for measures Advanced Features of Cube Designer Examine multilingual support Examine ragged hierarchies and padding members Define Parent-Child Dimensions Refresh Metadata Import Framework Manager packages Filter measures and dimensions Optimize Performance with Aggregates Identify aggregates and aggregate tables In-memory aggregates Use Aggregate Advisor to identify aggregates User defined in-memory aggregates Optimize In-Memory Aggregates automatically Aggregate Advisor recommendations Monitor Dynamic Cube performance Model aggregates (automatically vs manually) Use Slicers to define aggregation partitions Define Security Overview of Dynamic Cube security Identify security filters The Security process - Three steps Examine security scope Identify scope rules Identify roles Capabilities and access permissions Cube security deep dive Model a Virtual Cube Explore virtual cubes Create the virtual cube Explore virtual cube objects Examine virtual measures and calculated members Currency conversion using virtual cubes Security on virtual cubes Introduction to IBM Cognos Analytics Define IBM Cognos Analytics Redefined Business Intelligence Self-service Navigate to content in IBM Cognos Analytics Interact with the user interface Model data with IBM Cognos Analytics IBM Cognos Analytics components Create reports Perform self-service with analysis and Dashboards IBM Cognos Analytics architecture (high level) IBM Cognos Analytics security Package / data source relationship Create Data modules Upload files Additional course details: Nexus Humans B6063 IBM Cognos Cube Designer - Design Dynamic Cubes (v11.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6063 IBM Cognos Cube Designer - Design Dynamic Cubes (v11.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ⢠(Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay
This course will allow you to explore the potential of self-service business intelligence using Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, to create Visualizations, and publish Reports to different platforms . Course Objectives At the end of this course you will be able to: Connect to data from different sources. Use the Query Editor Perform Power BI desktop data Shaping and Transformation. Create Power BI desktop Modelling. Create Power BI desktop Visualizations and Reports. ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level and Business Intelligence. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Introduction to Power BI Power BI Jargon explained A quick look at Power BI Desktop A quick look at the Power BI service Helpful resources Power BI and Excel Introduction to using Excel data in Power BI Upload Excel data to Power BI Import Power View and Power Pivot to Power BI Getting started with Power BI Desktop Overview of Power BI Desktop Accessing Help and Helpful resources Connect to data sources in Power BI Desktop Shaping and Transforming Data with Query Editor Introduction to the Query Editor Data Sources Power BI Desktop can Connect to Introduction to Steps and M code Combining Data Using Merge and Append Queries Data Type Properties Working with Delimiters Clean and transform your data with the Query Editor Text Specific Transformation Tools Number Specific Transformation Tools Date Specific Transformation Tools Split and Merge columns Creating an Index Column Adding Conditional Columns Columns From Examples Grouping and Aggregating data Pivoting and Unpivoting Using filters Modeling the data Introduction to modeling your data How to manage your data relationships Create calculated columns Optimizing data models Create calculated measures Show Values As and Quick Measures Create calculated tables Explore your time-based data Introduction to DAX DAX calculation types DAX functions Visualizations Introduction to visuals in Power BI Create and customize simple visualizations Modify colors in charts and visuals Shapes, text boxes, and images Page layout and formatting Group interactions among visualizations Visual hierarchies and drill-down Using custom visualizations Create a KPI Visualization Geo-Data and Maps Reports, Publishing and Sharing Introduction to the Power BI service Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Introduction to content packs, security, and groups Publish Power BI Desktop reports Print and export dashboards and reports Create groups in Power BI Use content packs Update content packs Publish to web Who is this course for? Who is this course for? This course facilitates you with knowledge on the potential for Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, and to create Visualizations, and publish Reports to different platforms. Requirements Requirements Before attending this course, delegates should have: - A general knowledge of database concepts (fields, records and relationships) - Familiarity with Excel. Career path Career path Business Intelligence Data Analysis ETL & Data Warehousing
Duration 3 Days 18 CPD hours This course is intended for Students receive comprehensive Microsoft Dynamics exam preparation, becoming familiarized with the Dynamics CRM customization and configuration tools. Aspirants also learn to leverage the platform tools to create custom objects, automate tasks, modify user interface, and perform other such customizations. Overview Configure the Dynamics CRM settingsConfigure different entities and fieldsImplement entity relationships, custom actions, workflows, and dialogsIdentify scenarios for utilizing multiple forms, and design considerations for chartsSet default share views and public views, and configure and manage dashboardsIdentify role-based business processesIdentify and manage business requirements and teams This course explains everything you need to know about customizing and configuring the Dynamics CRM 365 system in accordance with a company?s specific requirements. Introduction to Customization and Configuring Dynamics CRM Talent and Course Introduction Module Overview CRM Overview What is Dynamics Customization and Configuration? CRM Architecture Customization Methodology Module review Obtaining a Dynamics CRM Trial TEST YOUR KNOWLEDGE MODULE 1' Manage Microsoft Dynamics CRM Online Subscriptions Module Overview Configuring CRM Overview of CRM Security User Administration Mailboxes Teams CRM Security Model Module Overview Purpose of the CCRM Security Model Privileges Access Levels Security Roles Hierarchy Security Hierarchy Types Module review Introduction to Solutions Module Overview Solutions Overview Solution Detail Creating and Working with Solutions Working with Solution Assets Exporting Solutions Importing Solutions Module review Entity and Field Customization Module Overview Types Entities Entity Ownership Entity Properties System vs Custom Entities Custom Entities and Security Roles Overview of Fields Field Properties Module review Additional Field Customization Module Overview Creating Fields to Meet Client Needs Calculated Fields Rollup Fields CRM Option Sets Alternate Keys Field Level Security State and Status Reason Transitions Module Review Configure mobile devices Module Overview Types of Relationships How and where they are created Many to Many Relationships Hierarchical Data Entity Mapping Connection and Connection Roles Module Review Customizing Forms Module Overview Form types Qualities of a good form Building a Form Specialized Form Components Access Teams and Sub Grids Working with Navigation Additional Form Types Multiple Forms Form customizations and Mobile Clients Module Review Business Rules Module Overview Business Rules Business Rule Scope Trigger Rules Condition and Actions Else Conditions and Actions Occur When Conditions Are True Module review Views and Visualizations Module Overview Using Views View Customization System View Types Quick Find Customization Charts Customizing Dashboard Themes Module Review Introduction to Processes Module Overview Processes and Automation Workflow Basics Module review Business Process Flows What are CRM Business Process Flows Enabling Business Process Flows Steps Stages and Categories Conditional Branching Module Review Bringing it all Together Module Overview Review of Customization Topics Covered Senario Packaging in a Solution Module review
Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to perform many of the day-to-day administration tasks required of an Oracle database administrator. This course introduces many of the powerful capabilities of the Oracle database. In this course, students will learn about day-to-day administration tasks. It will also address administration sub-specialties. Introduction: Managing the Database Instance The Database Management Tools EM Database Express EM Cloud Control SQL Developer Database Administrator Introduction: Database Architecture Review Database Instance Configurations Memory Structures Process Structures Storage Architecture Introduction: Starting & Stopping Databse Services Start & Stop the Database Listener ABOUT DATABASE STARTUP/SHUTDOWN SYSOPER SYSDBA DATABASE STATE & STAGES STARTUP WITH EM CLOUD CONTROL STARTUP WITH SQL*PLUS SHUTDOWN WITH EM CLOUD CONTROL SHUTDOWN WITH SQL*PLUS USING MS WINDOWS SERVICES Introduction: Oracle Network Environment Oracle Net Services Architecture ORACLE NET CONFIGURATION ASSISTANT ORACLE NET MANAGER USING EM CLOUD CONTROL ADVANCED NETWORK COMPRESSION TROUBLESHOOTING NETWORK PROBLEMS Introduction: Diagnostics & Oracle Support About Database Diagnostics Fault Diagnosability Infrastructure DATABASE INSTANCE HEALTH SNAPSHOT THE SUPPORT WORKBENCH PROACTIVE DATABASE HEALTH CHECKS PACKAGE DIAGNOSTIC DATA WORKING WITH THE KNOWLEDGE BASE Storage: Tablespace Management Starter Tablespaces CREATE TABLESPACE WITH EM CC CREATE TABLESPACE WITH SQL MANAGE TABLESPACES WITH EM CC MANAGE TABLESPACES WITH EM DE MANAGE TABLESPACES WITH SQL DROP TABLESPACE ALTER TABLESPACE Storage: Advanced Tablespace Management Managing Temporary Tablespaces TEMP TABLESPACE GROUPS WITH EM TEMP TABLESPACE GROUPS WITH SQL DEFAULT PERMANENT TABLESPACES BIGFILE TABLESPACES MANAGING THE SYSAUX TABLESPACE Storage: Data Files & Temp Files Management Manage Data Files with EM ACCESS METADATA WITH SQL MANAGE DATA FILES WITH SQL MANAGE TEMP FILES ORACLE-MANAGED FILES (OMF) Storage: UNDO Data & UNDO Tablespaces About UNDO Space Management GUARANTEE UNDO RETENTION MONITOR UNDO SPACE WITH SQL USE THE EM UNDO ADVISOR Security & Schemas: Security Overview & Database Privileges Database Security Principles DATABASE SYSTEM PRIVILEGES DATABASE OBJECT PRIVILEGES SUPER ADMINISTRATOR ROLES PRIVILEGE ANALYSIS Security & Schemas: User Security Create & Manage User Accounts MANAGE USERS WITH EM MANAGE USERS WITH SQL CREATE USER ALTER USER DROP USER GRANT & REVOKE PRIVILEGES RESOURCE LIMITS VIA PROFILES ALTER PROFILE DROP PROFILE PASSWORD MANAGEMENT VIA PROFILES ROLE-BASED SECURITY MANAGEMENT ALTER USER...DEFAULT ROLE SET ROLE DELEGATING PRIVILEGE AUTHORIZATION WITH ADMIN OPTION & System Privileges WITH GRANT OPTION & Object Privileges PRINCIPLE OF LEAST PRIVILEGE CHECKLIST Security & Schemas: Database Auditing Auditing Database Activity Traditional Auditing Unified Auditing Create Audit Policy Security & Schemas: SQL Loader Loader Concepts Loader From the Command Line control File Options Load Methods Loader Express Mode Loader From EM Security & Schemas: Export & Import Manage Directory Objects The Data Pump Architecture Data Pump Export Data Pump Import Data Pump Dictionary Views Using the EM CC Interface Performance & Availability: Managing Performance & SQL Tuning Management Advisory Framework Performance Monitoring & AWR The SQL Tuning Advisor Monitoring Exceptions with Metrics Performance & Availability: Data Concurrency About System & User Locks Monitor & Manage User Locks Moitor Locks with Data Dictionary Manage Locks with EM Performance & Availability: Backup & Recovery Concepts Backup & Recovery Structures Managing REDO Data Configuring for Recoverability Instance Recovery Recoverability Checklist Additional course details: Nexus Humans Oracle 12c Administration II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c Administration II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover