Duration 5 Days 30 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, and Program/Project Managers. Overview Learn the fundamental concepts of the ABAP programming languageEfficiently use the ABAP Workbench toolsCreate simple application programs with user dialogs (list, selection screen, screens, Web Dynpro) and database dialogs (reading from the database) In this course, students gain knowledge of the fundamental concepts of ABAP and learn how to comfortably and efficiently work with the ABAP Workbench tools in order to undertake custom developments with confidence. Flow of an ABAP Program Describing the Processing of ABAP Programs ABAP Workbench Introduction Introducing the ABAP Development Environment Organizing ABAP Developments Developing Programs Finalizing Development Basic ABAP Language Elements Defining Elementary Data Objects Using Basic ABAP Statements Working with the ABAP Debugger Modularization Introducing Modularization Modularizing Using Subroutines Modularizing Using Function Modules Implementing Function Modules Modularizing Using BAPIs Modularizing Using Global Classes Implementing Simple Global Classes and Static Methods Modularizing Using Local Classes Complex Data Objects Working with Structures Working with Internal Tables Data Modeling and Data Retrieval Modeling Data Reading Single Database Records Reading Multiple Database Records Handling Other Aspects of Database Access Working with Authorization Checks Classic ABAP Report Implementing ABAP Lists Implementing Selection Screens Implementing Events of ABAP Reports Screen Creating Screens Creating Input/Output Fields Implementing Data Transport SAP List Viewer Using the SAP List Viewer Web Dynpro ABAP Describing Web Dynpro ABAP Implementing Navigation in Web Dynpro Implementing Data Transport in Web Dynpro Program Analysis Tools Using the Code Inspector ABAP Development Tools for SAP NetWeaver Describing ABAP Development Tools for SAP NetWeaver Creating an ABAP Project in Eclipse SAP Standard Software Adjustments Adjusting the SAP Standard Software Additional course details: Nexus Humans BC400 SAP ABAP Workbench Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BC400 SAP ABAP Workbench Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Channel partners and resellers Network administrators Network engineers Sales engineers System engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components. Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance. Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access. Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding. Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network. Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access. Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes. Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network. Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless. Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution Describe the use cases and migration scenarios for migrating users from traditional campus to SD The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco© SD-Access fits into Cisco Digital Network Architecture (Cisco DNA?). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended. Course Outline Introducing Cisco DNA Architecture Cisco DNA Center Design Cisco DNA Center Inventory Cisco DNA Center Automation Explore Cisco DNA Center and Automating Network Changes Introducing Cisco Software-Defined Access Deploying Cisco Software-Defined Access Deploy Wired Fabric Networks with Cisco DNA Center Cisco SD-Access for Wireless Cisco SD-Access Extension for IoT Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center Migrating to Cisco SD-Access Cisco SD-Access Multicast Integrating Cisco DNA Center Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications Understanding Programmable Network Infrastructure Operating and Managing Cisco DNA Infrastructure Test Drive Cisco DNA Center APIs
Duration 3 Days 18 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, Program/Project Manager, System Administrators, System Architects, and Technology Consultants. Overview Explaining scenarios and processes in SAP NetWeaver process integrationIdentify the technical communications modes and processesExplain business scenarios and the business hierarchy used by SAP In this course, students learn how to explain scenarios & processes in SAP NetWeaver process integration. They learn how to identify the technical communications modes & processes, as well as explain business scenarios & the business hierarchy used by SAP. Integration Basics Explaining Scenarios and Processes in SAP NetWeaver Process Integration Explaining Technical Communication Modes and Processes Explaining Business Scenarios Classical System-to-System Communication Communicating Between Two SAP Systems Communicating Between Two Non-SAP Systems Communicating Using Business Application Programming Interfaces (BAPIs) Communicating Using IDocs Processing IDocs Web Services Processing HTTP Requests Describing Simple Object Access Protocol (SOAP) Basics Analyzing Different Web Services Describing Inside-Out and Outside-In Web Services Explaining Service Oriented Architecture (SOA) Integration Technologies: On-Premise Process Integration (Design Time) Processing Integration Middleware Tools (PI Dual Stack) Installing Dual-Stack or Single-Stack Options Securing Objects Creating PI Objects Explaining Design Objects Modeling PI Scenarios Creating an Integration Scenario Configuring an Integration Scenario Displaying the Configuration Objects in the Integration Directory Integration Technologies: On-Premise Process Integration (Runtime) Connecting SAP NetWeaver PI with Proxies Creating File Adapters Executing Configuration Objects Monitoring Tools Integration Technologies: On-Premise Process Orchestration (PO) Explaining Business Process Management (BPM) Explaining Process Orchestration (PO) Explaining Advanced Adapter Engine Extended (AEX) Explaining Business Rules Management (BRM) Integration Technologies: On Demand Explaining SAP HANA Cloud Integration (HCI) Describing Eclipse-Based Access Using the Web UI to Access HCI SAP NetWeaver Gateway Explaining the SAP NetWeaver Gateway Scenario Explaining the SAP NetWeaver Gateway Development View Accessing an Open Data (OData) Service Additional course details: Nexus Humans BIT100 SAP NetWeaver Integration Technology Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT100 SAP NetWeaver Integration Technology Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows:Anyone interested in knowing about DNA Center and SD-AccessPersonnel involved in SD-Access Design and ImplementationNetwork Operations team with SD-Access solutionNetwork admin staff that deal with User AccessChannel Partner SEs and other sales supportNetwork Access Control administrationNetwork AdministratorsNetwork ArchitectsNetwork Engineers Overview Upon completing this course, the learner will be able to meet these overall objectives:Know and understand Cisco?s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today?s networks.Differentiate and explain each of the building blocks of SD-Access SolutionExplain the concept of ?Fabric? and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access SolutionUnderstand the role of DNA Center as solution orchestrator and Intelligent GUIBe familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance DNA Center and SD-Access offer Cisco?s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Introduction to Cisco?s Software Defined Access (SD-Access) SD-Access Overview SD-Access Benefits SD-Access Key Concepts SD-Access Main Components SD-Access Campus Fabric The concept of Fabric Node types Fabric Edge Nodes Control Plane Nodes Border Nodes LISP as protocol for Control Plane VXLAN as protocol for Data Plane Concept of Virtual Network Fabric-enabled WLAN DNA Center and Workflow for SD-Access Introduction to DNA Center Workflow for SD-Access in DNA Center Integration with Cisco ISE for Policy Enforcement Integration with Cisco NDP for Analytics and Assurance Relationship with APIC-EM controller DNA Center Workflow First Step - Design Creating Enterprise and Sites Hierarchy Discuss and Demonstrate General Network Settings Loading maps into the GUI IP Address Administration Administering Software Images Network Device Profiles DNA Center Workflow Second Step - Policy 2-level Hierarchy Policy Types ISE Integration with DNA Center Cross Domain Policies DNA Center Workflow Third Step - Provision Devices Onboarding Fabric Domains Adding Nodes DNA Center Workflow Fourth Step ? Assurance Introduction to Analytics NDP Fundamentals Overview of DNA Assurance Components of DNA Assurance DNA Center Assurance Dashboard Implementing WLAN in SD-Access Solution WLAN Integration Strategies in SD-Access Fabric SD-Access Wireless Architecture Sample Design for SD-Access Wireless Campus Fabric External Connectivity for SD-Access Enterprise Sample Topology for SD-Access Role of Border Nodes Types of Border Nodes Single Border vs. Multiple Border Designs Collocated Border and Control Plane Nodes Distributed (separated) Border and Control Plane Nodes
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 1 Days 6 CPD hours This course is intended for This course is intended for customer service professionals with any level of experience who want to expand their knowledge, improve their skill set, and increase the understanding of customer benefits. Overview In this course, you will develop the skills to coach for results. You will: Describe the benefits of customer service, identify internal customers, identify the benefits to you of giving good customer service, and identify how you can help your company to excel. Identify the major trends in customer service today and the combination of criteria required for customer satisfaction. Identify the benefits of bringing respect, emotional support, and a personal touch to customer interactions, and apply the personal touch to customer interactions. Identify the six categories of face-to-face communication, the critical success factors in face-to-face communication, and the benefits of actively listening to your customers. Identify remote customer service communication channels and apply remote customer service best practices. Identify guidelines for handling unreasonable customers, explore ways to handle angry customers, and identify guidelines for handling unhelpful colleagues. Take action to increase the loyalty of the customers you serve. You will also identify guidelines for dealing with moments of truth, identify the benefits of customer complaints, identify the steps in the service recovery process, and analyze the moments of truth in a real-life situation. As a customer service representative, you are expected to handle customer interactions in the best way possible. The expectations of both your company and your customers hinge on your ability to provide the right service in the right way. In this course, you will explore the background and techniques of customer interactions.Providing quality customer care ensures that every single contact with your company is a positive experience. Customers can range from external consumers to internal employees in other departments. Knowing how to provide the same level of service to all customers will enrich your time spent at work by establishing positive business relationships. Recognizing crucial points throughout customer interactions increases your ability to solve problems and offer affirmative solutions. Applying this knowledge to trends in service and consumer desires allows you to contribute to the company?s bottom line and make a customer?s life a little easier. Understanding Customer Service Describe Customer Service Benefits Recognize the Importance of Internal Customer Service Identify How Customer Service Benefits You Excel with Customer Service Identifying How Customers Define the Success of Your Company Recognize Trends in Customer Service Identify Criteria for Customer Satisfaction Increasing Customer Satisfaction Identify Characteristics of the Personal Touch Create Lasting Positive Impressions on Your Customers Providing Face-to-Face Customer Service Identify Categories of Face-to-Face Contact Understand the Critical Success Factors in Face-to-Face Customer Service Identify the Characteristics of Active Listening Providing Remote Customer Service Identify Remote Customer Service Communication Channels Apply Remote Customer Service Best Practices Engaging Difficult Customers Serve Difficult Customers Manage Angry Customers Deal with Difficult or Unhelpful Colleagues Increasing Customer Loyalty Optimize Moments of Truth Recognize the Value of Customer Complaints Identify the Stages of the Service Recovery Process
Duration 5 Days 30 CPD hours This course is intended for This advanced course is appropriate for System Administrators, Technical Support Personnel, and Business Partners responsible for implementing LPARs on IBM Power Systems with AIX servers. Overview Discuss the advantages or value of PowerVM edition's featuresDefine micro-partitioning and shared processor LPARsDiscuss the benefits of simultaneous multithreadingDiscuss and configure the Integrated Virtual Ethernet (IVE)Install and configure the Virtual I/O ServerConfigure virtual network devices, such as virtual Ethernet and shared Ethernet adaptersConfigure virtual SCSI and virtual Fibre Channel storage adaptersConfigure virtual SCSI target devices on a virtual SCSI adapterDefine file-backed storage pools and file-backed virtual optical devicesIdentify single points of failure in virtualized environmentsConfigure multiple VIO servers for high availabilityConfigure advanced virtual networking optionsConfigure the shared Ethernet adapter failover featureConfigure advanced virtual SCSI optionsConfigure MPIO in a VIO server's client partitionManage the service events, configure call home, add, exchange FRUs, and discuss FSP failoverPerform PowerVM (VIOS) Maintenance This course explains the new features and benefits of virtualization including processor virtualization, Virtual I/O Server, and virtual devices, such as virtual Ethernet, virtual SCSI, and virtual Fibre Channel adapters. Course Outline Unit 1: Introduction to partitioning Exercise 1: Power Systems documentation overview Unit 2: HMC V8 enhancements Exercise 2: HMC enhanced interface Unit 3: Processor virtualization Exercise 3: Processor virtualization configuration Unit 4: Virtual Ethernet Exercise 4: Virtual Ethernet adapter configuration Unit 5: Virtual I/O Server and Shared Ethernet Adapter Exercise 5: Virtual I/O Server configuration Unit 6: Virtual SCSI devices Exercise 6: Client partition configuration Unit 7: Virtual network configuration with dual VIOS Exercise 7: SEA failover setup Unit 8: Virtual SCSI configurations with dual VIOS Exercise 8: Dual VIO server configuration with MPIO in the client partition Unit 9: Virtual Fibre Channel devices Exercise 9: Virtual Fibre Channel adapter configuration Unit 10: HMC Service Management Exercise 10: Manage service events Unit 11: PowerVM advanced systems maintenance Exercise 11: PowerVM system maintenance Exercise 12: (Optional) File-backed virtual SCSI devices Additional course details: Nexus Humans AN30 IBM Power Systems for AIX - Virtualization I - Implementing Virtualization training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN30 IBM Power Systems for AIX - Virtualization I - Implementing Virtualization course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Report Authors Overview Create query models Create reports based on query relationships Introduction to dimensional data Introduction to dimensional data in reports Dimensional report context Focus your dimensional data Calculations and dimensional functions Create advanced dynamic reports This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity. Create query models Build a query and connect it to a report Answer a business question by referencing data in a separate query Create reports based on query relationships Create join relationships between queries Combine data containers based on relationships from different queries Create a report comparing the percentage of change Introduction to dimensional reporting concepts Examine data sources and model types Describe the dimensional approach to queries Apply report authoring styles Introduction to dimensional data in reports Use members to create reports Identify sets and tuples in reports Use query calculations and set definitions Dimensional report context Examine dimensional report members Examine dimensional report measures Use the default measure to create a summarized column in a report Focus your dimensional data Focus your report by excluding members of a defined set Compare the use of the filter() function to a detail filter Filter dimensional data using slicers Calculations and dimensional functions Examine dimensional functions Show totals and exclude members Create a percent of base calculation Create advanced dynamic reports Use query macros Control report output using a query macro Create a dynamic growth report Create a report that displays summary data before detailed data and uses singletons to summarize information Design effective prompts Create a prompt that allows users to select conditional formatting values Create a prompt that provides users a choice between different filters Create a prompt to let users choose a column sort order Create a prompt to let users select a display type Examine the report specification Examine report specification flow Identify considerations when modifying report specifications Customize reporting objects Distribute reports Burst a report to email recipients by using a data item Burst a list report to the IBM Cognos Analytics portal by using a burst table Burst a crosstab report to the IBM Cognos Analytics portal by using a burst table and a master detail relationship Enhance user interaction with HTML Create interactive reports using HTML Include additional information with tooltips Send emails using links in a report Introduction to IBM Cognos Active Reports Examine Active Report controls and variables Create a simple Active Report using Static and Data-driven controls Change filtering and selection behavior in a report Create interaction between multiple controls and variables Active Report charts and decks Create an Active Report with a Data deck Use Master detail relationships with Decks Optimize Active Reports Create an Active Report with new visualizations