• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43070 Ski courses delivered Online

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

0G53BG IBM SPSS Statistics Essentials (V26)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for New users of IBM SPSS Statistics Users who want to refresh their knowledge about IBM SPSS Statistics Anyone who is considering purchasing IBM SPSS Statistics Overview Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders Additional course details: Nexus Humans 0G53BG IBM SPSS Statistics Essentials (V26) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G53BG IBM SPSS Statistics Essentials (V26) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

0G53BG IBM SPSS Statistics Essentials (V26)
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle PeopleSoft Time and Labor - North America Rel. 9.2

By Nexus Human

Duration 5 Days 30 CPD hours Overview Ensure a smooth, rapid implementation of PeopleSoft Time and Labor. Better understand how to facilitate the management, planning, reporting and approving of time, and calendar and schedule creation and usage. Set Up System and Time and Labor Tables Learn about and set up the tables that support your Time and Labor system. Identify how to track employee time by period and define workgroups and task groups to group time reporters into useful segments for processing. Manage Time Reporting Enroll time reporters into Time and Labor, and assign them to work schedules. Report time using different tools. Process reported time using the rules you defined to match your business processes. This PeopleSoft Time and Labor - North America Rel. 9.2 training will show you how to implement the PeopleSoft Time and Labor product encompassing features and functionality , and develop a solid foundation of knowledge that allows you to enroll time reporters into Time and Labor, assign them to work schedules, and report and process reported time. Setting Up PeopleSoft Human Resources, Payroll, and Benefits Tables Indentifying Prerequisite Human Resources, Benefits, and Payroll Tables Defining Prerequisite Tables Defining Holiday Schedules Defining Earnings Codes and Programs Defining Pay Groups and Pay Calendars Setting Up Basic PeopleSoft Time and Labor Tables Setting Up Time Zone Offsets Setting Up the Time and Labor Installation Table Setting Up Manager Time Calendar View Options Selecting the Labor Distriution and Labor Dilution Options Establishing Time Reporting Codes Describing Time Reporting Codes (TRC) Defining Time Reporting Code Categories Establishing Time Reporting Codes Defining TRC Programs Defning Compensatory Time Plans Establishing Time Periods Describing Time Periods Establishing Time Periods Establishing Planned Overtime Describing Planned Overtime Features Establishing Planned Overtime Creating Workgroups Describing Key Workgroup Concepts Creating Workgroups Defining Template Built Rules Identifying Online Rule Definition Tools Identifying Steps to Define Rules Defining Template Built Rules Defining Rule Programs Exporting and Importing Rules Describing Rule Template Creation Creating Task Groups Identifying Task Functinlaity Concepts Creating Task Templates Creating Task Profiles Creating Taskgroups Describing Task Profile Reporting Precedence Building Schedules Identifying Scheduling Concepts Describing Scheduling Integrations Identifying the Steps to Create a Schedule Setting Up Schedules Validating Schedules Setting Up Time Reporters Creating Time Reporter Data Maintaining Time Reporter Data Assigning Time Reporters to a Schedule Assigning and Viewing Compensatory Time Off Plans Setting Up Groups and Security Describing PeopleSoft Time and Labor Groups and Security Setting Up Group Creating Security Setting Up Dynamic Groups Setting Up Static Groups Viewing Time Reporters in Groups Setting Up Group Security Reporting Time Using Rapid Entry Describing Time Reporting Establishing Rapid Time Templates Performing Rapid Entry Running the Time Administration Process Describing the Time Administration Process Describing Time Reporter and Payable Time Status Reporting Time Using Self-Service Identifying Time Reporting Defining Time Reoprting Templates Defining User Preferences Reporting Time Using Timesheets Reporting Time Using the Web Clock Identifying Mass Time Reporting Requesting Overtime Requesting Absence Managing Exceptions Defining Exceptions Managing Exceptions Using Fluid and Workforce Availability Setting Up the Time and Labor Mobile Applications Entering Time Reporting as an Employee Managing Time Administration as a Manager Setting Up Workforce Availability Viewing Workforce Availability for Daily and Weekly Time Integrating with PeopleSoft Payroll for North America Integrating with Absence Management Preparing for a Payrun Running the Time and Labor Load Process Setting Up and Using Auto Enrollment Setting Up Auto Enrollment Defining Auto Enrollment Groups Previewing the Enrollment Data Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Additional course details: Nexus Humans Oracle PeopleSoft Time and Labor - North America Rel. 9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle PeopleSoft Time and Labor - North America Rel. 9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle PeopleSoft Time and Labor - North America Rel. 9.2
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting on AWS - Accelerator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS - Accelerator
Delivered OnlineFlexible Dates
Price on Enquiry

Administering Cisco UCS X-Series Solutions with Intersight (INTUCSX)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Server Administrators Systems Engineers Storage Administrators Technical Solutions Architects Integrators and Partners Consulting Systems Engineers Network Administrators Network Engineers Network Managers Architects Overview Upon completion of this course, the student will be able to meet these overall objectives: Understand, describe, and configure Cisco Intersight (on prem and SaaS models) Understand, describe, and configure Intersight Advanced features (IST, ICO, IWOM) Understand, describe, and configure IMM and UMM mode for UCS Understand, describe, and configure Cisco X-Series (FI, IFM, X210c Server, Adv Fabric Module) Create Intersight Pools, Policies, and Management for X-Series Design and operate Cisco UCS with Intersight Managed Mode Solutions This deep-dive training covers Cisco UCS X-Series server family and how Intersight can be the enablement platform for all UCS servers. We will cover Intersight features such as IWOM, IST, ICO, and programmability either On-Prem or in the Cloud. Attendees will learn the breadth of the physical X-Series (pools, policies, firmware, so much more) platform as well as maintaining existing infrastructure with Intersight Infrastructures Services. Also covered is how to manage physical, virtual, cloud platforms and deploy to any or all. Section 1: Intersight Foundations Intersight Architecture Flexible Deployment Models Cisco Intersight Infrastructure Service Licensing Intersight Essentials License Tier Intersight Advantage License Tier Intersight Premier License Tier Section 2: Monitoring and Maintaining UCS Infrastructure with Intersight Device Health and Monitoring Standalone Management for UCS C-Series Servers Server Compatibility (HCL), Advisories (CVEs), and Contract Status Firmware Upgrades Section 3: Designing & Operationalizing Cisco UCS Solutions with Intersight Implementing Cisco Hyperflex with Intersight Managing Cisco HyperFlex in vSphere Environment Section 4: Cisco UCS M5, M6, X Overview and Configuration Cisco UCS X-Series with Intersight Deployment Architecture X-Series Fabric Interconnects Compute X-Series Power/Cooling Efficiency Cooling Capacity Airflow Thermal Policies Future-Proof Cooling Power Policies Compute Series Architecture ? C220 M6 Architecture ? C240 M6 Cisco VIC Offerings for M6 GPU Offerings for X-Series Management Options for C220 / C240 M6 Rack Servers UCS 7th Generation Intel Rack Servers Architecture ? C220 M7 Architecture ? C240 M7 Intel 4th Gen Intel© Xeon© SP Sapphire Rapids High Level Features M7 Memory DIMMs Architecture ? C225 M6 Architecture ? C245 M6 Section 5: Designing Cisco UCS LAN and SAN Connectivity LAN Connectivity Overview Gen 4 End Host Mode Requirements for Configuring VLANs in Cisco UCS Manager Role of the vNIC in Abstracting MAC Addresses Configuring Compute Node SAN Connectivity Fibre Channel Switching Fibre Channel Operating Modes EHM and N-Port Virtualization Configuring VSANs in Cisco UCS Manager Creating VSANs and FCoE VLANs in Cisco UCS Role of vHBAs when Abstracting WWNNs and WWPNs into a Service Profile Configuring Manual Uplink Pinning and Recovery from Failure Section 6: Configuring Cisco UCS-X in IMM Mode IMM and Domain Profiles Domain Policy Concepts and Usage Cisco Intersight Server Profiles Creating and Deploying a UCS C-Series Server Profile ? Process Overview Importing a Server Profile ? Process Overview Upgrading Firmware Cisco IMM Transition Tool Thermal Policies Power Policies Section 7: Implementing Cisco UCS-X Firmware Updates Intersight Platform Firmware Operations Overview Intersight Firmware Bundles Cisco Stand-Alone Firmware Management Cisco HX Firmware Management UCS Managed Infrastructure Firmware Management UCS Intersight Managed Mode Firmware Management Hardware Compatibility List Section 8: Intersight Workload Optimizer (IWO) Intersight Workload Optimizer Overview IWO Delivery and Tiers Workload Optimizer ? What?s New? IWO Value Proposition Application Resource Management IWO Market Section 9: Intersight Cloud Orchestrator (ICO) Sample Scenario Workflow Designer Validate and Execute a Workflow ICO ? Intersight Cloud Orchestrator Infrastructure Orchestration Infrastructure as Code with ICO Immutability with Intersight Cloud Orchestrator Workflow Versions Rollback Tasks (Task Designer) Section 10: Intersight API Overview Intersight API Resources SDKs / Ansible Modules Use Case Additional course details: Nexus Humans Administering Cisco UCS X-Series Solutions with Intersight (INTUCSX) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Cisco UCS X-Series Solutions with Intersight (INTUCSX) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Administering Cisco UCS X-Series Solutions with Intersight (INTUCSX)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Cassandra (TTDS6776)

By Nexus Human

Duration 3 Days 18 CPD hours Overview The goal of this course is to enable technical students new to Cassandra to begin working with Cassandra in an optimal manner. Throughout the course students will learn to: Understand the Big Data needs that C* addresses Be familiar with the operation and structure of C* Be able to install and set up a C* database Use the C* tools, including cqlsh, nodetool, and ccm (Cassandra Cluster Manager) Be familiar with the C* architecture, and how a C* cluster is structured Understand how data is distributed and replicated in a C* cluster Understand core C* data modeling concepts, and use them to create well-structured data models Be familiar with the C* eventual consistency model and use it intelligently Be familiar with consistency mechanisms such as read repair and hinted handoff Understand and use CQL to create tables and query for data Know and use the CQL data types (numerical, textual, uuid, etc.) Be familiar with the various kinds of primary keys available (simple, compound, and composite primary keys) Be familiar with the C* write and read paths Understand C* deletion and compaction The Cassandra (C*) database is a massively scalable NoSQL database that provides high availability and fault tolerance, as well as linear scalability when adding new nodes to a cluster. It has many powerful capabilities, such as tunable and eventual consistency, that allow it to meet the needs of modern applications, but also introduce a new paradigm for data modeling that many organizations do not have the expertise to use in the best way.Introduction to Cassandra is a hands-on course designed to teach attendees the basics of how to create good data models with Cassandra. This technical course has a focus on the practical aspects of working with C*, and introduces essential concepts needed to understand Cassandra, including enough coverage of internal architecture to make good decisions. It is hands-on, with labs that provide experience in core functionality. Students will also explore CQL (Cassandra Query Language), as well as some of the ?anti-patterns? that lead to non-optimal C* data models and be ready to work on production systems involving Cassandra. Session 1: Cassandra Overview Why We Need Cassandra - Big Data Challenges vs RDBMS High level Cassandra Overview Cassandra Features Optional: Basic Cassandra Installation and Configuration Session 2: Cassandra Architecture and CQL Overview Cassandra Architecture Overview Cassandra Clusters and Rings Nodes and Virtual Nodes Data Replication in Cassandra Introduction to CQL Defining Tables with a Single Primary Key Using cqlsh for Interactive Querying Selecting and Inserting/Upserting Data with CQL Data Replication and Distribution Basic Data Types (including uuid, timeuuid) Session 3: Data Modeling and CQL Core Concepts Defining a Compound Primary Key CQL for Compound Primary Keys Partition Keys and Data Distribution Clustering Columns Overview of Internal Data Organization Overview of Other Querying Capabilities ORDER BY, CLUSTERING ORDER BY, UPDATE , DELETE, ALLOW FILTERING Batch Queries Data Modeling Guidelines Denormalization Data Modeling Workflow Data Modeling Principles Primary Key Considerations Composite Partition Keys Defining with CQL Data Distribution with Composite Partition Key Overview of Internal Data Organization Session 4: Additional CQL Capabilities Indexing Primary/Partition Keys and Pagination with token() Secondary Indexes and Usage Guidelines Cassandra collections Collection Structure and Uses Defining and Querying Collections (set, list, and map) Materialized View Overview Usage Guidelines Session 5: Data Consistency In Cassandra Overview of Consistency in Cassandra CAP Theorem Eventual (Tunable) Consistency in C* - ONE, QUORUM, ALL Choosing CL ONE Choosing CL QUORUM Achieving Immediate Consistency Overview of Other Consistency Levels Supportive Consistency Mechanisms Writing / Hinted Handoff Read Repair Nodetool repair Session 6: Internal Mechanisms Ring Details Partitioners Gossip Protocol Snitches Write Path Overview / Commit Log Memtables and SSTables Write Failure Unavailable Nodes and Node Failure Requirements for Write Operations Read Path Overview Read Mechanism Replication and Caching Deletion/Compaction Overview Delete Mechanism Tombstones and Compaction Session 7: Working with IntelliJ Configuring JDBC Data Source for Cassandra Reading Schema Information Querying and Editing Tables. Additional course details: Nexus Humans Introduction to Cassandra (TTDS6776) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cassandra (TTDS6776) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Cassandra  (TTDS6776)
Delivered OnlineFlexible Dates
Price on Enquiry

Implementing Aruba OS-CX Switching, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. Introduction to Aruba Switching Switches overview Architectures NetEdit Overview Centralized configuration Switch groups/templates AOS-CX mobile App Network Analytics Engine (NAE) Overview Configuration Core NAE feature lab sflow, local mirror, remote mirror VSX VSF vs. VSX: access and Agg/core design Stacking review VSF and uni/multi packet forwarding Stack fragments / split brain VSX Overview: roles, control, data, management planes VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) Split Brain scenario Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) Upstream/Downstream unicast traffic flow (South-North and North-South) VSX Configuration: VSX and Active Gateway VSX firmware updates ACLs Overview: types, components MAC ACL, Standard ACL, Extended ACL, Classifier-based Policies Configuration: wildcard bits, logging, pacl, vacl, racl Advanced OSPF Review basic OSPF Multi area: setup and aggregation Area-Types Stub, Totally Stub, NSSA, Totally NSSA External routes OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP Overview: i/e bgp, as numbers Best path selection Configuration: route announcement Route filtering to prevent transit as IGMP Overview Querier Snooping Unknown multicasts Multicast Routing: PIM Overview PIM DM 802.1X Authentication Overview: roles, requirements, coa, accounting Dynamic port configuration: avp, acl, qos, VLAN Port-based vs. user-based: examples Radius service tracking, critical VLAN MAC Authentication Overview: Use cases Radius-based MAC Auth Dynamic Segmentation Leverage dynamic segmentation features Configure tunneled-node on AOS-CX switches Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node Quality of Service Overview VoQ (Virtual Output Queue) QOS: queueing, QOS marks, dot1p, dscp Trust levels QOS configuration: port, VLAN, policies Interaction with user roles Queue configuration Rate limiters LLDP-MED Additional Routing Technologies VRF - Management VRF PBR MDNS PIM SM Capitve Portal Authentication Overview of guest solutions Built-in web auth ClearPass redirect with CPPM

Implementing Aruba OS-CX Switching, Rev. 20.21
Delivered OnlineFlexible Dates
Price on Enquiry

20345-1 Administering Microsoft Exchange Server 2016/2019

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20345-1 Administering Microsoft Exchange Server 2016/2019
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Spring: Core Training

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot with hands-on experience and a focus on fundamentals Overview By the end of the course, you should be able to meet the following objectives: Spring configuration using Java Configuration and Annotations Aspect oriented programming with Spring Testing Spring applications using JUnit 5 Spring Data Access - JDBC, JPA and Spring Data Spring Transaction Management Simplifying application development with Spring Boot Spring Boot auto-configuration, starters and properties Build a simple REST application using Spring Boot, embedded Web Server and fat JARs or classic WARs Implementing REST client applications using RestTemplate and WebClient Spring Security Enable and extend metrics and monitoring capabilities using Spring Boot actuator Utilize Spring Boot enhancements to testing This course offers hands-on experience with the major features of Spring and Spring Boot, which includes configuration, data access, REST, AOP, auto-configuration, actuator, security, and Spring testing framework to build enterprise and microservices applications. On completion, participants will have a foundation for creating enterprise and cloud-ready applications. Introduction to Spring Java configuration and the Spring application context @Configuration and @Bean annotations @Import: working with multiple configuration files Defining bean scopes Launching a Spring Application and obtaining Beans Spring JAVA Configuration: A Deeper Look External properties & Property sources Environment abstraction Using bean profiles Spring Expression Language (SpEL) Annotation-based Dependency Injection Component scanning Autowiring using @Autowired Java configuration versus annotations, mixing. Lifecycle annotations: @PostConstruct and @PreDestroy Stereotypes and meta-annotations Factory Pattern in Spring Using Spring FactoryBeans Advanced Spring: How Does Spring Work Internally? The Spring Bean Lifecycle The BeanFactoryPostProcessor interception point The BeanPostProcessor interception point Spring Bean Proxies @Bean method return types Aspect-oriented programming What problems does AOP solve? Defining pointcut expressions Implementing various types of advice Testing a Spring-based Application Spring and Test-Driven Development Spring 5 integration testing with JUnit 5 Application context caching and the @Dirties Context annotation Profile selection with @Active Profiles Easy test data setup with @Sql Data Accss and JDBC with Spring How Spring integrates with existing data access technologies Data Access Exception hierarchy Spring?s Jdbc Template Database Transactions with Spring Transactions overview Transaction management with Spring Transaction propagation and rollback rules Transactions and integration testing Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using Command Line Runner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application Spring Security Oauth (Optional Topic) OAuth 2 Overview Implementing OAuth 2 using Spring Security OAuth Reactive Applications with Spring (Optional Topic) Overview of Reactive Programming concepts Reactive Programming support in Spring Using Spring?s reactive WebClient Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring: Core Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring: Core Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring: Core Training
Delivered OnlineFlexible Dates
Price on Enquiry