Duration 4 Days 24 CPD hours This course is intended for If you want to advance from being a front-end developer to a full-stack developer and learn how Node.js can be used for hosting full-stack applications, this course is for you. Knowledge of JavaScript's basic syntax and experience with popular front-end libraries such as jQuery is required. You should also have used JavaScript with HTML and CSS, but not necessarily Node.js. Overview By the end of this course, you'll have the skills you need to tackle any real-world JavaScript development problem using a modern JavaScript approach, both for client and server sides.After completing this course, you will be able to: Apply the core concepts of functional programming Build a Node.js project that uses the Express.js library to host an API Create unit tests for a Node.js project to validate it Use the Cheerio library with Node.js to create a basic web scraper Develop a React interface to build processing flows Use callbacks as a basic way to bring control back This is your one-stop solution to mastering modern JavaScript. This course covers the latest features of JavaScript and advanced concepts, such as modularity, testing, and asynchronous programming. By the end of the course, you?ll know how to create a full-stack JavaScript application using NodeJS and how to use JavaScript in functional programming. JavaScript, HTML, and the DOM HTML and the DOM Developer Tools Node.js and npm What is Node.js? Node Version Manager (nvm) Node Package Manager (npm) Node.js APIs and Web Scraping Globals FileSystem APIs HTTP APIs What is Scraping? RESTful APIs with Node.js What is an API? What is REST? Useful Defaults and Easy Inputs Middleware The Contents of a JWT MongoDB Modular JavaScript ES6 Modules Object-Oriented Programming (OOP) npm Package? Code Quality Clear Naming Unit Tests Integration Tests End-to-End Testing Puppeteer Advanced JavaScript Language Features Supported in ES5, ES6, ES7, ES8, and ES9 OOP in JavaScript Sorting Maps and Sets Math, Date, and String Symbols, Iterators, Generators, and Proxies Asynchronous Programming Callback Hell Async and Await Event-Driven Programming and Built-In Modules Eventing Node.js Built-In Modules Handling Large Files in Node.js Functional Programming with JavaScript Functions ? First-Class Citizens Pure Functions Higher-Order Functions Function Composition Immutability and Side Effects Introduction to GraphQL Language Schemas and Queries
Duration 2 Days 12 CPD hours This course is intended for Attending students should be new to Jira (this is NOT for experienced users), and are required to have a background in basic Enterprise application development Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment guided by our expert Jira practitioner, students will explore: Getting started with JIRA Using JIRA for Business Projects Using JIRA for Agile Projects Issue Management Field Management Screen Management Workflows and Business Process Searching and Filtering Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. JumpStart to Jira for End Users is a two-day, lab-intensive course for participants new to Jira, that provides them with a hands-on Jira instance to ?learn by doing?. This course provides essential understanding in the practical use of the Jira in an Agile context, with an emphasis on Best Practices and practical job-ready skills. Getting started with JIRA JIRA Overview Core concepts Terminology Infrastructure Users and Groups JIRA roles Using JIRA for Business Projects Overview of Projects Project types Project screens Tasks and task management Project Management Process Management Using JIRA for Agile Projects Overview of Agile with JIRA (very brief) Kanban overview Running a project with Kanban Configuring agile screen resolving an issue Issue Management Overview of Issues Working with issues Issue cloning Time tracking Issues and comments Tasks and subtasks Field Management Overview of Fields Built-in fields Custom fields Searching Configuring JIRA for fields Screen Management Overview of JIRA screens Working with screens Using screen tabs Issue type screens associating an issue type screen a with a project Customizing JIRA screens Workflow and Business Process Overview of Workflow Mapping business processes Managing workflows Authoring a workflow Updating an existing workflow Workflow schemes Applying a workflow to a project Searching and Reporting Overview of Searching Search screens Basic search Advanced search with JQL Working with search results Reports Dashboards Filters Gadgets Charts Summary and Best Practices Looking back at the ?Big Picture? JIRA Administration Overview Where JIRA fits into the Agile perspective JIRA End-User best practices
Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft Office and want to incorporate digital note-taking and note collaboration by using Microsoft OneNote. In addition to creating and modifying OneNote notebooks, this course will introduce you to inserting images and embedding files into notebooks, categorizing content, sharing content with OneDrive, and exporting content to other file formats. Overview In this course, you will develop digital note-taking skills by creating, modifying, and managing OneNote notebooks that work with other Microsoft Office programs. You will: Navigate and customize the OneNote interface and environment. Add and format text, images, audio, links, and drawing objects to a notebook. Embed Excel spreadsheets and attach other files to a notebook. Categorize, organize, and search notebook content. Check spelling in, print, and password-protect notebooks. Use Outlook and OneDrive to send and share notebook content. Export notebook content and manage notebook history and backups. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft© Office OneNote© for the Desktop provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will introduce you to using OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Additionally, learning how OneNote and the other applications in the suite are integrated increases your productivity with Microsoft Office. This courseware is applicable to all users of the current OneNote desktop software. The classroom environment setup is based on the Office 2016 desktop application. Getting Started with OneNote Topic A: Navigate the OneNote 2016 Environment Topic B: Use Templates Topic C: Customize the OneNote User Interface Adding and Formatting Notebook Content Topic A: Apply Formatting to Notebook Content Topic B: Insert Images and Audio into a Notebook Topic C: Add Quick Notes and Links Topic D: Use Drawing Tools Embedding and Attaching Files Topic A: Embed Excel Spreadsheets Topic B: Attach Other File Types Organizing and Searching Notebooks Topic A: Use Tags Topic B: Organize and Search Notebooks Finalizing a Notebook Topic A: Proof and Print a Notebook Topic B: Configure Password Protection and Notebook Properties Managing Notebook Files Topic A: Export Content from OneNote Notebooks Topic B: Back Up and Restore Notebook Content Sending and Sharing OneNote Content Topic A: Send OneNote Content in Other Formats Topic B: Share OneNote Content by Using OneDrive
Duration 2 Days 12 CPD hours This course is intended for This basic course is for persons needing an introductory knowledge of DB2, and persons preparing for advanced and specialized DB2 education. Overview List and describe the major components of IBM's relational database, DB2 Explain the characteristics of a DB2 table Relate the basic concepts of data modeling Comprehend the processing instructions given to DB2 via simple SQL statements List and describe several ways to build (write) and execute SQL statements List and describe steps needed to imbed SQL statements in an application program Explain some of the functions performed by, and the responsibilities of, database and system administrators Establish a base for more specialized DB2 education This course provides information about the functions of IBM's DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms (e.g., z/OS, VM, Linux, UNIX, Windows, etc.) Understanding a Table Identify the advantages of a relational database Define a relation Name the language used to talk to a relational database manager (RDBM) List three characteristics assigned to each column Define the tasks performed by DB2 when running an application Defi Data Modeling and Database Design State the purpose of a business model Identify an Entity-Relational Diagram (ERD) model List several DB2 column data types Identify non-standard column and table names Identify the characteristics of a primary key and a foreign key State the purpose of re How does a User use DB2? List several ways to talk to DB2 List multiple ways to generate an SQL statement List several ways to ADD, REMOVE, or CHANGE table rows List several ways to READ data and produce reports How does a Programmer use DB2? List the steps needed to create a test environment List the necessary steps to coding SQL in a program Describe the purpose of SQL delimiters Describe the purpose of an SQLCA List the steps involved in preparing a program for execution State the differenc What does an Administrator do in DB2? List some of the tasks performed by a DB2 System Administrator: Identifying the DB2 product, Installing DB2, Creating subsystems/instances, databases and table spaces, Authorizing, and Monitoring List some of the tasks performed by a DB2 Database Administ Information Management with DB2 List several planning considerations for distributing data List some of the skills required to successfully distribute data Differentiate between remote unit of work, distributed unit of work, and distributed request List some of the security concerns whe
Duration 1 Days 6 CPD hours Overview In writing, it is important to make sure your message is easy to understand, that you have included all the necessary information, and that the points are expressed clearly. In business writing, it is also essential to convey information in a professional and courteous manner using proper formatting. Learn how to perfect your business writing in this one-day workshop. This one-day workshop will help you teach participants how to: Write and proofread your work so it is clear, concise, complete, and correct. Apply these skills in real world situations. Use language that is courteous. Understand the proper format for memos, letters, and emails. Determine whether your writing can be easily understood by your intended audience. Learn how to perfect your business writing in this one-day workshop.While there are many types of business writing, this workshop will provide tools to write effective memos, emails, and letters, as well as briefly touch on reports and proposals. The 4 C?s: Clear, Concise, Complete, and Correct Good writing must be clear, concise, complete, and correct. In this session, learn how to write with these principles in mind. Manners and Courtesy Courtesy is an important part of good business writing. During this session, participants will learn ways to make their writing respectful and polite. Writing Memos Memos are another challenge that many writers face. Participants will look at parts of a memo and complete a fun exercise. Writing Effective E-mails Mostly everyone today uses email to communicate at work and at home. This session will give participants some tips on writing effective emails and managing email. Reports and Proposals Reports and proposals are two important types of business writing. In this session, an overview of the steps involved with writing these pieces is presented. Writing Business Letters This session reviews the steps for writing a business letter, types of letters, and the parts of a business letter. Participants then examine samples of business letters to determine the type and the parts of each letter. Readability Index The readability index determines the difficulty level of a written piece. Participants will apply the index to a sample and to their own work. Proofreading Participants learn about checking the grammar, spelling and punctuation in their written pieces, and then review their pre-assignment. Reviewing Your Writing In this session, participants complete a final review of their piece of writing. Workshop Wrap-Up At the end of the workshop, students will have an opportunity to ask questions and fill out an action plan.
Duration 3 Days 18 CPD hours This course is intended for Data Wrangling with Python takes a practical approach to equip beginners with the most essential data analysis tools in the shortest possible time. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context. Overview By the end of this course, you will be confident in using a diverse array of sources to extract, clean, transform, and format your data efficiently. In this course you will start with the absolute basics of Python, focusing mainly on data structures. Then you will delve into the fundamental tools of data wrangling like NumPy and Pandas libraries. You'll explore useful insights into why you should stay away from traditional ways of data cleaning, as done in other languages, and take advantage of the specialized pre-built routines in Python.This combination of Python tips and tricks will also demonstrate how to use the same Python backend and extract/transform data from an array of sources including the Internet, large database vaults, and Excel financial tables. To help you prepare for more challenging scenarios, you'll cover how to handle missing or wrong data, and reformat it based on the requirements from the downstream analytics tool. The course will further help you grasp concepts through real-world examples and datasets. Introduction to Data Structure using Python Python for Data Wrangling Lists, Sets, Strings, Tuples, and Dictionaries Advanced Operations on Built-In Data Structure Advanced Data Structures Basic File Operations in Python Introduction to NumPy, Pandas, and Matplotlib NumPy Arrays Pandas DataFrames Statistics and Visualization with NumPy and Pandas Using NumPy and Pandas to Calculate Basic Descriptive Statistics on the DataFrame Deep Dive into Data Wrangling with Python Subsetting, Filtering, and Grouping Detecting Outliers and Handling Missing Values Concatenating, Merging, and Joining Useful Methods of Pandas Get Comfortable with a Different Kind of Data Sources Reading Data from Different Text-Based (and Non-Text-Based) Sources Introduction to BeautifulSoup4 and Web Page Parsing Learning the Hidden Secrets of Data Wrangling Advanced List Comprehension and the zip Function Data Formatting Advanced Web Scraping and Data Gathering Basics of Web Scraping and BeautifulSoup libraries Reading Data from XML RDBMS and SQL Refresher of RDBMS and SQL Using an RDBMS (MySQL/PostgreSQL/SQLite) Application in real life and Conclusion of course Applying Your Knowledge to a Real-life Data Wrangling Task An Extension to Data Wrangling
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting
Duration 3 Days 18 CPD hours This course is intended for Cluster administrators (Junior systems administrators, junior cloud administrators) interested in deploying additional clusters to meet increasing demands from their organizations. Cluster engineers (Senior systems administrators, senior cloud administrators, cloud engineers) interested in the planning and design of OpenShift clusters to meet performance and reliability of different workloads and in creating work books for these installations. Site reliability engineers (SREs) interested in deploying test bed clusters to validate new settings, updates, customizations, operational procedures, and responses to incidents. Overview Validate infrastructure prerequisites for an OpenShift cluster. Run the OpenShift installer with custom settings. Describe and monitor each stage of the OpenShift installation process. Collect troubleshooting information during an ongoing installation, or after a failed installation. Complete the configuration of cluster services in a newly installed cluster. Installing OpenShift on a cloud, virtual, or physical infrastructure. Red Hat OpenShift Installation Lab (DO322) teaches essential skills for installing an OpenShift cluster in a range of environments, from proof of concept to production, and how to identify customizations that may be required because of the underlying cloud, virtual, or physical infrastructure. This course is based on Red Hat OpenShift Container Platform 4.6. 1 - Introduction to container technology Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform. 2 - Create containerized services Provision a server using container technology. 3 - Manage containers Manipulate prebuilt container images to create and manage containerized services. 4 - Manage container images Manage the life cycle of a container image from creation to deletion. 5 - Create custom container images Design and code a Dockerfile to build a custom container image. 6 - Deploy containerized applications on OpenShift Deploy single container applications on OpenShift Container Platform. 7 - Troubleshoot containerized applications Troubleshoot a containerized application deployed on OpenShift. 8 - Deploy and manage applications on an OpenShift cluster Use various application packaging methods to deploy applications to an OpenShift cluster, then manage their resources. 9 - Design containerized applications for OpenShift Select a containerization method for an application and create a container to run on an OpenShift cluster. 10 - Publish enterprise container images Create an enterprise registry and publish container images to it. 11 - Build applications Describe the OpenShift build process, then trigger and manage builds. 12 - Customize source-to-image (S2I) builds Customize an existing S2I base image and create a new one. 13 - Create applications from OpenShift templates Describe the elements of a template and create a multicontainer application template. 14 - Manage application deployments Monitor application health and implement various deployment methods for cloud-native applications. 15 - Perform comprehensive review Create and deploy cloudinative applications on OpenShift.