Duration 5 Days 30 CPD hours The iPhone combines technologies of smartphones and personal computing. With a multitouch screen, built-in accelerometer and virtual keyboard, the iPhone also requires the mobile application developer to adopt a vastly different software design philosophy. With over a billion mobile apps sold, iPhone Programming is a critical part of the future of mobile technology. This five day course teaches the attendee all aspects of iOS mobile app development Introduction and Setup Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement Overview of Swift Functions The Basics of Object Oriented Programming in Swift Swift Subclassing and Extensions Arrays and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, and Storyboards Creating an Interactive iOS App Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Size Classes to Design Adaptable Universal iOS User Interfaces Using Storyboards in Xcode Organizing Scenes over Multiple Xcode Storyboard Files Using Xcode Storyboards to Create an iOS Tab Bar Application Working with the iOS Stack View Class iOS Stack View Tutorial iOS Split View Master-Detail Example Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController iOS UIPageViewController Application Data Storage with Files, iCloud, and Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS iOS Directory Handling and File I/O in Swift Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite SQLite based iOS Application using Swift and FMDB Working with iOS Databases using Core Data iOS Core Data Introduction to CloudKit Data Storage on iOS iOS CloudKit Example iOS CloudKit Subscription Example Touch, Taps, and Gestures An Overview of iOS Multitouch, Taps and Gestures iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS Gesture Recognition iOS 3D Touch Force Handling iOS 3D Touch Quick Actions iOS 3D Touch Peek and Pop Advanced View Options Basic iOS Animation using Core Animation iOS UIKit Dynamics ? An Overview Introduction to iOS Sprite Kit Programming iOS Sprite Kit Level Editor Game iOS Sprite Kit Collision Handling Extensions Introduction to Extensions in iOS iOS Today Extension Widget Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Multimedia, Facebook, and Twitter Accessing the iOS Camera and Photo Library iOS Camera Application iOS Video Playback using AVPlayer and AVPlayerViewController iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder The App Store Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iPhone Mobile App Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPhone Mobile App Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Navigate the AutoCAD user interfacesUse the fundamental features of AutoCADUse the precision drafting tools in AutoCAD to develop accurate technical drawingsPresent drawings in a detailed and visually impressive way In this course, you will learn to navigate the AutoCAD user interfaces and use the fundamental features of AutoCAD. You will learn to use the precision drafting tools in AutoCAD to develop accurate technical drawings. Getting Started with AutoCAD Starting the Software User Interface Working with Commands Cartesian Workspace Opening an Existing Drawing File Viewing Your Drawing Saving Your Work Basic Drawing & Editing Commands Drawing Lines Erasing Objects Drawing Lines with Polar Tracking Drawing Rectangles Drawing Circles Undo and Redo Actions Projects - Creating a Simple Drawing Create a Simple Drawing Create Simple Shapes Drawing Precision in AutoCAD Using Running Object Snaps Using Object Snap Overrides Polar Tracking at Angles Object Snap Tracking Drawing with Snap and Grid (Optional) Making Changes in Your Drawing Selecting Objects for Editing Moving Objects Copying Objects Rotating Objects Scaling Objects Mirroring Objects Editing with Grips Projects - Making Your Drawing More Precise Schematic Project: Electronics Diagram Architectural Project: Landscape Mechanical Project (with Polar & Tracking) Mechanical Project: Surge Protector Mechanical Project: Satellite Organizing Your Drawing with Layers Creating New Drawings With Templates What are Layers? Layer States Changing an Object's Layer Advanced Object Types Drawing Arcs Drawing Polylines Editing Polylines Drawing Polygons Drawing Ellipses Analzying Model and Object Properties Working with Object Properties Measuring Objects Projects - Drawing Organization & Information Architectural Project Mechanical Project Civil Project Advanced Editing Commands Trimming and Extending Objects Stretching Objects Creating Fillets and Chamfers Creating Arrays of Objects Inserting Blocks What are Blocks? Working with Dynamic Blocks Inserting Blocks Inserting Blocks using the Tool Palettes Inserting Blocks using the DesignCenter Inserting Blocks using the Content Explorer Projects - Creating More Complex Objects Mechanical Project 1 - Plate Mechanical Project 2 - Gasket Mechanical Project 3 - Plate Mechanical Project 4 - Rocker Arm Architectural Project 1 - Floor Plan Architectural Project 2 - Floor Plan Civil Project - Parking Lot Setting Up a Layout Printing Concepts Working in Layouts Creating Layouts Creating Layout Viewports Guidelines for Layouts Printing Your Drawing Printing Layouts Print and Plot Settings Projects - Preparing to Print Mechanical Project Architectural Project Text Working with Annotations Adding Text in a Drawing Modifying Multiline Text Formatting Multiline Text Adding Notes with Leaders to Your Drawing Creating Tables Modifying Tables Hatching Hatching Editing Hatches Adding Dimensions Dimensioning Concepts Adding Linear Dimensions Adding Radial and Angular Dimensions Editing Dimensions Projects - Annotating Your Drawing Mechanical Project Architectural Project 1 Architectural Project 2 Civil Project Additional course details: Nexus Humans AutoCAD Level 1 - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AutoCAD Level 1 - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Report Authors Overview What is IBM Cognos Analytics ? Reporting Examine dimensionally modelled and dimensional data sources Examine personal data sources and data modules Examine List reports Aggregate measure/fact data Use shared dimensions to create multi-fact queries Add repeated information to reports Create crosstab reports Create complex crosstab reports Format, sort, and aggregate data in a crosstab report Create discontinuous crosstab reports Create Visualization reports Add business logic to reports using IBM Cognos Analytics ? Reporting Focus reports using filters Focus reports using prompts Augment reports using calculations Extend report functionality in IBM Cognos Analytics - Reporting Customize reports with conditional formatting Conditionally format one crosstab measure based on another Drill-through definitions Enhance the report layout Use additional report building techniques This offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting? Create a simple list report Create a report from a dimensionally modeled relational data source Examine personal data sources and data modules Upload personal data Upload custom images Use navigation paths Create a report from a personal data source Examine list reports Group data in a list Format columns in a list Include headers and footers in a list Enhance a list report Aggregate measure/fact data Identify differences in aggregation Explore data aggregation Use shared dimensions to create multi-fact queries Create a multi-fact query in a list report Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create a simple crosstab report Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Create a complex crosstab report Format, sort, and aggregate data in a crosstab Sort, format, and aggregate a crosstab report Create discontinuous crosstab reports Present unrelated items using a discontinuous crosstab Create a visualization report Create and format a visualization report Create a report that uses a Map visualization Show the same data graphically and numerically Focus reports using filters Apply filters to a report Apply a detail filter on fact data in a report Apply a summary filter to a report Focus reports using prompts Create a prompt by adding a parameter Add a value prompt to a report Add a Select & search prompt to a report Create a cascading prompt Augment reports using calculations Add calculations to a report Display prompt selections in the report title Customize reports with conditional formatting Create a multilingual report Highlight exceptional data and conditionally render a column Drill-through definitions Let users navigate to related data in IBM Cognos Analytics Enhance report layout Create a report structured on data items Create a condensed list report Use additional report building techniques Section a report and reuse objects within the same report Reuse layout components in a different report Explore options for reports that contain no data Additional course details: Nexus Humans B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. Module 1: Introduction to TSQL for Business Intelligence Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Module 2: Turning Table Columns into Variables for Analysis: SELECT List Expressions, WHERE, and ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Module 3: Combining Columns from Multiple Tables into a Single Dataset: The JOIN Operators Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNERJOIN Understanding Joins, Part 3: The OUTERJOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTERJOINs Combining JOIN Operations with WHERE and ORDER BY Module 4: Creating an Appropriate Aggregation Level Using GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Module 5: Subqueries, Derived Tables and Common Table Expressions Non-correlated and correlated subqueries Derived tables Common table expressions Module 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Module 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Additional course details: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware TanzuTM portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this three-day course, you focus on installing VMware Tanzu© Kubernetes Grid? on a VMware vSphere© environment and then provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multi-pod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management and workload clusters, and the role of Cluster API List the components of a Tanzu Kubernetes Grid instance Illustrate how to use the Tanzu CLI Identify the requirements for a bootstrap machine Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API Custom Resource Definitions Management Clusters List the requirements for deploying a management cluster Differentiate between deploying on vSphere 6.7 Update 3 and vSphere 7 Describe the components of NSX Advanced Load Balancer Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer Explain how Kubernetes manages authentication Define Pinniped Define Dex Describe the Pinniped authentication workflow List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters Tanzu Kubernetes Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs make up a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Configuring and Managing Tanzu Kubernetes Grid Instances Define the Tanzu Kubernetes Grid packages Describe the Harbor Image Registry Define Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Demonstrate how to install Service Discovery with ExternalDNS. Define Multus CNI Define Prometheus Define Grafana Troubleshooting Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to use SSH to connect to a Tanzu Kubernetes Grid VM Describe the steps for troubleshooting a failed cluster deployment Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.