Unity 3d face to face training customised and bespoke.
Duration 1 Days 6 CPD hours This course is intended for Students should have basic computer skills, SQL skills, and be familiar with concepts related to database structure and terminology. Overview Upon successful completion of this course, students will be able to: - Use subqueries to generate query output. - Manipulate table data by inserting, updating, and deleting records in a table. - Manipulate the table structure. - Create views, manipulate data through views, modify the view structure, and drop views. - Create indices on table columns and drop inefficient indices. - Mark the beginning of a transaction, create a savepoint within a transaction, rollback a transaction, and commit a transaction. In this course, students will work with advanced queries to manipulate and index tables. Students will also create transactions so that you can choose to save or cancel data entry process. Prerequisites SQL Querying Fundamentals - Part 1 1 - Using Subqueries to Perform Advanced Querying Search Based on Unknown Values Compare a Value with Unknown Values Search Based on the Existence of Records Generate Output Using Correlated Subqueries Filter Grouped Data Within Subqueries Perform Multiple-Level Subqueries 2 - Manipulating Table Data Insert Data Modify and Delete Data 3 - Manipulating the Table Structure Create a Simple Table Create a Table with Constraints Add or Drop Table Columns Add or Drop Constraints Modify the Column Definition Back Up Tables Delete Tables 4 - Working with Views Create a View Manipulate Data in Views Create Aliases Modify and Drop Views 5 - Indexing Data Create Indices Drop Indices 6 - Managing Transactions Create Transactions Commit Transactions
Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution
Duration 4 Days 24 CPD hours This course is intended for System Installers System Integrators System Administrators Network Administrators Solution Designers Overview Upon completion of this course, you will be able to: Describe the architecture and function of the Cisco IOS XR Broadband Network Gateway Configure and verify Authentication, Authorization, and Accounting (AAA) in a Broadband Network Gateway deployment Define policies to control subscriber traffic Establish and verify subscriber sessions Prioritize subscriber traffic using QoS Implement subscriber features Deploy redundancy for subscriber sessions The Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 course teaches you how to successfully deploy, configure, operate, maintain, and support a Cisco IOS© XR Broadband Network Gateway (BNG) solution. This course will show you how to implement and verify BNG on a Cisco IOS XR device to manage subscriber access. You will also learn how to implement and verify subscriber management functions, including authentication, authorization, and accounting of subscriber sessions, address assignment, security, policy management, and Quality of Service (QoS). Broadband Network Gateway Overview BNG Architecture BNG Software and Hardware Requirements Configuring and Verifying Authentication, Authorization, and Accounting AAA Overview and Operation RADIUS Operation and Configuration DIAMETER Operation and Configuration Activating Control Policy Control Policy Overview Creating and Activating Class Maps and Policy Maps Defining Dynamic Templates Establishing Subscriber Sessions Subscriber Session Overview Establishing IPoE and PPPoE Sessions DHCP Operation Subscriber Interface Neighbor Discovery Static Session and Session Limits BGP Subscriber Support Deploying Quality of Service Quality of Service Overview and QoS Feature Support RADIUS Based Policing Share Policy Instances and Merged Policy-Maps Configuring Subscriber Features Managing Control Plane Traffic Controlling Packet Forwarding Providing Multicast Services Routing and Traffic Mirroring on Subscriber Sessions BNG Geo Redundancy and XML Support Geo Redundancy Overview and Deployment Models Configuring and Verifying Geo Redundancy XML Support Additional course details: Nexus Humans Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 (IOSXR304) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for Network Administrators, Network Engineers, Network Operations Technicians, and students interested in learning about programming. Overview Upon completing this course, the learner will be able to meet these overall objectives:Understand and describe basic and advanced Python terminologiesIdentify and correct Python script errorsPull and reconfigure networking devices using Python scriptsIntroduction to RESTful API utilizing JSON and XML This course focuses on the interoperability of Python programming with Networking to prepare students for Software Defined Networking. This class is designed for students looking to add programming skills in preparation for various ACI & SDN technologies. Basic Constructs Describe and execute strings Describe and execute printing Describe and execute variables Describe and execute built in methods Describe and execute input from users Describe Boolean expressions Advanced Constructs Describe and execute redundant scripts Describe and execute functions Describe and execute classes Scaling Python Describe and execute Reading Files scripts Describe and execute Writing to File scripts Describe and execute substituting strings and integers Describe and execute while loops Describe and execute for loops and lists Describe and execute slicing Updating and edit a list Error checking Dictionaries and Regular Expressions Describe and execute dictionaries Delete dictionaries Describe and execute dictionaries with lists Describe and execute regular expressions (match, search, findall, sub) XML and JSON Describe XML format Describe JSON Format Example of XML Example of JSON What is an XML Schema? Describe SOAP Example of CURL with a Web Based Application Example of a SOAP exchange with a Web based Application Example of REST with a Web based Application Putting It All Together Apply Python principles with a SOAP Client Apply Python principles with REST and WSDL Apply native Python modules Additional course details: Nexus Humans Introducing Python and Web Services Programmability for Network Engineers - v3.0 IPWSP-NE training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introducing Python and Web Services Programmability for Network Engineers - v3.0 IPWSP-NE course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who will deploy or have deployed the Ultra M virtual packet core solution in their network, including: Systems engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the Ultra M hardware and software Describe the features covered in the OpenStack component overview and deployment architecture Describe the Ultra M deployment architecture and operation Describe the Virtualized Packet Core-Distributed Instance (VPC-DI) architecture and packet flow Deploy and operate Ultra M This course teaches you about the hardware components of the Cisco© Ultra M virtual packet core solution, including Cisco Nexus© spine and leaf switches and Cisco Unified Computing System. The course also covers the operation and administration of the Red Hat Enterprise Linux operating system in relation to the Ultra M Undercloud and Overcloud deployments. Cisco Ultra M Hardware and Topology Overview Cisco Ultra M Hardware Components Cisco Ultra M UCS Components Cisco Ultra M UCS Interfaces Cisco Ultra M Networking Components Cisco Ultra M Physical Network Topology OpenStack Deployment Architecture and Components OpenStack Overview Nova ? OpenStack Compute Service Glance ? OpenStack Image Service Neutron ? OpenStack Network Service Keystone ? OpenStack Identity Service Cinder ? OpenStack Block Storage Service OpenStack Horizon Dashboard Ultra M Services Platform Ultra Services Platform Architecture Ultra M VNF Architecture Ultra Automation Services (UAS) Elastic Services Controller OpenStack and Ultra Automation Services VPC-DI Overview and Operation Virtual Packet Core Evolution Ultra M Layer 3 Network Topology VPC-DI Network Topology VPC-DI Packet Flows Ultra M Installation and Deployment Reviewing the Ultra M System Components Planning the Network for Installation and Deployment Deploying Hyperconverged Ultra M Models Using UAS Deploying VNFs Using AutoVNF Ultra Automation Services Additional course details: Nexus Humans Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to: Identify the different types of tools and techniques available Apply change management successfully Review what to look for when applying business case thinking to Root Cause Analysis Develop a process to systematically approach problems Business success is dependent on effective resolution of the problems that present themselves every day. Often the same or similar problems continue causing repeated losses in time or money and your staff become experts at fixing rather than preventing the problems. Learn to find and fix root causes and develop corrective actions that will effectively eliminate or control these problems. Section 1: RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? What is Root Cause? RCA Benefits and Approaches Event and Casual Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Section Summary and Conclusions Section 2: Enhance use of RCA tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Tool: Cause and Effect Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Tool: Design / Application Review Section 3: Problem Resolution and Prevention Section Objectives The Secret of Solving Problems: -A Note about Statistical Control -A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN): -What is Business Process Modeling Notation (BPMN)? -Benefits of BPMN -Basic Components of BPMN Technique: Business Process Maturity Model Five Levels of Maturity Section 4: Capability Improvement for RCA Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? -Awareness of the need for change -Desire to participate and support the change -Knowledge on how to change -Ability to implement required skills and behaviors -Reinforcement to sustain the change The ADKAR Model: Reinforcement Section 5: Course Summary and Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Resource Guide Questions
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. Migrate virtual machines Migrate and control automatic migration of virtual machines. Manage virtual machine images Manage virtual machine snapshots and disk images. Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.
Duration 2 Days 12 CPD hours Overview #NAME? A course that teaches the core Adobe Captivate skills needed to create eLearning courses. 1 - EXPLORING CAPTIVATE Explore a Finished Captivate Project Zoom and Magnify Navigate a Project Explore and Reset the Workspace Preview the Entire Project 2 - NEW PROJECTS & SOFT SKILLS ELEARNING Create a Blank Project Add Images to Placeholders Import Images Use a Smart Shape as a Button Disable Click Sounds 3 - SCREEN RECORDINGS Rehearse a Script Review Recording Settings Review Recording Modes Record Using Multiple Modes Record a Custom Simulation Record a Demonstration that Pans Manually Record the Screen 4 - VIDEO DEMOS Record a Video Demo Add a Video Zoom Add a Video Pan Smooth a Mouse Path and Show Visual Clicks Split a Video Trim a Video Insert a Video Project into a Standard Project Publish a Video Demo 5 - CAPTIONS, STYLES, TIMING, AND ROUND TRIPPING Insert and Edit Text Captions Edit the Default Caption Style Change a Callout Type Used by a Text Caption Control Slide Timing Control Slide Object Timing Check Spelling Align Slide Objects Export Captions to Word Import Captions from Word into Captivate 6 - POINTERS, PATHS, PATHS, BOXES, AND BUTTONS Control Mouse Effects Edit a Mouse Path Clone an Object Style Insert a Highlight Box Insert an Image Button Control Appear After Timing 7 - IMAGES AND VIDEOS Insert, Resize, and Restore an Image Import Images into the Library Resize, Transform, and Align Images Manage Unused Library Assets Create an Image Slideshow Insert a Video Set Video Properties 8 - AUDIO Work with Rollover Captions Import Audio onto a Slide Object Import Background Audio Add a Slide Note Calibrate a Microphone Record Slide Audio Import Audio onto a Slide Edit an Audio File Insert Silence Convert Text-to-Speech 9 - STATES, ANIMATIONS, AND OBJECT EFFECTS Change State Views for a Button Add an Animation to a slide Insert a Text Animation Apply an Effect to a Slide Object Apply a Free Fall Effect to an Object 10 - SOFTWARE SIMULATIONS Hide the Mouse Replace Phrases Insert a Click Box Insert a Text Entry Box 11 - WORKING WITH POWERPOINT Create a Project from a Presentation Edit the Source Presentation Synchronize with Source Rescale a Project 12 - QUIZZING Edit Quizzing Object Styles Set the Quiz Preferences Question Slides Insert Question Slides Edit a Question Slide Compare Submit All to Submit Buttons Insert a Knowledge Check Review a GIFT File Import a GIFT File into a Project Create Question Pools Move Questions to Pools Insert Random Question Slides 13 - PUBLISHING Apply a Skin Edit, Save, and Delete a Skin Name Slides Check Publish Settings and Add a Loading Screen Publish as SWF and PDF Run the HTML5 Tracker Publish as HTML5
Duration 1 Days 6 CPD hours This course is intended for The intended audience for this course would be those who have been using Office 365 for some time and are now looking at optimizing their existing business processes and designing new ones. Overview #NAME? This course delivers an instructor-led product showcase for Microsoft Power Automate from start to finish in an engaging and practical way. Power Automate is a diverse product, turning business processes into automated, consistent and visual workPower Automates. Power Automate is designed to interweave the various products in Office 365 as well as connect to other on-premises and web-based solutions. This course will give you the confidence to select the right actions and workPower Automate logic for your business workPower Automates. 1 - An Introduction to Power Automate What is Microsoft Power Automate? The benefits of automation How to get to Power Automate Lab 1: Setup your tenant Setup Office 365 Download Course Files Customise your App Launcher Create accounts for colleagues After completing this module, students will be able to: Know what Microsoft Power Automate is The Benefits of using Power Automate to automate processes How to access a Power Automate 2 - Getting Started with Power Automate Using Power Automate templates Navigating in Power Automate Editing a Power Automate Publish and trigger a Power Automate Turn off or delete a Power Automate Lab 1: Building processes in Office 365 Create a Team with a channel Build an absence business process Testing the absence process Optional: Create Feedback Form Optional: Power Automate to Notify of Bad Ratings Optional: Test your Form and Power Automate After completing this module, students will be able to: How to use Power Automate tempaltes How to navigate around Power Automate How to edit Power Automates How to publish and trigger Power Automates How to turn off or delete Power Automates 3 - Power Automate Logic Adding conditions Designing switches Using apply to each Configuring do until logic Adding a scope Lab 1: Scheduling documentation reviews Setup a policy library in SharePoint Design a policy review schedule Testing the policy review process Optional: Notify if a file nears review After completing this module, students will be able to: How to add condtions in a Power Automate How to design switches for a Power Automate How to use apply to each How to configure do until logic How to add a scope 4 - Integration Standard and premium connectors Connecting to web services Using Power Automate with on-premises data Lab 1: Using Power Automate and SQL to Review Sales Create a new orders list Designing the price check process Testing the price check process Optional: Update with managers After completing this module, students will be able to: How to use Standard and Premium connectors How to connect to web services How to using Power Automate with on-premises data 5 - The Mobile App Downloading the mobile app Signing in and account management Building and managing Power Automates Creating buttons Feeds and approvals Lab 1: Optional: Using the Power Automate mobile app Setting up the Power Automate mobile app Create a new Power Automate in the mobile app Using Power Automate buttons in the app Uninstall the Power Automate mobile app After completing this module, students will be able to: How to download the mobile app How to sign into the mobile app How to build and manage Power Automates in the mobile app How to create buttons in the mobile app How to feed and use approvals in the mobile app 6 - Administration and Maintenance Maintaining a Power Automate View history and analytics Sharing a Power Automate Export and import Power Automates Office 365 administration for Power Automate Environments Data policies Data integration Lab 1: Maintaining your Power Automates Share a Power Automate with a colleague Disabling an active Power Automate Deleting a Power Automate After completing this module, students will be able to: How to maintain a Power Automate How to view history and analytics for a Power Automate How to share a Power Automate How to export and import Power Automates How to administrate a Power Automate in Office 365 How to use data policies in a Power Automate How to use data integration in a Power Automate