Duration 5 Days 30 CPD hours This course is intended for Channel Partner / Reseller Customer Employee Overview At course completion students will be able to: - Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network - Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations - Given a converged network and a policy defining QoS requirements, classify and mark network traffic to implement the policy - Use Cisco QoS queuing mechanisms to manage network congestion - Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network - Use Cisco QoS traffic policing and traffic shaping mechanisms to effectively limit the rate of network traffic - Given a low speed WAN link, use Cisco link efficiency mechanisms to improve the badwidth efficiency of the link - Describe the recommended best practices and methods used for end-to-end QoS deployment in the enterprise This course provides students with knowledge of IP QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. Introduction to QoS Review Converged Networks Understand QoS Describe Best-Effort and Integrated Services Models Describe the Differentiated Services Model Module Summary Module Self-Check Implement and Monitor QoS MQC Introduction Monitor QoS Define Campus AutoQoS Define WAN AutoQoS Module Summary Module Self-Check Lab 2-1: IP SLA Setup and QoS Baseline Measurement Lab 2-2: Configuring QoS with Cisco AutoQoS Classification and Marking Classification and Marking Overview Case Study 3-1: Classification and Marking MQC for Classification and Marking NBAR for Classification Use of QoS Preclassify Campus Classification and Marking Module Summary Module Self-Check Lab 3-1: Classification and Marking Using MQC Lab 3-2: Using NBAR for Classification Lab 3-3: Configuring QoS Preclassify Lab 3-4: Campus Classification and Marking Using MQC Congestion Management Queuing Introduction Configure WFQ Configure CBWFQ and LLQ Configure Campus Congestion Management Module Summary Module Self-Check Lab 4-1: Configuring Fair Queuing Lab 4-2: Configuring LLQ-CBWFQ Lab 4-3: Configuring Campus-Based Queuing Mechanisms Congestion Avoidance Congestion Avoidance Introduction Configure Class-Based WRED Case Study 5-1: WRED Traffic Profiles Configure ECN Describe Campus-Based Congestion Avoidance Module Summary Module Self-Check Lab 5-1: Configuring DSCP-Based WRED Lab 5-2: Configuring WTD Thresholds Traffic Policing and Shaping Traffic Policing and Shaping Overview Configure Class-Based Policing Campus Policing Configure Class-Based Shaping Configure Class-Based Shaping on Frame Relay Interfaces Configure Frame Relay Voice-Adaptive Traffic Shaping and Fragmentation Module Summary Module Self-Check Lab 6-1: Configuring Class-Based Policing Lab 6-2: Configuring Class-Based Shaping Link Efficiency Mechanisms Link Efficiency Mechanisms Overview Configure Class-Based Header Compression Configure LFI Module Summary Module Self-Check Lab 7-1: Configuring Class-Based Header Compression Lab 7-2: Configuring LFI Deploying End-to-End QoS Apply Best Practices for QoS Policy Design End-to-End QoS Deployments Module Summary Module Self-Check Lab 8-1: Mapping Enterprise QoS Policy to the Service Provider Policy Additional course details: Nexus Humans Cisco Implementing Cisco Quality of Service v2.5 (QOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Quality of Service v2.5 (QOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight⢠for NSX⢠and VMware vRealize Network Insight⢠to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response
Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Identify the role and value of Cisco Silicon One in a campus environment. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches. Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches. Describe the maintenance features on Cisco Catalyst 9000 Series switches. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP. Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center. Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Positioning Cisco Catalyst 9000 Series Switches Cisco Catalyst Silicon One Architecture Exploring Cisco Catalyst 9000 Series Switches Management Capabilities Scale and Performance Features on Cisco Catalyst 9000 Series Switches Security Features on Cisco Catalyst 9000 Series Switches Automation Features on Cisco Catalyst 9000 Series Switches QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches Maintenance Features on Cisco Catalyst 9000 Series Switches Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches Application Hosting on Cisco Catalyst 9000 Series Switches Cloud Management for Catalyst 9000 Series Using Meraki Dashboard Automating Network Changes with Cisco DNA Center Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level XML training course, designed for those needing an introduction to concepts and technologies associated with XML and its related recommendations. Previous experience or knowledge of HTML is helpful but not essential. Overview This course is an intensive, hands-on introduction to XML, XPath, and XSLT. The course is a balanced mixture of theory and practical labs designed to take students from the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with the fundamentals of XML, including coverage of DTDs and XML Schema. It then moves on to the XPath and XSLT standards, and how to use them to transform XML documents into other documents such as HTML documents or other XML documents. This course provides indoctrination in the practical use of W3C standards (including XSL and XML Schema) and of implementing tools and technologies. This course is programming language independent, making it useful for Java, .NET, C++, and any other programming orientation. Graduates will hit the ground running, applying XML to projects at both an architectural as well as a line by line coding level. We can easily adapt this course to industry and client specific needs.In addition to valuable knowledge and working examples, students receive a copy of the 'Xtensil' product. This unique software was developed to assist in implementing, testing, and fielding XML applications. Xtensil is used as both a teaching aid and a straightforward, basic, fully functional XML toolkit that students can use on Windows and Linux platforms. Working in a hands-on learning environment student will learn to: Write well-formed XML documents Model business requirements using XML Handle XML reserved characters Validate an XML document with a DTD and with a Schema Centralize data and markup definition with entities Create DTDs and Schemas using XML tools Generate XML documents from databases Write XSL templates to transform XML documents into HTML Integrate XML, XSL and the DOM to implement a complete solution The Extensible Markup Language (XML) is a standard that is enabling a revolution in web applications and business to business interactions. XML is the basis for Wireless Markup Language (WML), Voice Markup Language (VoiceML), Simple Object Access Protocol (SOAP), Web Services, and numerous industry initiatives such as ACORD (insurance), PXML (proposal/RFP) and OTA (travel). Introduction to XML is a three-day, hands-on course geared for software developers who need to understand what XML is and how to use in with today's systems and architectures. This course covers the topics from tags to architectures. The course is a balanced mixture of theory and practical labs designed to take students from a quick review of the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with a quick review of the fundamentals of XML before covering XML Schema in detail. It then moves on to the XPath and XSLT covering advanced topics in both. Finally, XML and Web Services security mechanisms and issues are addressed. XML Content Introduction to XML XML Mechanics XML Structure Namespaces Structure Using Schemas XML Formatting CSS and Rendering XML XSL Transformations XSLT and XPath XPath 2.0 and XSLT 2.0 Overview XSL FO (Formatting Objects) Applying XML XML Interoperability XML Performance Improvements Web Services Overview XML Applications Additional course details: Nexus Humans Introduction to XML (TT4300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to XML (TT4300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones. Network administrators Network engineers Network supervisors Network managers Network Operations Center (NOC) personnel Network designers Network architects Channel partners Overview After taking this course, you should be able to: Describe VPN concepts and operation in a Service Provider environment Implement Layer 3 MPLS VPN operations in a Service Provider environment Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment Troubleshoot typical issues in Layer 3 MPLS VPN environments Implement Layer 2 VPN operations in a Service Provider environment Troubleshoot Layer 2 VPN issues in a Service Provider network Implement MPLS VPN solutions for IPv6 environments Troubleshoot MPLS VPN solutions for IPv6 environments The Implementing Cisco Service Provider VPN Services (SPVI) 5-day course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification.This course prepares you for the 300-515 Implementing Cisco© Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist - Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP© Service Provider certification.This course will help you:Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classificationsLearn to configure optional paths for traffic to avoid network congestionPrepare to take the 300-515 SPVI exam Introducing VPN Services VPN Fundamentals MPLS VPN Control Plane Operation Troubleshooting MPLS VPN Underlay Troubleshoot Core Interior Gateway Protocol (IGP) Troubleshoot Border Gateway Protocol (BGP) Implementing Layer 3 MPLS VPNs Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs Implementing Layer 3 Interdomain MPLS VPNs Inter-Autonomous System (AS) for Layer 3 MPLS VPNs Content Security and Control (CSC) for Layer 3 MPLS VPNs Implementing Layer 3 Multicast MPLS VPNs Multicast VPN (MVPN) Fundamentals Implement Intranet MVPN Troubleshooting Intra-AS Layer 3 VPNs Troubleshoot PE-CE Connectivity Troubleshoot PE-to-Route Reflecto Implementing Layer 2 VPNs Layer 2 Service Architecture and Carrier Ethernet Services Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions Troubleshooting Layer 2 VPNs Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions Implementing Layer 3 IPv6 MPLS VPNs Classical Solutions for Deploying IPv6 over IPv4 Environments Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment Troubleshooting Layer 3 IPv6 MPLS VPNs Troubleshooting PE-to-PE Connectivity Additional course details: Nexus Humans Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This is an introductory- level Java programming course, designed for experienced developers who wish to get up and running with JEE, or who need to reinforce sound Java for Web / JEE coding practices. Attendees should have a working knowledge of developing basic Java software applications. Overview Students who attend Mastering JEE Web Application Development will leave the course armed with the required skills to design and build scalable, secure, maintainable web applications - leveraging our extensive experience in the delivery of scalable enterprise applications with complex web interfaces based on JEE technologies. Throughout this training, you will be confronted with common web application design problems and given the tools you will need to solve them, such as JEE design patterns. You will also be exposed to a range of JEE and web technologies such as Servlets, JSPs, JSF, JNDI, CDI and advice on when and how to use them. Students will also learn about the capabilities of servlets, their advantages, servlet architecture, and session management. Developers will also learn about managing resources, deployment, and application models, how to use custom tags, and how to build robust and capable web applications using servlets and other components. The course begins with a discussion of web application architecture. A major part of the course is spent on the various web components that are used to implement dynamic web applications. Students will learn not only specific topics and APIs but also how to fit the pieces together into a complete application. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn to: Design and build web applications from both business and technical requirements Build web interfaces with JSF, JSPs and Servlets, using the latest technologies in JEE. Write maintainable web applications that separate HTML and Java Understand the design and development of web applications using Servlets, JSPs, web fragments, and JSF Work JEE's version of dependency injection (CDI) Make Servlets cooperate and share data Store and process session information Deal with concurrency issues Access databases with JPA Work with annotations included in JEE Work with WebSockets as well as asynchronous servlets Use Java Bean validation in a web application Properly handle various types of exceptions This course is for experienced Java developers who are new to JEE and need to get up and running with essential dynamic web development skills. You will gain core JEE knowledge and skills that can be used as the foundation for developing production-quality web applications to a basic level. Developing Java EE applications Enterprise Development Java EE Core Components JEE Dynamic Web Applications Introduction to Servlets Form processing using Servlets Java Server Pages Implementing MVC in JEE Session Management JEE Servlet Filters and Listeners Servlet Filters Expression Language 3.0 (EL) Overview of EL The EL language Custom Tags Introduction to Custom Tags The Java Standard Tag Library Contexts and Dependency Injection (CDI) Introduction to CDI Using CDI CDI and Java EE Using Resources JEE DataSources Overview of JPA Java API for WebSocket Introduction to WebSocket Implementing WebSocket Endpoint Extending WebSockets Java Bean Validation (JSR 349) Introduction to Bean Validation Bean Validation Managing Web Applications Web Fragments Error Handling Asynchronous Servlets Web Security Introduction to Java Server Faces Introduction to JSF JSF Components Facelets Facelets Facelets Templating and Resources Additional course details: Nexus Humans Mastering JEE Web Development (TT5100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering JEE Web Development (TT5100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced administrators and platform developers as well as solution, enterprise, and technical architects responsible for designing or building integration solutions on the Salesforce Platform. It's also designed for project or program managers looking to understand the big picture of integration in order to better manage their projects and programs. Ideally, you hold the Salesforce Administrator, Salesforce App Builder, or Salesforce Platform Developer I credential and/or are knowledgeable about standard and custom objects; how to work with flows and Process Builder; how to navigate Salesforce, Lightning Components, and Schema Builder; and Apex basics such as creating a Class and Anonymous Blocks. This class is recommended for anyone looking to earn their Salesforce Certified Integration Designer credential. Overview When you complete this course, you will be able to: Identify integration requirements by asking relevant integration questions to business stakeholders. Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes, Data Virtualization) to design integration solutions. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, Outbound Messaging, Callouts, and Salesforce Connect) to build integration solutions. Explore architectural concepts and the big picture thinking of how to integrate on the Salesforce Platform. In this 3-day class, our Salesforce integration experts will demonstrate how to build solutions that provide a single view of your customers. You?ll learn about integration capabilities and the considerations that should be made when architecting an integration solution. Through a combination of demos, discussions, and hands-on exercises, you?ll design and build secure, scalable, and high-performing integration solutions that seamlessly surface the information that matters most Integration Overview Understand the Importance of Integration Explore Integration Architecture Explore the Meaning of Single View of the Customer Explore the Meaning of System Landscape Understand the Role of Enterprise Service Bus (ESB) and Extract Transform Load (ETL) in System Landscape Integration Capabilities Introduction to Salesforce APIs Create External Applications Using SOAP API Build Mobile Applications Using REST API Work with Large Data Volumes Using BULK API Build Event-Driven Applications Using Streaming API Build Event-Driven Applications Using Platform Events Build Event-Driven Applications Using Change Data Capture Send Data from Salesforce to External Applications Using Outbound Message Call External APIs Programmatically Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Call External APIs Declaratively Using External Services Integration Patterns Understand Use Cases for a Request and Reply Pattern Understand Use Cases for a Fire and Forget Pattern Understand Use Cases for a Batch Data Synchronization Pattern Understand Use Cases for a Remote Call-In Pattern Understand Use Cases for a UI Update Based on Data Changes Pattern Understand Use Cases for a Data Virtualization Pattern Integration Security Explore Two-Way Transport Layer Security (TLS) Understand When to Use Remote Site Settings Understand the Benefits of Using Named Credentials Understand Certificates Encrypt Your Data at Rest Using Salesforce Shield Platform Encryption Advanced Integration Discussions Design Solutions for Performance Design Solutions for Scale Review Integration Regulatory Requirements Review Integration Best Practices Case Study Draw a System Landscape Diagram Evaluate Business Needs Translate Needs to Integration Requirements Design an Integration Solution Build an Integration Solution Maintain an Integration Solution Additional course details: Nexus Humans Salesforce Design and Build Integration Solutions (ARC101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Design and Build Integration Solutions (ARC101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence⢠and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience
Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Assess the business and application requirements of an environment Analyze design choices and design an EUC infrastructure architecture that addresses the needs of the environment Design an EUC architecture that addresses the needs of the organization and follows VMware best practices Document a design that can be implemented Design a comprehensive VMware EUC solution This five-day course presents a methodology for designing a VMware end-user computing (EUC) solution. The design methodology includes recommendations for the types of information and data that must be gathered and analyzed to make sound design decisions for the client systems, the desktop options, the VMware vSphere© infrastructure, VMware Horizon©, VMware Horizon© Cloud ServiceTM, VMware Workspace ONE© UEM, VMware Workspace ONE© AccessTM, VMware NSX-TTM, and VMware Unified Access GatewayTM. VMware best practices are presented for each phase of the design process. In this course, you apply your new knowledge by working with other participants to design a VMware EUC solution for a real-world project. Course Introduction Introductions and course logistics Course objectives VMWare EUC Design Methodology Recognize the characteristics of a good design. Identify the phases of VMware EUC Design Methodology Presenting Solutions to Executive Management Identify behaviors that can affect team performance negatively List common mistakes when working in a team Describe how to tailor a presentation to the company?s values, and stakeholders? backgrounds and roles List questions you should ask to identify how to address a problem a client is trying to solve Infrastructure Assessment and Services Definition Define customer business objective Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes Horizon Architecture and Components Determine the components required for a Horizon on-premises or Horizon Cloud deployment Implement the design considerations and recommendations for various Horizon components Analyze the use-case scenarios for various the Horizon deployment options Component Design: Horizon Pods Design a single-site Horizon desktop block and pod configuration for a given use case Design Cloud Pod Architecture for multisite pool access Design Control Plane Services Architecture for multisite pool access Component Design: App Volumes and Dynamic Environment Manager Identify the functionalities of the components in App Volumes Logical Architecture Implement the recommended practices when designing an application delivery mechanism using App Volumes Component Design: Workspace ONE Map the Horizon desktop building block and the Horizon management building block to VMware vSphere. Identify factors and design decisions that determine the sizing for ESXi hosts Workspace ONE & Horizon Infrastructure Design Design the environment resources required to support a Workspace ONE and Horizon deployment Identify factors and design decisions that determine the sizing for ESXi host Discuss the factors that determine the sizing for shared storage Identify the design decisions related to bandwidth utilization Discuss the implications of using load balancing and traffic management Identify factors and design decisions that determine the sizing of the Azure pods Design Integration and Delivery List the platform components that needs to be integrated along with their dependent services. Integrate Workspace ONE and Horizon platform components. Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware End User Computing: Design training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware End User Computing: Design course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.