Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Navigate the AutoCAD user interfacesUse the fundamental features of AutoCADUse the precision drafting tools in AutoCAD to develop accurate technical drawingsPresent drawings in a detailed and visually impressive way In this course, you will learn to navigate the AutoCAD user interfaces and use the fundamental features of AutoCAD. You will learn to use the precision drafting tools in AutoCAD to develop accurate technical drawings. Getting Started with AutoCAD Starting the Software User Interface Working with Commands Cartesian Workspace Opening an Existing Drawing File Viewing Your Drawing Saving Your Work Basic Drawing & Editing Commands Drawing Lines Erasing Objects Drawing Lines with Polar Tracking Drawing Rectangles Drawing Circles Undo and Redo Actions Projects - Creating a Simple Drawing Create a Simple Drawing Create Simple Shapes Drawing Precision in AutoCAD Using Running Object Snaps Using Object Snap Overrides Polar Tracking at Angles Object Snap Tracking Drawing with Snap and Grid (Optional) Making Changes in Your Drawing Selecting Objects for Editing Moving Objects Copying Objects Rotating Objects Scaling Objects Mirroring Objects Editing with Grips Projects - Making Your Drawing More Precise Schematic Project: Electronics Diagram Architectural Project: Landscape Mechanical Project (with Polar & Tracking) Mechanical Project: Surge Protector Mechanical Project: Satellite Organizing Your Drawing with Layers Creating New Drawings With Templates What are Layers? Layer States Changing an Object's Layer Advanced Object Types Drawing Arcs Drawing Polylines Editing Polylines Drawing Polygons Drawing Ellipses Analzying Model and Object Properties Working with Object Properties Measuring Objects Projects - Drawing Organization & Information Architectural Project Mechanical Project Civil Project Advanced Editing Commands Trimming and Extending Objects Stretching Objects Creating Fillets and Chamfers Creating Arrays of Objects Inserting Blocks What are Blocks? Working with Dynamic Blocks Inserting Blocks Inserting Blocks using the Tool Palettes Inserting Blocks using the DesignCenter Inserting Blocks using the Content Explorer Projects - Creating More Complex Objects Mechanical Project 1 - Plate Mechanical Project 2 - Gasket Mechanical Project 3 - Plate Mechanical Project 4 - Rocker Arm Architectural Project 1 - Floor Plan Architectural Project 2 - Floor Plan Civil Project - Parking Lot Setting Up a Layout Printing Concepts Working in Layouts Creating Layouts Creating Layout Viewports Guidelines for Layouts Printing Your Drawing Printing Layouts Print and Plot Settings Projects - Preparing to Print Mechanical Project Architectural Project Text Working with Annotations Adding Text in a Drawing Modifying Multiline Text Formatting Multiline Text Adding Notes with Leaders to Your Drawing Creating Tables Modifying Tables Hatching Hatching Editing Hatches Adding Dimensions Dimensioning Concepts Adding Linear Dimensions Adding Radial and Angular Dimensions Editing Dimensions Projects - Annotating Your Drawing Mechanical Project Architectural Project 1 Architectural Project 2 Civil Project Additional course details: Nexus Humans AutoCAD Level 1 - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AutoCAD Level 1 - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system. This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: AFM Overview AFM Overview AFM Availability AFM and the BIG-IP Security Menu Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Module 3: Network Firewall AFM Firewalls Contexts Modes Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Configuring Network Firewall Network Firewall Rules and Policies Network Firewall Rule Creation Identifying Traffic by Region with Geolocation Identifying Redundant and Conflicting Rules Identifying Stale Rules Prebuilding Firewall Rules with Lists and Schedules Rule Lists Address Lists Port Lists Schedules Network Firewall Policies Policy Status and Management Other Rule Actions Redirecting Traffic with Send to Virtual Checking Rule Processing with Packet Tester Examining Connections with Flow Inspector Module 4: Logs Event Logs Logging Profiles Limiting Log Messages with Log Throttling Enabling Logging in Firewall Rules BIG-IP Logging Mechanisms Log Publisher Log Destination Filtering Logs with the Custom Search Facility Logging Global Rule Events Log Configuration Changes QKView and Log Files SNMP MIB SNMP Traps Module 5: IP Intelligence Overview Feature 1 Dynamic White and Black Lists Black List Categories Feed Lists IP Intelligence Policies IP Intelligence Log Profile IP Intelligence Reporting Troubleshooting IP Intelligence Lists Feature 2 IP Intelligence Database Licensing Installation Configuration Troubleshooting IP Intelligence iRule Module 6: DoS Protection Denial of Service and DoS Protection Overview Device DoS Protection Configuring Device DoS Protection Variant 1 DoS Vectors Variant 2 DoS Vectors Automatic Threshold Configuration Variant 3 DoS Vectors Device DoS Profiles DoS Protection Profile Dynamic Signatures Dynamic Signatures Configuration DoS iRules Module 7: Reports AFM Reporting Facilities Overview Examining the Status of Particular AFM Features Exporting the Data Managing the Reporting Settings Scheduling Reports Examining AFM Status at High Level Mini Reporting Windows (Widgets) Building Custom Widgets Deleting and Restoring Widgets Dashboards Module 8: DoS White Lists Bypassing DoS Checks with White Lists Configuring DoS White Lists tmsh options Per Profile Whitelist Address List Module 9: DoS Sweep Flood Protection Isolating Bad Clients with Sweep Flood Configuring Sweep Flood Module 10: IP Intelligence Shun Overview Manual Configuration Dynamic Configuration IP Intelligence Policy tmsh options Extending the Shun Feature Route this Traffic to Nowhere - Remotely Triggered Black Hole Route this Traffic for Further Processing - Scrubber Module 11: DNS Firewall Filtering DNS Traffic with DNS Firewall Configuring DNS Firewall DNS Query Types DNS Opcode Types Logging DNS Firewall Events Troubleshooting Module 12: DNS DoS Overview DNS DoS Configuring DNS DoS DoS Protection Profile Device DoS and DNS Module 13: SIP DoS Session Initiation Protocol (SIP) Transactions and Dialogs SIP DoS Configuration DoS Protection Profile Device DoS and SIP Module 14: Port Misuse Overview Port Misuse and Service Policies Building a Port Misuse Policy Attaching a Service Policy Creating a Log Profile Module 15: Network Firewall iRules Overview iRule Events Configuration When to use iRules More Information Module 16: Recap BIG-IP Architecture and Traffic Flow AFM Packet Processing Overview
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Platform Developers, systems operations professionals, and solution architects getting started with Google Cloud Platform Executives and business decision makers evaluating the potential of Google Cloud Platform to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for Azure IaaS, Azure PaaS, Azure SQL, Azure Blob Storage, Azure Application Insights, and Azure Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing,storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This 1-day instructor led course introduces Azure professionals to the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database. It is designed for Azure system administrators, Solution Architects and SysOps Administrators familiar with Azure features and setup; and want to gain experience configuring Google Cloud products immediately. With presentations, demos, and hands-on labs, participants get details of similarities, differences, and initial how-tos quickly. Introducing Google Cloud Explain the advantages of Google Cloud. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Identify the purpose of projects on Google Cloud. Understand how Azure's resource hierarchy differs from Google Cloud's Understand the purpose of and use cases for Identity and Access Management. Understand how Azure AD differs from Google Cloud IAM. List the methods of interacting with Google Cloud. Launch a solution using Cloud Marketplace. Virtual Machines in the Cloud Identify the purpose and use cases for Google Compute Engine Understand the basics of networking in Google Cloud. Understand how Azure VPC differs from Google VPC. Understand the similarities and differences between Azure VM and Google Compute Engine. Understand how typical approaches to load-balancing in Google Cloud differ from those in Azure. Deploy applications using Google Compute Engine Storage in the Cloud Understand the purpose of and use cases for: Cloud Storage, Cloud SQL, Cloud Bigtable and Cloud Datastore. Understand how Azure Blob compares to Cloud Storage. Compare Google Cloud?s managed database services with Azure SQL. Learn how to choose among the various storage options on Google Cloud. Load data from Cloud Storage into BigQuery Containers in the Cloud Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Understand how Azure Kubernetes Service differs from from Google Kubernetes Engine. Provision a Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl Applications in the Cloud Understand the purpose of and use cases for Google App Engine. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand how App Engine differs from Azure App Service. Understand the purpose of and use cases for Google Cloud Endpoints. Developing, Deploying and Monitoring in the Cloud Understand options for software developers to host their source code. Understand the purpose of template-based creation and management of resources. Understand how Google Cloud Deployment Manager differs from Azure Resource Manager. Understand the purpose of integrated monitoring, alerting, and debugging Understand how Google Monitoring differs from Azure Application Insights and Azure Log Analytics. Create a Deployment Manager deployment. Update a Deployment Manager deployment. View the load on a VM instance using Google Monitoring. Big Data and Machine Learning in the Cloud Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Understand how Google Cloud BigQuery differs from Azure Data Lake. Understand how Google Cloud Pub/Sub differs from Azure Event Hubs and Service Bus. Understand how Google Cloud?s machine-learning APIs differ from Azure's. Load data into BigQuery from Cloud Storage. Perform queries using BigQuery to gain insight into data Summary and Review Review the products that make up Google Cloud and remember how to choose among them Understand next steps for training and certification Understand, at a high level, the process of migrating from Azure to Google Cloud.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. Module 1: Introduction to TSQL for Business Intelligence Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Module 2: Turning Table Columns into Variables for Analysis: SELECT List Expressions, WHERE, and ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Module 3: Combining Columns from Multiple Tables into a Single Dataset: The JOIN Operators Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNERJOIN Understanding Joins, Part 3: The OUTERJOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTERJOINs Combining JOIN Operations with WHERE and ORDER BY Module 4: Creating an Appropriate Aggregation Level Using GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Module 5: Subqueries, Derived Tables and Common Table Expressions Non-correlated and correlated subqueries Derived tables Common table expressions Module 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Module 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Additional course details: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and cloud administrators who are already familiar with vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Learn installation best practices and troubleshoot installation failures Verify the correct DNS configuration Examine main logs and collect log bundles Examine the Kubernetes pods in the vRealize Automation architecture Troubleshoot common errors that prevent successful deployments Troubleshoot YAML code errors in VMware cloud templates Troubleshoot cloudConfig code errors in VMware cloud templates Troubleshoot VMware Identity Manager⢠configuration errors Troubleshoot common errors in VMware vRealize Orchestrator⢠workflows Use the vRealize Orchestrator debugger Use log outputs from vRealize Orchestrator Troubleshoot problems in custom resources Troubleshoot problems in resource actions Troubleshoot action-based extensibility (ABX) actions Integrate vRealize Automation with VMware vRealize Log Insight⢠Integrate vRealize Automation with VMware vRealize Operations Manager⢠Use VMware vRealize Lifecycle Manager⢠to troubleshoot vRealize Automation problems with licenses and certificates Configure and replace certificates This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in troubleshooting VMware vRealize Automationâ¢. vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. This course will enable you to troubleshoot common problems with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives Troubleshooting vRealize Automation Installation Issues vRealize Automation installation overview vRealize Automation installation best practices Troubleshooting installation failures vRealize Automation General Troubleshooting Verifying the DNS configuration settings in vRealize Automation and vSphere Examining the main logs in the user interface Collecting a log bundle Using vracli commands Examining the pods in the vRealize Automation Kubernetes architecture Dumping a log from a vRealize Automation Kubernetes pod Stopping and restarting a vRealize Automation Kubernetes pod vRealize Automation Cloud Templates and Deployment Troubleshooting Overview of provisioning and placement workflows Examining a deployment history Troubleshooting deployment issues Using deployment Dev mode Troubleshooting YAML code Troubleshooting problems with cloudConfig vRealize Automation Identity Manager Architecture and Cluster Architecture Authentication workflow in vRealize Automation Connector high availability for the authentication Architecture of a VMware Identity Manager cluster Key VMware Identity Manager commands and log files Troubleshooting a VMware Identity Manager problem Key vRealize Automation components Architecture of the vRealize Automation cluster vRealize Automation node failover scenario vRealize Automation cluster shutdown and startup process Virtual machine provisioning workflow Troubleshooting vRealize Orchestrator Workflows Overview of vRealize Orchestrator and vRealize Automation communications Using the vRealize Orchestrator debugger Using vRealize Orchestrator log output Troubleshooting vRealize Orchestrator binding errors Troubleshooting vRealize Orchestrator logic errors Troubleshooting vRealize Orchestrator payload errors Troubleshooting custom resource errors Troubleshooting resource action errors Troubleshooting Action Based Extensibility (ABX) Actions Overview of ABX actions Troubleshooting ABX actions vRealize Automation Integration with vRealize Tools Integrating vRealize Automation and vRealize Log Insight Integrating vRealize Automation and vRealize Operations Manager Using vRealize Operations Manager to monitor vRealize Automation vRealize Automation Certificate Management Managing vRealize Automation certificates Creating certificate requests with vRealize Lifecycle Manager Using Microsoft Certificate Services to create vRealize Automation certificates Replacing vRealize Automation certificates Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Automation: Troubleshooting [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Automation: Troubleshooting [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network engineers and technicians that are working in the enterprise sector. Overview - Describe the factors that led to the development of IPv6 and possible uses of this new IP structure - Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software - Implement IPv6 services and applications - Understand the updates to IPv4 routing protocols needed to support IPv6 topologies - Understand multicast concepts and IPv6 multicast specifics - Evaluate the scenario and desired outcome and identify the best transition mechanism for the situation - Describe security issues, how security for IPv6 is different than for IPv4, and emerging practices for IPv6-enabled networks - Describe the standards bodies that define IPv6 address allocation, in addition to one of the leading IPv6 deployment issuesââ¬'multihoming - Describe the deployment strategies that service providers might consider when deploying IPv6 - Describe case studies for enterprise, service provider, and branch networks This course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. Introduction to IPv6 Explaining the Rationale for IPv6 Evaluating IPv6 Features and Benefits Understanding Market Drivers IPv6 Operations Understanding the IPv6 Addressing Architecture Describing the IPv6 Header Format Enabling IPv6 on Hosts Enabling IPv6 on Cisco Routers Using ICMPv6 and Neighbor Discovery IPv6 Services IPv6 Mobility Describing DNS in an IPv6 Environment Understanding DHCPv6 Operations Understanding QoS Support in an IPv6 Environment Using Cisco IOS Software Features IPv6-Enabled Routing Protocols Routing with RIPng Examining OSPFv3 Examining Integrated IS-IS Examining EIGRP for IPv6 Understanding MP-BGP Configuring IPv6 Policy-Based Routing Configuring FHRP for IPv6 Configuring Route Redistribution IPv6 Multicast Services Implementing Multicast in an IPv6 Network Using IPv6 MLD IPv6 Transition Mechanisms Implementing Dual-Stack Describing IPv6 Tunneling Mechanisms IPv6 Security Configuring IPv6 ACLs Using IPsec, IKE, and VPNs Discussing Security Issues in an IPv6 Transition Environment Understanding IPv6 Security Practices Configuring Cisco IOS Firewall for IPv6 Deploying IPv6 Examining IPv6 Address Allocation Understanding the IPv6 Multihoming Issue Identifying IPv6 Enterprise Deployment Strategies IPv6 and Service Providers Identifying IPv6 Service Provider Deployment Understanding Support for IPv6 in MPLS Understanding 6VPE Understanding IPv6 Broadband Access Services IPv6 Case Studies Planning and Implementing IPv6 in Enterprise Networks Planning and Implementing IPv6 in Service Provider Networks Planning and Implementing IPv6 in Branch Networks Lab Exercises Lab 2-1: Enabling IPv6 on Hosts Lab 2-2: Using Neighbor Discovery Lab 3-1: Using Prefix Delegation Lab 4-1: Routing with OSPFv3 Lab 4-2: Routing with IS-IS Lab 4-3: Routing with EIGRP Lab 4-4: Routing with BGP and MP-BGP Lab 5-1: Multicasting Lab 6-1: Implementing Tunnels for IPv6 Lab 7-1: Configuring Advanced ACLs Lab 7-2: Implementing IPsec and IKE Lab 7-3: Configuring Cisco IOS Firewall Lab 9-1: Configuring 6PE and 6VPE Configuration Files Summary Lab Activity Solutions Teardown and Restoration Additional course details: Nexus Humans Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is designed for anyone looking to edit professional-quality video with Final Cut Pro X and who prefers hands-on and interactive instruction to best explore its functionality. Overview Start with basic video editing techniques and work all the way through Final Cut Pro's powerful advanced features. Students work with dramatic real-world media to learn the practical techniques used daily in editing projects. Final Cut Pro X is a revolutionary video editing application that makes it possible for beginners and professionals to achieve stunning results. This course teaches students to perform editing functions and becoming familiar with the user interface. Exploring the Final Cut Pro X Interface Following a Workflow Opening Final Cut Pro X Exploring the Interface Using Menus and Shortcuts Viewing and Sorting Events Skimming Clips and Changing Views Viewing and Creating Projects Working in the Project Library Viewing Projects in the Timeline Hiding and Quitting Final Cut Pro Importing Importing Media into an Event Importing Folders as Keyword Collections Analyzing and Correcting Imported Clips Importing from a Camera Importing from the Finder Importing from Other Applications Organizing Clips in an Event Using Metadata to Customize an Event Adding Keywords to Clips Assigning Multiple Keywords to Clips Applying Keywords to a Clip Range Rating, Sorting and Searching Clips Creating Smart Collections Building a Rough Cut Creating a New Project Screening and Marking Clips Appending Clips in the Timeline Viewing and Arranging Clips in the Magnetic Timeline Inserting Clips into the Primary Storyline Changing Edited Clips Connecting Clips to the Primary Storyline Closing your Project Finetuning a Rough CutAdding to the Primary Storyline Duplicating a Project Removing Clip Selections and Adding Gaps Understanding Trimming, Applying the Trim Tool Trimming with Precision Applying Transitions Preparing for Transitions Applying a Video Transition Using the Transitions Browser Modifying Transitions Changing Transition Parameters in the Inspector Adding Transitions to Other Storylines and Compound Clips Exploring Audio Transitions Working with Sound Monitoring and Adjusting Audio in the Timeline Adding Music and Sound Effects, Adjusting Levels in the Audio Inspector Creating Audio Fades Recording a Narration Track Correcting Problem Audio Working with Titles, Generators and Themes Using the Titles Browser Adding a Lower Third Modifying Titles Adding Bumpers and Credits Working with Video Generators Using Themes Retiming and Transforming Clips Understanding Motion Properties Retiming Clips Creating Holds and Variable Speed Segments Applying Preset Speed Effects Transforming an Image Cropping an Image Adding a Ken Burns Effect Creating Keyboard Shortcuts Applying Effects and Enhancing Color Applying Video Effects Modifying Effect Parameters Auditioning and Animating Effects Applying Audio Effects Enhancing Color in Final Cut Pro Exporting and Sharing Your Project Preparing a Project for Exporting and Sharing Detecting Audio Peaks Adjusting Video Levels for Broadcast Exporting Movie File Publishing a Project to Apple Devices Publishing a Project to Video Sharing Sites Exporting an Image from your Project Exporting for Blue-Ray Disc, DVD, or Disk Image Certification Exam Students can take an end user exam to earn Apple Certified Pro, Final Cut Pro X Level One status Additional course details: Nexus Humans Apple - Mac Final Cut Pro X - Level 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac Final Cut Pro X - Level 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.