Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers who are responsible for deployment and application engineering for Cisco Unified Contact Center Express customers. System and technical support engineers. Day 1 and Day 2 support personnel. Customers deploying and maintaining Cisco Unified CCX Overview Upon completing this course, the learner will be able to meet these overall objectives: Review Cisco Unified CCX environment components Create prompt recording tools Create a helpdesk script Apply common sense principles for scripting and system management, such as: Prompt, document, and grammar management Using the default script Scripting for proper call termination and ending a script Abandon rates Exception handling Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Setup access and use an external database Define and use skills Script for conditional routing Script for basic callback scenarios Setup and use enterprise data and session management Script for queuing and scheduled callback scenarios Building on the knowledge base and scripting experience learned in the UCCXD class, the student will explore advanced techniques in scripting and overall Cisco Unified CCX functionality. During this five day class the students will use advanced scripting to implement features that extend the functionality of Cisco Unified CCX using many of the tools that are already available in the premium version of the product. Students should expect to spend time using the script editor and other tools to create developer tools and enhanced scripts to provide for a more functional and user-friendly customer experience. Activities include creating prompt recording tools, applying common sense scripting principles, creating simple and complex ACD routing scripts, holiday routing, external database access, various callback scenarios such as non-queuing, queuing, and scheduled callbacks, defining and using enterprise data, passing data from one script to another using session management, and much more. Additionally, since this class focuses on complex scripting concepts, it requires the student to learn more about fundamental scripting requirements such as data manipulation and formatting, using variables and array variables, and using Java programming methods. Course Introduction Learner Prerequisite Skills and Knowledge Course Goal Course Objectives Course Flow General Administration Lab Diagram Please Introduce Yourself Lesson 1: Cisco Unified CCX Overview Components of the Cisco Unified CCX Environment Gateways Routers Cisco Unified Communications Manager Cisco Unified CCX Script Editor Cisco Finesse Cisco Unified Intelligence Center Cisco Unified CCX Agent External Servers Cisco Unified CCX System Cluster Components Engine Database Server Call Flow Terms The Call Flow The Debug Process Reactive Non-Reactive Lesson 2: Prompt Recording Utilities Prompt Recorder Emergency Message Recorder Lesson 3: Basic ACD Routing Review Script Steps used in a Simple ACD Routing Script Resource Group Routing Defining the Contact Service Queue Create a Simple ACD routing script Lesson 4: Common Scripting Concepts Prompt Management Using the Default Script Terminating a Call and Ending a Script Abandon Rates Exception Handling Script Interruptions Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Lesson 5: Accessing an External Database Database architecture and supported databases Setting up the Database Subsystem Using Database script steps Lesson 6: Skills Based Routing Appling skills to agents Defining the Contact Service Queue Specifying the CSQ in the Script Lesson 7: Advanced ACD Routing Overflow Routing When to Overflow How to get the Data Needed for Making Decisions Describe Methods of Overflowing Lesson 8: Basic ACD Callback Options Setup the Email Subsystem Script for Email Notification Script for Leaving a Recorded Message Script for Callback when Queue Times have Decreased Lesson 9: Enterprise Data and Session Management Define Enterprise Data in Cisco Finesse Define a Call Variable Layout in Cisco Finesse Define ECC Variables in the script editor Set Enterprise Data in the script Define Session Management Setup Session Management Use Session Management to Pass Variable Information Between Scripts Lesson 10: Advanced ACD Callback Options Leave Queued Message with an Option for Callback Scheduled Callback
Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to perform many of the day-to-day administration tasks required of an Oracle database administrator. This course introduces many of the powerful capabilities of the Oracle database. In this course, students will learn about day-to-day administration tasks. It will also address administration sub-specialties. Introduction: Managing the Database Instance The Database Management Tools EM Database Express EM Cloud Control SQL Developer Database Administrator Introduction: Database Architecture Review Database Instance Configurations Memory Structures Process Structures Storage Architecture Introduction: Starting & Stopping Databse Services Start & Stop the Database Listener ABOUT DATABASE STARTUP/SHUTDOWN SYSOPER SYSDBA DATABASE STATE & STAGES STARTUP WITH EM CLOUD CONTROL STARTUP WITH SQL*PLUS SHUTDOWN WITH EM CLOUD CONTROL SHUTDOWN WITH SQL*PLUS USING MS WINDOWS SERVICES Introduction: Oracle Network Environment Oracle Net Services Architecture ORACLE NET CONFIGURATION ASSISTANT ORACLE NET MANAGER USING EM CLOUD CONTROL ADVANCED NETWORK COMPRESSION TROUBLESHOOTING NETWORK PROBLEMS Introduction: Diagnostics & Oracle Support About Database Diagnostics Fault Diagnosability Infrastructure DATABASE INSTANCE HEALTH SNAPSHOT THE SUPPORT WORKBENCH PROACTIVE DATABASE HEALTH CHECKS PACKAGE DIAGNOSTIC DATA WORKING WITH THE KNOWLEDGE BASE Storage: Tablespace Management Starter Tablespaces CREATE TABLESPACE WITH EM CC CREATE TABLESPACE WITH SQL MANAGE TABLESPACES WITH EM CC MANAGE TABLESPACES WITH EM DE MANAGE TABLESPACES WITH SQL DROP TABLESPACE ALTER TABLESPACE Storage: Advanced Tablespace Management Managing Temporary Tablespaces TEMP TABLESPACE GROUPS WITH EM TEMP TABLESPACE GROUPS WITH SQL DEFAULT PERMANENT TABLESPACES BIGFILE TABLESPACES MANAGING THE SYSAUX TABLESPACE Storage: Data Files & Temp Files Management Manage Data Files with EM ACCESS METADATA WITH SQL MANAGE DATA FILES WITH SQL MANAGE TEMP FILES ORACLE-MANAGED FILES (OMF) Storage: UNDO Data & UNDO Tablespaces About UNDO Space Management GUARANTEE UNDO RETENTION MONITOR UNDO SPACE WITH SQL USE THE EM UNDO ADVISOR Security & Schemas: Security Overview & Database Privileges Database Security Principles DATABASE SYSTEM PRIVILEGES DATABASE OBJECT PRIVILEGES SUPER ADMINISTRATOR ROLES PRIVILEGE ANALYSIS Security & Schemas: User Security Create & Manage User Accounts MANAGE USERS WITH EM MANAGE USERS WITH SQL CREATE USER ALTER USER DROP USER GRANT & REVOKE PRIVILEGES RESOURCE LIMITS VIA PROFILES ALTER PROFILE DROP PROFILE PASSWORD MANAGEMENT VIA PROFILES ROLE-BASED SECURITY MANAGEMENT ALTER USER...DEFAULT ROLE SET ROLE DELEGATING PRIVILEGE AUTHORIZATION WITH ADMIN OPTION & System Privileges WITH GRANT OPTION & Object Privileges PRINCIPLE OF LEAST PRIVILEGE CHECKLIST Security & Schemas: Database Auditing Auditing Database Activity Traditional Auditing Unified Auditing Create Audit Policy Security & Schemas: SQL Loader Loader Concepts Loader From the Command Line control File Options Load Methods Loader Express Mode Loader From EM Security & Schemas: Export & Import Manage Directory Objects The Data Pump Architecture Data Pump Export Data Pump Import Data Pump Dictionary Views Using the EM CC Interface Performance & Availability: Managing Performance & SQL Tuning Management Advisory Framework Performance Monitoring & AWR The SQL Tuning Advisor Monitoring Exceptions with Metrics Performance & Availability: Data Concurrency About System & User Locks Monitor & Manage User Locks Moitor Locks with Data Dictionary Manage Locks with EM Performance & Availability: Backup & Recovery Concepts Backup & Recovery Structures Managing REDO Data Configuring for Recoverability Instance Recovery Recoverability Checklist Additional course details: Nexus Humans Oracle 12c Administration II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c Administration II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is appropriate for advanced users, system administrators and web site administrators who want to use Python to support their server installations, as well as anyone else who wants to automate or simplify common tasks with the use of Python scripts. Students can apply the course skills to use Python in basic web development projects or automate or simplify common tasks with the use of Python scripts. Overview This skills-focused course is about 50% hands-on lab to lecture ratio, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert instructor, you'll learn how to: Create working Python scripts following best practices Use python data types appropriately Read and write files with both text and binary data Search and replace text with regular expressions Work with with the standard library and its work-saving modules Create 'real-world', professional Python applications Know when to use collections such as lists, dictionaries, and sets Work with Pythonic features such as comprehensions and iterators Write robust code using exception handling Introduction to Python Programming Basics is a hands-on Python programming course that teaches you the key skills you?ll need to get started with programming in Python to a solid foundational level. The start of the course will lead you through writing and running basic Python scripts, and then guide you through how to use more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This course provides you with an excellent kick start for users new to Python and scripting, enabling you to quickly use basic Python skills on the job in a variety of ways. You?ll be able use Python in basic web development projects, or use it to automate or simplify common tasks with the use of Python scripts. The course also serves as a solid primer course / foundation for continued Python study in support for next level web development with Python, using Python in DevOps, Python for data science / machine learning or Python for systems admin or networking support. Python Quick View What is Python? Python timeline Advantages/disadvantages Installing Python Getting help The Python Environment Starting Python Using the interpreter Running a Python script Editors and IDEs Getting Started with Python Using variables Builtin functions String data Numberic data Converting types Console input/output Command line parameters Flow Control About flow control The if statement Relational and Boolean operators while loops Exiting from loops Array Types About array types Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions and generators Working with Files File overview Opening a text file Reading a text file Writing to a text file Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Returning values Parameters and arguments Variable scope Sorting The sorted() function Custom sort keys Lambda functions Sorting in reverse Using min() and max() Errors and Exception Handling Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages Creating Modules The import statement Module search path Using packages Function and module aliases Getting Started with Object Oriented Programming and Classes About object-oriented programming Defining classes Constructors Understanding self Properties Instance Methods and data Class methods and data Inheritance Additional course details: Nexus Humans Introduction to Python Programming Basics (TTPS4800) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Python Programming Basics (TTPS4800) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Audience: Data Scientists, Software Developers, IT Architects, and Technical Managers. Participants should have the general knowledge of statistics and programming Also familiar with Python Overview ? NumPy, pandas, Matplotlib, scikit-learn ? Python REPLs ? Jupyter Notebooks ? Data analytics life-cycle phases ? Data repairing and normalizing ? Data aggregation and grouping ? Data visualization ? Data science algorithms for supervised and unsupervised machine learning Covers theoretical and technical aspects of using Python in Applied Data Science projects and Data Logistics use cases. Python for Data Science ? Using Modules ? Listing Methods in a Module ? Creating Your Own Modules ? List Comprehension ? Dictionary Comprehension ? String Comprehension ? Python 2 vs Python 3 ? Sets (Python 3+) ? Python Idioms ? Python Data Science ?Ecosystem? ? NumPy ? NumPy Arrays ? NumPy Idioms ? pandas ? Data Wrangling with pandas' DataFrame ? SciPy ? Scikit-learn ? SciPy or scikit-learn? ? Matplotlib ? Python vs R ? Python on Apache Spark ? Python Dev Tools and REPLs ? Anaconda ? IPython ? Visual Studio Code ? Jupyter ? Jupyter Basic Commands ? Summary Applied Data Science ? What is Data Science? ? Data Science Ecosystem ? Data Mining vs. Data Science ? Business Analytics vs. Data Science ? Data Science, Machine Learning, AI? ? Who is a Data Scientist? ? Data Science Skill Sets Venn Diagram ? Data Scientists at Work ? Examples of Data Science Projects ? An Example of a Data Product ? Applied Data Science at Google ? Data Science Gotchas ? Summary Data Analytics Life-cycle Phases ? Big Data Analytics Pipeline ? Data Discovery Phase ? Data Harvesting Phase ? Data Priming Phase ? Data Logistics and Data Governance ? Exploratory Data Analysis ? Model Planning Phase ? Model Building Phase ? Communicating the Results ? Production Roll-out ? Summary Repairing and Normalizing Data ? Repairing and Normalizing Data ? Dealing with the Missing Data ? Sample Data Set ? Getting Info on Null Data ? Dropping a Column ? Interpolating Missing Data in pandas ? Replacing the Missing Values with the Mean Value ? Scaling (Normalizing) the Data ? Data Preprocessing with scikit-learn ? Scaling with the scale() Function ? The MinMaxScaler Object ? Summary Descriptive Statistics Computing Features in Python ? Descriptive Statistics ? Non-uniformity of a Probability Distribution ? Using NumPy for Calculating Descriptive Statistics Measures ? Finding Min and Max in NumPy ? Using pandas for Calculating Descriptive Statistics Measures ? Correlation ? Regression and Correlation ? Covariance ? Getting Pairwise Correlation and Covariance Measures ? Finding Min and Max in pandas DataFrame ? Summary Data Aggregation and Grouping ? Data Aggregation and Grouping ? Sample Data Set ? The pandas.core.groupby.SeriesGroupBy Object ? Grouping by Two or More Columns ? Emulating the SQL's WHERE Clause ? The Pivot Tables ? Cross-Tabulation ? Summary Data Visualization with matplotlib ? Data Visualization ? What is matplotlib? ? Getting Started with matplotlib ? The Plotting Window ? The Figure Options ? The matplotlib.pyplot.plot() Function ? The matplotlib.pyplot.bar() Function ? The matplotlib.pyplot.pie () Function ? Subplots ? Using the matplotlib.gridspec.GridSpec Object ? The matplotlib.pyplot.subplot() Function ? Hands-on Exercise ? Figures ? Saving Figures to File ? Visualization with pandas ? Working with matplotlib in Jupyter Notebooks ? Summary Data Science and ML Algorithms in scikit-learn ? Data Science, Machine Learning, AI? ? Types of Machine Learning ? Terminology: Features and Observations ? Continuous and Categorical Features (Variables) ? Terminology: Axis ? The scikit-learn Package ? scikit-learn Estimators ? Models, Estimators, and Predictors ? Common Distance Metrics ? The Euclidean Metric ? The LIBSVM format ? Scaling of the Features ? The Curse of Dimensionality ? Supervised vs Unsupervised Machine Learning ? Supervised Machine Learning Algorithms ? Unsupervised Machine Learning Algorithms ? Choose the Right Algorithm ? Life-cycles of Machine Learning Development ? Data Split for Training and Test Data Sets ? Data Splitting in scikit-learn ? Hands-on Exercise ? Classification Examples ? Classifying with k-Nearest Neighbors (SL) ? k-Nearest Neighbors Algorithm ? k-Nearest Neighbors Algorithm ? The Error Rate ? Hands-on Exercise ? Dimensionality Reduction ? The Advantages of Dimensionality Reduction ? Principal component analysis (PCA) ? Hands-on Exercise ? Data Blending ? Decision Trees (SL) ? Decision Tree Terminology ? Decision Tree Classification in Context of Information Theory ? Information Entropy Defined ? The Shannon Entropy Formula ? The Simplified Decision Tree Algorithm ? Using Decision Trees ? Random Forests ? SVM ? Naive Bayes Classifier (SL) ? Naive Bayesian Probabilistic Model in a Nutshell ? Bayes Formula ? Classification of Documents with Naive Bayes ? Unsupervised Learning Type: Clustering ? Clustering Examples ? k-Means Clustering (UL) ? k-Means Clustering in a Nutshell ? k-Means Characteristics ? Regression Analysis ? Simple Linear Regression Model ? Linear vs Non-Linear Regression ? Linear Regression Illustration ? Major Underlying Assumptions for Regression Analysis ? Least-Squares Method (LSM) ? Locally Weighted Linear Regression ? Regression Models in Excel ? Multiple Regression Analysis ? Logistic Regression ? Regression vs Classification ? Time-Series Analysis ? Decomposing Time-Series ? Summary Lab Exercises Lab 1 - Learning the Lab Environment Lab 2 - Using Jupyter Notebook Lab 3 - Repairing and Normalizing Data Lab 4 - Computing Descriptive Statistics Lab 5 - Data Grouping and Aggregation Lab 6 - Data Visualization with matplotlib Lab 7 - Data Splitting Lab 8 - k-Nearest Neighbors Algorithm Lab 9 - The k-means Algorithm Lab 10 - The Random Forest Algorithm
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text
Duration 4 Days 24 CPD hours This course is intended for Data center engineers Engineers (design, implementation, pre-sales, post-sales) Product managers and sales Overview After taking this course, you should be able to: Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex Explain the Cisco Unified Computing System⢠(Cisco UCS) and what makes it valuable to business Describe how Cisco HyperFlex Data Platform (HXDP) works Describe the physical components of Cisco HyperFlex Describe Cisco Intersight and introduce functionalities relevant to HyperFlex Install standard ESXi-based vSphere Cisco HyperFlex Manage your Cisco HyperFlex VMware ESXi-based cluster Describe how to maintain Cisco HyperFlex Design a Cisco HyperFlex solution Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption Describe a stretched cluster and how is it different from a standard cluster Describe an Edge cluster and how is it different from a standard cluster Perform basic troubleshooting tasks and explain Cisco Intersight The Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco© HyperFlex? data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.? Introducing Hyperconvergence and Cisco HyperFlex Traditional Data Center Design What Is Hyperconvergence? Describing Cisco UCS: The Foundation of Cisco HyperFlex Cisco Server Deployment Models: Standalone Versus Managed Cisco UCS Managed Model Benefits Describing Cisco HyperFlex Software Components Virtual Machine Hypervisor Log-Structured File System Describing Cisco HyperFlex Hardware Components Introducing Cisco HyperFlex Servers Storage Technologies in Cisco HyperFlex Introducing Cisco Intersight Introducing Cisco Intersight Installing and Expanding Standard ESXi Cisco HyperFlex Installation Summary Software Prerequisites Managing Cisco HyperFlex in vSphere Environment Management Interfaces Overview Cisco HyperFlex Plugin for vCenter Maintaining Cisco HyperFlex Cisco HyperFlex Upgrade Overview Cisco HyperFlex Online Upgrade Designing Cisco HyperFlex Cluster Resiliency: VM-Level Cluster Resiliency: HXDP-Level Protecting Your Data Disaster Recovery Overview Third-Party Data Restore Solutions Introducing Cisco HyperFlex Stretched Deployment Stretched Cluster Overview Prerequisites Introducing Cisco HyperFlex EDGE Cisco HyperFlex EDGE Cluster Overview Prerequisites and Recommendations Troubleshooting Cisco HyperFlex Troubleshooting Guidelines Generating Tech Support Bundles
Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support Introduction The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. Managing the Nutanix Cluster In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. Securing the Nutanix Cluster This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. Acropolils Networking This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM Management This section shows you how to upload images, and how to create and manage virtual machines. Health Monitoring and Alerts In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. Distributed Storage Fabric This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV Workload Migration Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. File and Volumes This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. Understanding Infrastructure Resiliency This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. Data Protection Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. Prism Central Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. Monitoring the Nutanix Cluster This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. Cluster Management and Expansion This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. Remote Office Branch Office (ROBO) Deployments In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. Additional course details: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.