Duration 1 Days 6 CPD hours This course is intended for This course is intended for business and IT managers who may need to consider or work within a cloud computing environment. Overview Upon successful completion of this course, students will be able to: - identify the pros and cons of the cloud computing technology and determine its impact on businesses.- differentiate the currently-available cloud services.- differentiate cloud categories and adoption measures.- identify risks involved and risk mitigation measures in cloud computing. In this course, students will define cloud computing technology and describe its impact on IT scenario. Introducing Cloud Computing Impact of the Cloud on Businesses Cloud Computing?An Overview Cloud Components Differentiating Cloud Services Infrastructure as a Service (IaaS)?An Overview Platform as a Service (PaaS)?An Overview Software as a Service (SaaS)?An Overview Integrating Cloud Services Categories of Cloud Deployment Models Migration to the Cloud Identifying Risks and Risk Mitigation Measures Cloud Computing Risks Cloud Computing Risk Mitigation Measures Additional course details: Nexus Humans Introduction to Cloud Computing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cloud Computing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course
Duration 2 Days 12 CPD hours This course is intended for Built for those supporting a Citrix Virtual Apps and Desktops solution in a help desk or service desk capacity. An ideal candidate for this course interacts with end users to troubleshoot and resolve issues. Overview How to support end-users connecting to Citrix Virtual Apps and Desktops through Citrix Workspace App. How to use Citrix Director to gather information and interact with user sessions. A methodology to approach user related issues to minimize time to resolution. An understanding of the Citrix Virtual Apps and Desktops solution and the role of the components Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team. Gain foundational knowledge about the Citrix Virtual Apps and Desktops technology and an understanding of how components interact. You will learn about each component focusing on common user related issues that may arise, and how to apply a methodical approach to solve them using real world scenarios. By the end of the course, you will be able to solve or escalate end-user issues appropriately Fundamental Architecture for the Help Desk Role Citrix Site Infrastructure and Deployment Models The Help Desk Role in the Fundamental Architecture Problem Resolution Methodology Citrix Director and its role in Help Desk Support Citrix Director Role and Purpose Access to Director for Help Desk Administrators Common Director Monitoring Tasks Common Help Desk AdministratorTroubleshooting Tasks Providing and Troubleshooting End User Access End User Access Overview Components between end users and published resources on VDAs User Experience Support End User Access Citrix Workspace App Workspace App Types Deploying Citrix Workspace app Pass though Authentication Supporting Citrix Workspace App User Sessions FlexCast Architecture User Sessions App and Desktop Launch Process User Profiles HDX Technologies Printing Introduction to Printing Printing Components Overview Supporting Printing
Duration 2 Days 12 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Powerful tools and techniques for drawing, dimensioning, and printing 2D drawings, Use content that has been previously created, Extract information from your drawings, Streamline the design process and become more productive with AutoCAD. Discover the powerful tools and techniques for drawing, dimensioning, and printing 2D drawings in this course that enables you to reuse content and extract information from your drawings. Working Effectively with AutoCAD Creating a Custom Workspace Using the Keyboard Effectively Object Creation, Selection, and Visibility Working in Multiple Drawings Copying and Pasting Between Drawings Using Grips Effectively Additional Layer Tools Accurate Positioning Coordinate Entry Locating Points with Tracking Construction Lines Placing Reference Points Projects - Productivity Tools Schematic Project - Purifier Unit Mechanical Project - 2 Views Architectural/Civil Project - Formal Garden Mechanical Project - Cover Plate Architectural Project - Addition Mechanical Project - Block Mechanical Project - Plate Parametric Drawing Working with Constraints Geometric Constraints Dimensional Constraints Working with Blocks Creating Blocks Editing Blocks Removing Unused Elements Adding Blocks to Tool Palettes Modifying Tool Properties in Tool Palettes Projects - Creating and Organizing Blocks Mechanical Project - Control Panel Architectural Project - Furniture Layout Civil Project - Utility Layout Creating Templates Why Use Templates? Controlling Units Display Creating New Layers Adding Standard Layouts to Templates Saving Templates Advanced Layouts Creating and Using Named Views Advanced Viewport Options Layer Overrides in Viewports Additional Annotative Scale Features Annotation Styles Creating Text Styles Creating Dimension Styles Creating Multi-leader Styles Projects - Drawing Setup and Utilities Interiors Project Mechanical/Schematic Project Civil/Map Project Mechanical Project - Dimension Styles External References Attaching External References Modifying External References Xref Specific Information Projects - Drawing D-sized Title Block Mechanical Project - Drill Press Base Architectural Project - Office Tower P&ID Project - Oil Lubrication System Civil Project - Warehouse Site
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Technical decision makers Network architects Overview After taking this course, you should be able to: Discover and describe the Cisco Multilayer Director Switch (MDS) platform of multilayer switches and directors. Provisioning Cisco MDS Switches Describe key product features of the MDS platform Describe and implement automation an Cisco MDS Switches Configure and implement the Cisco MDS switches and platform features Resolve issues and troubleshoot FC domains, zones and zone merges, and switch boot and firmware upgrades This course shows you how to implement, manage, and troubleshoot Cisco© MDS 9000 Series Switches, to build highly available, scalable storage networks. Through expert instruction and extensive hands-on practice, you will learn how to deploy and use capabilities such as virtual storage area networks (VSANs), Role-Based Access Control (RBAC), N-Port Virtualization (NPV) fabric security, zoning, automation with NX-API, Slow Drain Analysis, Fibre Channel over TCP/IP (FCIP) tunnels, and more. You will learn how to configure and implement platform features and learn troubleshooting techniques pertaining to Fibre Channel (FC) domains, firmware upgrades, zones, and zone mergers. This course prepares you for Cisco CCNP Data Center and Cisco Certified Specialist - Data Center SAN Implementation certifications. Describing Cisco MDS Platform Cisco MDS 9700/9300/9200/9100 Hardware Cisco NX-OS Cisco DCNM Fibre Channel Architecture FCoE Architecture Provisioning Cisco MDS Switches Power-On Auto-Provisioning Cisco DCNM Using Cisco DCNM 11.x RBAC and Authentication, Authorization, and Accounting (AAA) Building the Fibre Channel Fabric with Cisco MDS Switches Virtual SANs Port Channels and VSAN Trunking Zoning and Smart Zoning Device Aliases Inter-VSAN Routing Fibre Channel Fabric Security Building SAN Extensions Inter-VSAN Routing Slow Drain Analysis SAN Analytics and Telemetry Streaming Cisco Secure Boot NPV and NPIV Automating Cisco MDS Fabric Cisco MDS NX_APIPython API Ansible Monitoring and Reporting Cisco MDS Features Cisco DCNM SAN Reports and Alarms SAN Analytics and SAN Telemetry Streaming Troubleshooting Common Cisco MDS Issues Troubleshooting Fibre Channel Domains, Zones and Zone Merges Boot and Upgrade Issues
Duration 1 Days 6 CPD hours This course is intended for This class is intended for the following: Individuals preparing for the Associate Cloud Engineer examination. Recommended experience: 6 months+ hands-on experience with GCP This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos, and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan. This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge, but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for anyone who works on WebSphere related applications and projects, including administrators, IBM Business Partners, independent software vendors (ISVs), and consultants. Overview The objectives for this course are as follows:Use IBM Support Assistant to organize and analyze problem artifactsUse problem determination techniques to identify common problemsApply problem investigation approaches such as analysis and isolationGather diagnostic data problem artifacts by using administrative toolsTroubleshoot JVM-related problems such as hung threads, out of memory issues, and crashesUse IBM Support Assistant to run tools that analyze diagnostic dataIdentify and troubleshoot common problems with database connectionsConfigure and tune database connection poolsTroubleshoot WebSphere security problems associated with authentication, authorization, SSL, and Java 2 policiesIdentify and resolve Java EE application deployment problemsTroubleshoot HTTP request flow problems from web server to web containerIdentify and resolve application server startup failuresTroubleshoot problems associated with WebSphere default messaging and SI busTroubleshoot WebSphere installation problemsUse Intelligent Management features to configure health policies and tasksCommunicate effectively with IBM support teams This course teaches you how to manage WebSphere Application Server problems more skillfully within your organization by using problem determination tools and techniques. Outline Course introduction Overview of WebSphere Application Server systems and components Using the IBM Support Assistant Team Server 5.0 Exercise: Using the IBM Support Assistant Team Server 5.0 Problem determination methods Gathering diagnostic data Exercise: Gathering diagnostic data Introduction to JVM-related problems Exercise: Introduction to configuring garbage collection policies How to troubleshoot hangs Exercise: Troubleshooting hung threads How to troubleshoot crashes Exercise: Troubleshooting crashes Introduction to WebSphere out-of-memory problems Exercise: Troubleshooting an out-of-memory condition Introduction to database connection problems Exercise: Troubleshooting database connection problems Tuning and connection pool management problems Exercise: Troubleshooting a connection leak WebSphere security configuration problems Exercise: Troubleshooting security problems Application deployment problems Server start failures Exercise: Troubleshooting server start failures Request flow and web container problems Exercise: Troubleshooting request flow and web container problems Default messaging provider problem determination Exercise: Troubleshooting WebSphere default messaging WebSphere installation problems when using IBM Installation Manager Intelligent Management problem determination and problem determination tools Exercise: Configuring health management policies Course summary
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resiliency though high-availability clustering services and using fault-tolerant shared storage technologies. Overview As a result of attending this course, students should be able to create, manage, and troubleshoot highly available network services and tightly coupled cluster storage for business-critical applications. Students should be able to demonstrate the following skills: Improve application uptime by using high-availability clustering Manage storage in a high-availability environment using iSCSI initiators, HA-LVM or CLVM as appropriate, and GFS2 cluster file systems Implement strategies to identify single points of failure in high-availability clusters, and eliminate them This course will guide you through an intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.This course covers the same material as RH436, but includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436). This course is based on Red Hat Enterprise Linux 7.1. Clusters and storage Get an overview of storage and cluster technologies. Create high-availability clusters Review and create the architecture of Pacemaker-based high-availability clusters. Nodes and quorum Review cluster node membership and how quorum is used to control clusters. Fencing Understand fencing and fencing configuration. Resource groups Create and configure simple resource groups to provide high-availability services to clients. Troubleshoot high-availability clusters Identify and troubleshoot cluster problems. Complex resource groups Control complex resource groups by using constraints. Two-node clusters Identify and work around two-node clusters issues. ISCSI initiators Manage iSCSI initiators for access to shared storage. Multipath Storage Configure redundant storage access. Logical volume manager (LVM) clusters Manage clustered LVM. Global File System 2 Create symmetric shared file systems. Eliminate single points of failure Eliminate single points of failure to increase service availability. Comprehensive review Set up high-availability services and storage.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts