• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26025 TEC courses in Liverpool delivered Online

Symantec Endpoint Protection 12.X - Manage And Administer

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Endpoint Protection 12.X - Manage And Administer
Delivered OnlineFlexible Dates
Price on Enquiry

ADM800 SAP AS Java - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technology ConsultantSystem AdministratorSystem ArchitectHelp Desk / COE Support Overview Explain the architecture of SAP NetWeaver AS JavaStart and stop SAP NetWeaver AS JavaCarry out basic configurations for SAP NetWeaver AS JavaClassify network security conceptsSet up SSL encryption for SAP NetWeaver AS JavaExplain the architecture of the User Management EngineConfigure the User Management EngineCarry out user and authorization maintenanceUnderstand and change the standard logon procedure of SAP NetWeaver AS JavaMaintain destinations and the JCo RFC ProviderUnderstand the architecture and the tasks of the SAP NetWeaver Development InfrastructureExplain the process flow of the development process using the SAP NetWeaver Development InfrastructureSpecify the options for monitoring SAP NetWeaver AS JavaConnect SAP NetWeaver AS Java to a central Monitoring systemDisplay Monitoring and logging data using the SAP NetWeaver AdministratorImplement corrections for SAP NetWeaver AS Java In this course, students learn how to explain the architecture of SAP NetWeaver AS Java, carry out basic configurations for SAP NetWeaver AS Java, and much more. Fundamental Concepts of Java Describing the Fundamental Concepts of Java Describing the Architecture of the SAP NetWeaver Application Server (SAP NetWeaver AS) Outlining the Java Cluster Architecture Describing the Internal Structure of SAP NetWeaver AS for Java SAP NetWeavear AS for Java Start and Stop Procedures Starting and Stopping Procedures in SAP NetWeaver AS for Java Evaluating the Tools for Starting and Stopping an SAP System Evaluating Load Balancing Options in SAP NetWeaver AS for Java Operating the Java Startup and Control Framework Analyzing the Logs of Start and Stop Processes in SAP NetWeaver AS for Java Basic Configuration of SAP NetWeaver AS for Java Identifying the Administration Tools Used in Configuration Maintaining the Basic Configuration of SAP NetWeaver AS for Java with the Config Tool Configuring SAP NetWeaver AS for Java with SAP NetWeaver Administrator Configuring the Properties of the Central Services Instance Administering the Internet Communication Manager (ICM) Process Infrastructure Security Describing Network Security Setting Up the Secure Sockets Layer (SSL) User and Authorization Administration Configuring the SAP User Management Engine (UME) Maintaining Users and Groups Managing Java Authorization Administrating Special Principles Configuring the Logon Procedure in SAP NetWeaver AS for Java Java Connectors and Destinations Creating Connections to Other Systems Creating Connections to Other Systems with J2EE Connector Architecture (JCA) Change Management and Software Logistics Structuring the Java Development Approach Describing the Components of SAP NetWeaver Development Infrastructure Developing and Releasing Java Changes with SAP NetWeaver Development Infrastructure Transporting Java Developments Monitoring Monitoring SAP NetWeaver AS for Java Connecting to a Central Monitoring System (CEN) Configuring Availability Monitoring Configuring the Log and Trace Files Monitoring a System with SAP Solution Manager Software Maintenance Preparing for Software Maintenance Describing Java Support Packages, Stacks, and Patches Deploying Corrections with Software Update Manager (SUM) in SAP NetWeaver AS for Java Deploying Java Archives with Alternative Tools Outlining the Backup Strategy in SAP NetWeaver AS for Java

ADM800 SAP AS Java - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry

IBM Sterling B2B Integrator Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Consultants, Support, System Administrators Overview Upon completion of the course, students will be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator High level overview of the Admin Console with an exercise to start the application XML and XPath Basics Review the basics of XML and XPath which is heavily used in the application Basic Business Process Concepts Reviewing what XML and XPath components are used to build business processes Reviewing how to manually execute a business process within the application Tracking and Troubleshooting Business Processes Exercises to demonstrate how to work with business process instances Graphical Process Modeler (GPM) Overview of the Graphical Process Modeler Exercises to walk through the development of a business process in the GPM Exercises for checking in, executing, and modifying business processes Introduction to Service Management Several exercises showcasing specific services/adapters and other functionality Best Practices Covers specific business process development methods that are best practice Mapping Introduction to the Map Editor and Standards Exercises to build and use an XML Encoder Map Typing Map Exercises to build and use a Typing Map Case Study Exercise to build an end-to-end solution using what was learned in previous exercises Tracking System Health Review of archiving, migrating, and deleting business processes Additional course details: Nexus Humans IBM Sterling B2B Integrator Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IBM Sterling B2B Integrator Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IBM Sterling B2B Integrator Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek an understanding of the parallel framework architecture. In this course, students will develop a deeper understanding of the DataStage architecture, including a deeper understanding of the DataStage development and runtime environments. Introduction to the Parallel Framework Architecture Describe the parallel processing architecture Describe pipeline and partition parallelism Describe the role of the configuration file Design a job that creates robust test data Compiling & Executing Jobs Describe the main parts of the configuration file Describe the compile process and the OSH that the compilation process generates Describe the role and the main parts of the Score Describe the job execution process Partitioning & Collecting Data Understand how partitioning works in the Framework Viewing partitioners in the Score Selecting partitioning algorithms Generate sequences of numbers (surrogate keys) in a partitioned, parallel environment Sorting Data Sort data in the parallel framework Find inserted sorts in the Score Reduce the number of inserted sorts Optimize Fork-Join jobs Use Sort stages to determine the last row in a group Describe sort key and partitioner key logic in the parallel framework Buffering in Parallel Jobs Describe how buffering works in parallel jobs Tune buffers in parallel jobs Avoid buffer contentions Parallel Framework Data Types Describe virtual data sets Describe schemas Describe data type mappings and conversions Describe how external data is processed Handle nulls Work with complex data Reusable Components Create a schema file Read a sequential file using a schema Describe Runtime Column Propagation (RCP) Enable and disable RCP Create and use shared containers Balanced Optimization Enable Balanced Optimization functionality in Designer Describe the Balanced Optimization workflow List the different Balanced Optimization options. Push stage processing to a data source Push stage processing to a data target Optimize a job accessing Hadoop HDFS file system Understand the limitations of Balanced Optimizations Additional course details: Nexus Humans KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager
Delivered OnlineFlexible Dates
Price on Enquiry

GRC330 SAP Process Control 10.1 - Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implmentation Consultants, Business Users, IT Governance Experts, Compliance Managers Overview Discuss the purpose and business use of Process ControlDescribe key features and related harmonization topicsDescribe risk-based internal controlsConfigure Process Control customizing settings and those shared across GRCCreate and manage master dataDiscuss security and authorization requirementsImplement the Process Control solutionUse risk-managed financial compliance practicesPlan and process surveys and testsSet up and maintain Continuous MonitoringIntegrate and use Process Control with Policy ManagementDiscuss operational complianceAggregate deficienciesUse the harmonized reporting frameworkDescribe the use of custom-defined fields and document search This course offers hands-on configuration and implementation of SAP Process Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing prevention of process risk. Enterprise Goverance, Riskl, and Compliance (eGRC) Risk-Based Approach to Managing Compliance Initiatives Integrated GRC Approach Governance Governance Overview Governance Using Process Control 10.1 Daily Business Use Harmonization Overview Harmonization Concepts Work Centers Setting Up an Entry Page Technical Landscape Configuration Requirements Customizing Central Tasks Shared Master Data and Reports Workflow Authorization Updates Process Control-Specific Customizing Create & Manage Master Data Master Data Overview Setting Up an Organization Hierarchy Setting Up the Account Group Hierarchy Setting Up the Central Process Hierarchy Setting Up the Indirect Entity-Level Control Hierarchy Harmonized Risk Model Uploading Master Data with MDUG Content Lifecycle Management Master Data Change Request Workflow Surveys and Manual Tests Survey and Test Overview Planner Overview Assessment Survey Manual Test Manual Test ? Offline Forms and Data Sheets Disclosure Survey Issue Remediation Risk-Managed Financial Compliance Risk-Based Financial Compliance Materiality Analysis Risk Assessment Control Risk Rating Test Strategy Risk Coverage Analysis Integration with SAP Audit Management Ad Hoc Issues Ad Hoc Issues Integration with SAP Fraud Management Policy Management Policy Management ? Overview Configuring Policy Management Policy Lifecycle Management Continuous Monitoring Continuous Monitoring ? Overview Continuous Monitoring ? Preconfiguration Creating a Data Source Creating a Business Rule Assigning Business Rules to a Control Scheduling a Continuous Monitoring Job Monitoring a Continuous Monitoring Job SAP Queries SAP BW Query Setting Up a Configurable Rule Subscenario Create a Programmed Rule ABAP Reports Process Integration Subscenario SoD Integration Web Service for Continuous Monitoring Event-Based Monitoring SAP HANA Views New CCM Content Upload Capabilities Operational Compliance Overview Operational Compliance Overview and Key Trends CAPA Operational Compliance-Specific Focus in CCM Closing Activies in an ICS Management Cycle Sign-Off Aggregation of Deficiencies Reporting Reports Overview Report Framework Harmonization Dashboard Overview Security & Authorization Security and Authorization ? Overview Authorization Configuration and Setup Implementation Scope and Approach Implementation Scope and Approach Establishing a Compliance Framework Configuring a Multi-Compliance Framework (MCF) Other Process Control Features Custom-Defined Fields Document Search

GRC330 SAP Process Control 10.1 - Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Cloudera Data Analyst Training - Using Pig, Hive, and Impala with Hadoop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for data analysts, business intelligence specialists, developers, system architects, and database administrators. Overview Skills gained in this training include:The features that Pig, Hive, and Impala offer for data acquisition, storage, and analysisThe fundamentals of Apache Hadoop and data ETL (extract, transform, load), ingestion, and processing with HadoopHow Pig, Hive, and Impala improve productivity for typical analysis tasksJoining diverse datasets to gain valuable business insightPerforming real-time, complex queries on datasets Cloudera University?s four-day data analyst training course focusing on Apache Pig and Hive and Cloudera Impala will teach you to apply traditional data analytics and business intelligence skills to big data. Hadoop Fundamentals The Motivation for Hadoop Hadoop Overview Data Storage: HDFS Distributed Data Processing: YARN, MapReduce, and Spark Data Processing and Analysis: Pig, Hive, and Impala Data Integration: Sqoop Other Hadoop Data Tools Exercise Scenarios Explanation Introduction to Pig What Is Pig? Pig?s Features Pig Use Cases Interacting with Pig Basic Data Analysis with Pig Pig Latin Syntax Loading Data Simple Data Types Field Definitions Data Output Viewing the Schema Filtering and Sorting Data Commonly-Used Functions Processing Complex Data with Pig Storage Formats Complex/Nested Data Types Grouping Built-In Functions for Complex Data Iterating Grouped Data Multi-Dataset Operations with Pig Techniques for Combining Data Sets Joining Data Sets in Pig Set Operations Splitting Data Sets Pig Troubleshoot & Optimization Troubleshooting Pig Logging Using Hadoop?s Web UI Data Sampling and Debugging Performance Overview Understanding the Execution Plan Tips for Improving the Performance of Your Pig Jobs Introduction to Hive & Impala What Is Hive? What Is Impala? Schema and Data Storage Comparing Hive to Traditional Databases Hive Use Cases Querying with Hive & Impala Databases and Tables Basic Hive and Impala Query Language Syntax Data Types Differences Between Hive and Impala Query Syntax Using Hue to Execute Queries Using the Impala Shell Data Management Data Storage Creating Databases and Tables Loading Data Altering Databases and Tables Simplifying Queries with Views Storing Query Results Data Storage & Performance Partitioning Tables Choosing a File Format Managing Metadata Controlling Access to Data Relational Data Analysis with Hive & Impala Joining Datasets Common Built-In Functions Aggregation and Windowing Working with Impala How Impala Executes Queries Extending Impala with User-Defined Functions Improving Impala Performance Analyzing Text and Complex Data with Hive Complex Values in Hive Using Regular Expressions in Hive Sentiment Analysis and N-Grams Conclusion Hive Optimization Understanding Query Performance Controlling Job Execution Plan Bucketing Indexing Data Extending Hive SerDes Data Transformation with Custom Scripts User-Defined Functions Parameterized Queries Choosing the Best Tool for the Job Comparing MapReduce, Pig, Hive, Impala, and Relational Databases Which to Choose?

Cloudera Data Analyst Training - Using Pig, Hive, and Impala with Hadoop
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing Cisco Enterprise Wireless Network (ENWLSD) v1.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for wireless engineers who work in the following roles: Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview After taking this course, you should be able to: Describe and implement a Cisco-recommended structured design methodology Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs) Describe and implement Cisco enhanced wireless features Describe and implement the wireless design process Describe and implement specific vertical designs Describe and implement site survey processes Describe and implement network validation processes The Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.1 course gives you the knowledge you need to design Cisco© wireless networks. The course covers design specifics from scenario design concepts through the installation phase and into post-deployment validation.This course, including the self-paced material, helps prepare you to take the exam, Designing Cisco Enterprise Wireless Networks (300-425 ENWLSD), which leads to to the new CCNP© Enterprise and Cisco Certified Specialist ? Enterprise Wireless Design certifications. Describing and Implementing a Structured Wireless Design Methodology Importance of Planning Wireless Design with a Structured Methodology Cisco Structured Design Model Cisco Design Guides and Cisco Validated Designs for Wireless Networks Role of the Project Manager When Designing Wireless Networks Describing and Implementing Industry Protocols and Standards Wireless Standards Bodies Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard and Amendments Wi-Fi Alliance (WFA) Certifications Relevant Internet Engineering Task Force (IETF) Wireless RFCs Practice Activity Describing and Implementing Cisco Enhanced Wireless Features Hardware and Software Choices for a Wireless Network Design Cisco Infrastructure Settings for Wireless Network Design Cisco Enhanced Wireless Features Examining Cisco Mobility and Roaming Mobility and Intercontroller Mobility in a Wireless Network Optimize Client Roaming in a Wireless Network Cisco Workgroup Bridge (WGB) and WGB Roaming in a Wireless Network Describing and Implementing the Wireless Design Process Overview of Wireless Design Process Meet with the Customer to Discuss the Wireless Network Design Customer Information Gathering for a Wireless Network Design Design the Wireless Network Deployment of the Wireless Network Validation and Final Adjustments of the Wireless Network Wireless Network Design Project Documents and Deliverables Describing and Implementing Specific Vertical Designs Designs for Wireless Applications Wireless Network Design Within the Campus Extend Wireless Networks to the Branch Sites Examining Special Considerations in Advanced Wireless Designs High-Density Designs in Wireless Networks Introducing Location and Cisco Connected Mobile Experiences (CMX) Concepts Design for Location FastLocate and HyperLocation Bridges and Mesh in a Wireless Network Design Redundancy and High Availability in a Wireless Network Describing and Implementing the Site Survey Processes Site Survey Types Special Arrangements Needed for Site Surveys Safety Aspects to be Considered During Site Surveys Site Survey Tools in Cisco Prime Infrastructure Third-Party Site Survey Software and Hardware Tools Describing and Implementing Wireless Network Validation Processes Post-installation Wireless Network Validation Making Post-installation Changes to a Wireless Network Wireless Network Handoff to the Customer Installation Report

Cisco Designing Cisco Enterprise Wireless Network (ENWLSD) v1.1
Delivered OnlineFlexible Dates
Price on Enquiry