• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27791 TEC courses

Cisco Digital Learning Security

By Nexus Human

Duration 69 Days 414 CPD hours Cisco Learning Library: Security offers a subscription to all Cisco online cybersecurity and cyber operations training, including extensive sk This comprehensive technical training library offers full-length, interactive certification courses, product and technology training with labs, and thousands of reference materials. Security Library Certification Courses CCNP Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 CCIE Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing an Integrated Threat Defense Solution (SECUR201) v1.0 Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 Introducing Cisco Cloud Consumer Security (SECICC) v1.0 Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 Configuring Cisco ISE Essentials for SD-Access (ISESDA) v1.0 Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC)

Cisco Digital Learning Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe network architectures, devices, and software used by service providers Describe the various Internet governance organizations, their roles, and tools available for governance information verification Configure Cisco Internetwork Operating System (Cisco IOS) and Cisco IOS XE routers Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks Describe various access and core technologies used by service providers Describe various major switching technologies used by service providers Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN) Describe various major routing protocols used by service providers Configure Layer 3 services used by service providers Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage Describe usage of various services used and maintained by service providers Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software This course is designed to provide you with the foundational knowledge for the suite of Cisco© CCNP© Service Provider courses. The course expands what you learned from the Cisco CCNA© course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. Course Outline Introducing Service Provider Architectures Describing Internet Governance Organizations Configuring the Cisco IOS and Cisco IOS XE Router Configuring Cisco IOS XR Router Introducing Access and Core Technologies in the Service Provider Environment Introducing Routing Technologies in the Service Provider Environment Describing MPLS Implementing Layer 3 Services Introducing Switching Technologies in the Service Provider Environment Introducing Overlay Technologies Implementing Service Provider Services Introducing Programmability on Cisco IOS XR Routers Lab outline Review Lab Environment Examine Governance Data Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices Perform Initial Cisco IOS XR Configuration Configure and Verify Connectivity on Cisco IOS XR Configure Intermediate System to Intermediate System (IS-IS) Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng) Configure Basic Border Gateway Protocol (BGP) Configure MPLS Configure Internet Protocol Service Level Agreement (IP SLA) Configure Hot Standby Router Protocol (HSRP) with Object Tracking Configure Virtual Routing and Forwarding (VRFs) Configure Network Time Protocol (NTP) Use Linux Command Line Interface Configure IOS XR Using a Bash Script

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. Introduction to Prompt Engineering Understand the fundamentals of prompt engineering and its applications in the business world. What is prompt engineering? Importance of prompt engineering in business Key concepts and terminology Examples of prompt engineering in business scenarios Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, where they will experiment with different prompt engineering tools to answer a set of questions. Developing Effective Prompts Learn how to create and refine prompts for a variety of business applications. Anatomy of a good prompt Understanding context and user intent Techniques for prompt iteration and optimization Generating specific and creative responses Handling sensitive information and biases Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, game-like environment, where they will compete to create the most effective prompts for given business scenarios. Integrating Prompt Engineering into Business Processes Discover how to incorporate prompt engineering solutions into existing workflows. Identifying business processes that can benefit from prompt engineering Integrating prompt engineering with existing software and tools Evaluating the success and impact of prompt engineering solutions Ensuring data privacy and security Scaling prompt engineering solutions across an organization Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt engineering solution into a simulated business process, with a focus on creativity and practicality. Advanced Techniques and Best Practices Gain insights into advanced techniques and best practices for prompt engineering in a business context. Leveraging APIs for prompt engineering Customizing and fine-tuning language models Adapting to changing business requirements and trends Collaborating with cross-functional teams Staying up-to-date with prompt engineering advancements Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced techniques to solve complex business-related prompt engineering challenges. Additional course details: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

QuickStart to Prompt Engineering for Everyday Business Users  (TTAI2009)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Blockchain Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung richtet sich an Fachexperten für Geschäftsprozesse aller Branchen und IT-Experten, die die Blockchain beruflich als kryptographische Lösung oder als Smart Contract (Computerprotokoll zur Abwicklung von Verträgen) einsetzen oder einsetzen wollen. Overview Mit einem EXIN Blockchain Foundation-Zertifikat weisen Sie professionelle Kenntnisse in den folgenden Bereichen nach: Grundlagen der Blockchain-Technologie Blockchain-Herausforderungen Blockchain-Anwendungen Blockchain-Innovationen EXIN Blockchain Foundation ist eine Zertifizierung auf Basisniveau. Mit dem EXIN Blockchain Foundation-Zertifikat wird professionelle Kenntnisse nachgewiesen ber Blockchain als Transaktionsverzeichnis analog einem Hauptbuch (Ledger), wie das potenziell als weltweites, dezentralisiertes Register zur Aufzeichnung, Bestandsaufnahme und šbertragung von materiellen Werten, wie z. B. Finanzmitteln, Immobilien, Produkten, aber auch immateriellen Werten, wie Wahlstimmen, Software, Gesundheitsdaten und Ideen genutzt werden kann. Die Zertifizierung deckt die Grundbegriffe der Blockchain-Technologie, m'gliche Anwendungsbereiche, den potenziellen Wert fr die Organisation und die der Blockchain zugrundeliegende Technologie ab. Grundalgen der Blockchain Die Blockchain-Technologie Zus„tzliche Blockchain-Elemente Aufbau eines Blockchain-Netzwerks Blockchain-Herausforderungen Die Herausforderungen bei einer Blockchain Begrenzung des Blockchain-Risikos Blockchain-Anwendungen Anwendugsf„lle fr Blockchains Blockchain-Technologie fr Unternehmenswanwendungen Blockchain-Technologie fr gesellschaftliche Anwendungen Erweiterung von Blockchain-Anwendungen Blockchain und globale Wirtschaft Blockchain-Innovationen Innovationen in der Blockchain-Technologie Additional course details: Nexus Humans EXIN Blockchain Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EXIN Blockchain Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EXIN Blockchain Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies. Network administrators System engineers Project managers Network designers Overview After taking this course, you should be able to: Describe the main characteristics of routing protocols that are used in Service provider environments Implement advanced features of multiarea Open Shortest Path First (OSPFv2) running in Service Provider networks Implement advanced features of multilevel Intermediate System to Intermediate System (ISIS) running in Service Provider networks Configure route redistribution Configure Border Gateway Protocol (BGP) in order to successfully connect the Service Provider network to the customer or upstream Service Provider Configure BGP scalability in Service Provider networks Implement BGP security options Implement advanced features in order to improve convergence in BGP networks Troubleshoot OSPF, ISIS, and BGP Implement and verify MPLS Implement and troubleshoot MPLS traffic engineering Implement and verify segment routing technology within an interior gateway protocol Describe how traffic engineering is used in segment routing networks Implement IPv6 tunneling mechanisms Describe and compare core multicast concepts Implement and verifying the PIM-SM protocol Implement enhanced Protocol-Independent Multicast - Sparse Mode (PIM-SM) features Implement Multicast Source Discovery Protocol (MSDP) in the interdomain environment Implement mechanisms for dynamic Rendezvous Point (RP) distribution The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) 5-day course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks. This course prepares you for the 300-510 Implementing Cisco© Service Provider Advanced Routing Solutions (SPRI) exam. The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification. This course will help you: Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks Increase your knowledge and skills for implementing Service Provider core advanced technologies though hands-on application and practical instruction Prepare to take the 300-510 SPRI exam Course Outline Implementing and Verifying Open Shortest Path First Multiarea Networks Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language Implementing Route Redistribution Influencing Border Gateway Protocol Route Selection Scaling BGP in Service Provider Networks Securing BGP in Service Provider Networks Improving BGP Convergence and Implementing Advanced Operations Troubleshooting Routing Protocols Implementing and Verifying MPLS Implementing Cisco MPLS Traffic Engineering Implementing Segment Routing Describing Segment Routing Traffic Engineering (SR TE) Deploying IPv6 Tunneling Mechanisms Implementing IP Multicast Concepts and Technologies Implementing PIM-SM Protocol Implementing PIM-SM Enhancements Implementing Interdomain IP Multicast Implementing Distributed Rendezvous Point Solution in Multicast Network

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Digital Learning Data Center

By Nexus Human

Duration 62.5 Days 375 CPD hours Cisco Learning Library: Data Center offers a subscription to Cisco online data center training, including certifications, products, and technologies.This comprehensive technical training library offers full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials Data Center Library Certification Courses CCNP Data Center Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Designing Cisco Data Center Infrastructure (DCID) v7.0 Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 Implementing Cisco Application Centric Infrastructure (DCACI) v1.0 Configuring Cisco MDS 9000 Series Switches (DCMDS) Implementing Automation for Cisco Data Center Solutions (DCAUI) CCIE Data Center Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Understanding Cisco Data Center Foundations (DCFNDU) v1.0 Implementing Cisco Application Centric Infrastructure (DCACI) v1.0 Introducing Cisco NX-OS Switches and Fabrics in the Data Center (DCINX) v1.0 Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX) v1.0 Designing Cisco Data Center Infrastructure (DCID) v7.0 Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 Implementing Cisco Application Centric Infrastructure?Advanced (DCACIA) v1.0 Introducing Cisco Unified Computing System (DCIUCS) v1.0 Configuring Cisco Unified Computing System (DCCUCS) v1.0 Implementing Cisco Tetration Analytics (DCITET) v1.0 Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.0 Configuring Cisco Nexus 9000 in NX-OS Mode (C9KNX) v1.2 Configuring Cisco Nexus 9000 Series Switches in ACI Mode (DCAC9K) v3.0 Introducing Cisco Nexus 9000 Switches in NX-OS Mode (DCINX9K) v2.1 Configuring VXLANs on Cisco Nexus 9000 Series Switches (DCVX9K) v1.0 Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v4.1 Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.1 Introducing Cisco MDS 9000 Series Switches (DCIMDS) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Implementing Cisco HyperFlex (DCIHX) v1.2 Configuring the Cisco Nexus Data Center Transport (CCNDC-T) v2.0 Configuring the Cisco Nexus Data Center Virtual Machines (CCNDC-V) v2.0 Additional course details: Nexus Humans Cisco Digital Learning Data Center training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Digital Learning Data Center course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Digital Learning Data Center
Delivered OnlineFlexible Dates
Price on Enquiry

Big Data Architecture Workshop

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Senior Executives CIOs and CTOs Business Intelligence Executives Marketing Executives Data & Business Analytics Specialists Innovation Specialists & Entrepreneurs Academics, and other people interested in Big Data Overview More specifically, BDAW addresses advanced big data architecture topics, including, data formats, transformation, real-time, batch and machine learning processing, scalability, fault tolerance, security and privacy, minimizing the risk of an unsound architecture and technology selection. Big Data Architecture Workshop (BDAW) is a learning event that addresses advanced big data architecture topics. BDAW brings together technical contributors into a group setting to design and architect solutions to a challenging business problem. The workshop addresses big data architecture problems in general, and then applies them to the design of a challenging system. Throughout the highly interactive workshop, students apply concepts to real-world examples resulting in detailed synergistic discussions. The workshop is conducive for students to learn techniques for architecting big data systems, not only from Cloudera?s experience but also from the experiences of fellow students. Workshop Application Use Cases Oz Metropolitan Architectural questions Team activity: Analyze Metroz Application Use Cases Application Vertical Slice Definition Minimizing risk of an unsound architecture Selecting a vertical slice Team activity: Identify an initial vertical slice for Metroz Application Processing Real time, near real time processing Batch processing Data access patterns Delivery and processing guarantees Machine Learning pipelines Team activity: identify delivery and processing patterns in Metroz, characterize response time requirements, identify Machine Learning pipelines Application Data Three V?s of Big Data Data Lifecycle Data Formats Transforming Data Team activity: Metroz Data Requirements Scalable Applications Scale up, scale out, scale to X Determining if an application will scale Poll: scalable airport terminal designs Hadoop and Spark Scalability Team activity: Scaling Metroz Fault Tolerant Distributed Systems Principles Transparency Hardware vs. Software redundancy Tolerating disasters Stateless functional fault tolerance Stateful fault tolerance Replication and group consistency Fault tolerance in Spark and Map Reduce Application tolerance for failures Team activity: Identify Metroz component failures and requirements Security and Privacy Principles Privacy Threats Technologies Team activity: identify threats and security mechanisms in Metroz Deployment Cluster sizing and evolution On-premise vs. Cloud Edge computing Team activity: select deployment for Metroz Technology Selection HDFS HBase Kudu Relational Database Management Systems Map Reduce Spark, including streaming, SparkSQL and SparkML Hive Impala Cloudera Search Data Sets and Formats Team activity: technologies relevant to Metroz Software Architecture Architecture artifacts One platform or multiple, lambda architecture Team activity: produce high level architecture, selected technologies, revisit vertical slice Vertical Slice demonstration Additional course details: Nexus Humans Big Data Architecture Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Big Data Architecture Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Big Data Architecture Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Practice

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Business Analysis principles and techniques. Key areas are: The breath of the role of a Business Analyst The processes and techniques of strategy analysis Investigation of an organization's business systems Techniques used within stakeholder analysis and the need for analyzing perspectives Conceptual modelling and business activity models Business improvements through gap analysis The Business case within the business change lifecycle The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The course provides in-depth knowledge and practice in Business Analysis Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Practice Exam Details Business Analysis Certification Scheme Rationale for Business Analysis The role of the BA throughout the stages of the Business change lifecycle The scope of the BA role within the context of the range of analysis activities Three areas of competencies Understanding the Strategic Context Techniques in practice: MOST Resource audit PESTLE Porter's Five Forces SWOT analysis CSF, KPI and Performance target Balanced Business Score Card Understanding the Current Situation Identification of stakeholder categories Identification of relevant investigation techniques The rationale for taking a holistic view Rich pictures, Mind Maps and Fishbone diagrams Stakeholder Analysis and Management Power/interest and level of interest Appropriate stakeholder management strategy Stakeholder perspectives and CATWOE technique Analysing and Modelling Business Activities Conceptual models of a business situation Five types of high level activity Planning activities Enabling activities Doing activities Monitoring and control activities Three types of business events The consensus business activity model Identifying Potential Solutions Different categories of business rules Gap analysis (through conceptual business activity model and as-is business situation) Components of a new business model Building the Business Case Rationale for the development of a business case Contents of a business case Identification of tangible/intangible costs and benefits, risks and impacts Rationale for the financial case and appraisal techniques Business case review in the business change lifecycle Additional course details: Nexus Humans Business Analysis - Practice training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Practice course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Practice
Delivered OnlineFlexible Dates
Price on Enquiry