• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

30225 TEC courses

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Acobat Pro DC - Advanced

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The target students for this course are office professionals with a foundational understanding of Adobe Acrobat Pro DC who want to use the advanced productivity features and the creative features of Acrobat Pro DC. Overview In this course you will create and manage PDF documents.Students will: ?Customize the Acrobat Pro DC workspace.?Create PDFs from technical documents.?Enhance PDF documents.?Create interactive PDF forms.?Finalize PDF files for commercial printing. In this course, students will use Adobe Acrobat Pro DC to convert technical documents to PDF files, enhance PDF documents, create interactive PDF forms, and prepare PDF files for commercial printing. Customizing the Acrobat Pro DC Workspace Customize the Toolbars Create Custom Tool Sets Creating PDFs from Technical Documents Create PDF Documents by Using Autodesk AutoCAD Measure Technical Drawings Create PDF Documents by Using Autodesk AutoCAD Embed Multimedia Enhance PDF Document Accessibility Use Actions Manage the Security of PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Export a PDF Document to Other Formats

Adobe Acobat Pro DC - Advanced
Delivered OnlineFlexible Dates
Price on Enquiry

BOW320 SAP BusinessObjects Web Intelligence - Advanced Report Design

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Analysts, and Business Process Owner/Team Lead/Power Users. Overview Create complex Web Intelligence documents using advanced query and reporting techniques, including:Combined queries and sub-queriesCharacter and date string functionsVariables and calculation contextsLink documents using hyperlinks In this course, students will gain the comprehensive skills and in-depth knowledge needed to apply alternative query and reporting techniques when creating complex Web Intelligence documents. Web Intelligence Core Report Design Reviewing Core Report Design Concepts Comparing the Differences between Java Report Panel (JRP) and WebI Rich Client (WRC) Multiple Data Sources Synchronizing Data from Multiple Data Sources Creating Multiple Queries in a Document Synchronizing Data with Merged Dimensions Interacting with Other Data Providers Advanced Query Techniques Implementing Combined Queries Implementing Subqueries Creating a Query Based on Another Query Changing Data Sources Calculation Contexts Describing Calculation Contexts Redefining Calculation Contexts Implementing Extended Syntax Operators Implementing Extended Syntax Keywords Defining Calculation Context Formulas with Character and Date String Functions Creating Formulas with Character and Date String Functions Implementing the Right() Function Implementing the Replace() Function Implementing the SubStr() Function Implementing the Pos() Function Concatenating Character Strings Implementing Date Functions If Logic Executing If() to Group Data Executing the If() Function to Modify Calculation Behavior Hyperlinks in Web Intelligence Documents Managing Hyperlinks in Web Intelligence Documents Managing Hyperlinks in Web Intelligence Desktop and the Rich Internet Application Panel Managing Hyperlinks in the Web Intelligence Interactive Panel Additional Reporting Techniques Implementing Data Tracking Implementing Additional Report Functions

BOW320 SAP BusinessObjects Web Intelligence - Advanced Report Design
Delivered OnlineFlexible Dates
Price on Enquiry

Strategic Negotiation Skills

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals involved in internal and/or external negotiations will benefit from this course. Overview Develop the necessary skills to negotiate like a pro Prepare for a negotiation applying best practices Utilize industry-standard tools and techniques Create your Best Alternative to a Negotiated Agreement (BATNA) Build common ground and consensus in your negotiation strategies Negotiate with experts to develop your skills for success Students will learn the essential strategies and techniques needed to guide negotiations from opening discussions through to a positive result. Students will leave with practical solutions to negotiating effectively. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Negotiation Introduced Identifying Integrative and Distributive Negotiation Types Understanding the Three Phases of Negotiation Strengthening Negotiation Skills 2. Preparing for Your Negotiation Establishing Personal Boundaries Deciding on Your WATNA and BATNA and Negotiating Based on Them Preparing and Sticking to Your Plan Negotiation Strategies 3. Negotiation Process for Success Setting the Time and Place Avoiding Negative Environments Establishing Common Ground and Building Momentum Creating a Negotiation Framework, Agreeing on Issues, and Maintaining a Positive Framework Working through the Five Steps of Negotiation 4. Best Practices Starting Off on the Right Foot What to Share and What to Keep to Yourself Knowing What to Expect Utilizing the Top Ten Negotiation Techniques Managing an Impasse 5. Negotiation Tools & Techniques Reviewing the Three Ways to See Your Options Creating a Mutual Gain Solution Agreeing on Wants - Working with What You Want and What They Want 6. Consensus & Agreement Building Consensus Consolidating and Finalizing an Agreement Controlling Your Emotions and Dealing with Personal Attacks Walking Away When Necessary

Strategic Negotiation Skills
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)
Delivered OnlineFlexible Dates
Price on Enquiry

KM803 IBM Information Analyzer Essentials v11.5

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This basic course is for business data analysts who want to profile and assess data using Information Analyzer, also data quality analysts who need to measure data quality. Overview Analyze data structures to determine agreement with documented metadataDiscover data anomaliesIdentify invalid and incomplete data valuesDetermine potential primary keys to table structuresAdd business meaning to dataProduce deliverables that can be used by business users and ETL developersConfigure Information AnalyzerAdminister the Information Analyzer environmentUnderstand security considerations around data analysisUnderstand the methodology supporting data analysisUse Information Analyzer to analyze data content and structureUse Information Analyzer to construct data rules and utilize IBM-supplied data rule templates In this course, you will learn how to use the IBM InfoSphere suite to analyze data and report results to business users. Course Outline Information Analysis concepts Information Server overview Information Analyzer overview Information Analyzer Setup Column analysis Concepts Basic data profiling techniques in practice Data profiling techniques Primary key analysis Concepts Basic data profiling techniques in practice Foreign key and cross domain analysis Concepts Basic data profiling techniques in practice Baseline analysis Reporting and publishing Extending the meta data using Information Governance Catalog and Information Analyzer Data Rules and Metrics Additional course details: Nexus Humans KM803 IBM Information Analyzer Essentials v11.5 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM803 IBM Information Analyzer Essentials v11.5 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

KM803 IBM Information Analyzer Essentials v11.5
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database: Backup and Recovery Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Oracle Database Administrator Data Warehouse Administrator Support Engineer Technical Consultant Technical Administrator Overview The student benefits by gaining a deeper understanding of possibly the most important job of a DBA - backup and recovery. The concepts and architecture that support backup and recovery, along with implementation steps in various ways and situations, are presented in detail. Students gain knowledge of the Recovery Manager (RMAN) command-line interface for various backup, failure, restore, and recovery scenarios, including data duplication. The student begins by gaining a deeper understanding of possibly the most important job of a DBA - backup and recovery. The concepts and architecture that support backup and recovery, along with implementation in various ways and situations are covered in detail. Students gain knowledge of the Recovery Manager (RMAN) command-line interface for various backup, failure, restore, and recovery scenarios, including data duplication. Introduction and Configuration Introduction Getting Started Configuring for Recoverablility Using the RMAN Recovery Catalog Backup Backup Strategies and Terminology Performing Backups Improving Your Backups Using RMAN-Encrypted Backups Recovery Diagnosing Failures Restore and Recovery Concepts Performing Complete Recovery Performing Point-in-Time Recovery Performing Additional Recovery Operations Additional Technologies Using Flashback Technologies Using Flashback Database Transporting Data Duplicating a Database RMAN Troubleshooting and Tuning Hands-On Backup and Recovery Workshop Additional course details: Nexus Humans Oracle Database: Backup and Recovery Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database: Backup and Recovery Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database: Backup and Recovery Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

WS-013T00 Azure Stack HCI

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for IT professionals who manage on-premises Windows Server environments and want to use Azure to manage server workloads and run their virtual workloads on Windows Server 2019. They also want to use existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. Overview Describe the Azure Stack portfolio, including Azure Stack HCI, Azure Stack Hub, and Azure Stack Edge Describe the Azure Stack HCI core technologies and management tools. Describe the process of a typical Azure Stack HCI implementation. Identify Azure Stack HCI hybrid capabilities. Implement, manage, and maintain workloads on Azure Stack HCI. Plan for and implement Azure Stack HCI Storage, including Storage QoS and Storage Replica. Plan for Azure Stack HCI Networking. Implement Software Defined Networks in Azure Stack HCI. This three-day course WS-013T00-A is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products. The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles. Introducing Azure Stack HCI Overview of Azure Stack HCI Overview of Azure Stack HCI technologies Overview of Azure Stack HCI management tools Overview of the Azure Stack HCI hybrid capabilities Operating and maintaining Azure Stack HCI Implementing and managing workloads on Azure Stack HCI Maintaining Azure Stack HCI Planning for and implementing Azure Stack HCI storage Overview of Azure Stack HCI Storage core technologies Planning for Storage Spaces Direct in Azure Stack HCI Implementing a Storage Spaces Direct-based hyper-converged infrastructure Managing Storage Spaces Direct in Azure Stack HCI Planning for and implementing Storage QoS Planning for and implementing Storage Replica Planning for and implementing Azure Stack HCI networking Overview of Azure Stack HCI core networking technologies Overview of network virtualization and Software-Defined Networking Planning for and implementing Switch Embedded Teaming Planning for and implementing Datacenter Firewall Planning for and implementing Software Load Balancing Planning for and implementing RAS Gateways

WS-013T00 Azure Stack HCI
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Cyber Security Administrator (CCSA R80.10)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical professionals who support, install, deploy or administer Check Point Software Blades. Overview Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.Describe the key elements of Check Point?s unified Security Management Architecture.Recognize SmartConsole features, functions and tools.Understand Check Point deployment options.Describe the basic functions of Gaia.Describe the essential elements of a Security Policy.Understand how traffic inspection takes place in a unified Security Policy.Summarize how administration roles and permissions assist in managing policy.Recall how to implement backup techniques.Understand the Check Point policy layer concept.Recognize Check Point security solutions and products and how they work to protect your network.Understand licensing and contract requirements for Check Point security products.Identify tools designed to monitor data, determine threats and recognize performance improvements.Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.Understand Site-to-Site and Remote Access VPN deployments and communities.Understand how to analyze and interpret VPN traffic.Recognize how to define users and user groups.Understand how to manage user access for internal and external users.Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. Introduction to Check Point Technology Security Policy Management Policy Layers Check Point Security Solutions and Licensing Traffic Visibility Basic Concepts of VPNManaging User Access Working with ClusterXLAdministrator Task Implementation Additional course details: Nexus Humans Check Point Cyber Security Administrator (CCSA R80.10) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Check Point Cyber Security Administrator (CCSA R80.10) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Check Point Cyber Security Administrator (CCSA R80.10)
Delivered OnlineFlexible Dates
Price on Enquiry

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry