Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who want to use more advanced functionalities in Microsoft Word, including image manipulation, collaboration and revision tracking, cross- referencing and linking, document security, forms, and process automation through macros. Overview In this course, you will explore advanced functionalities in Word. You will: Use images in a document. Create custom graphic elements. Collaborate on documents. Add reference marks and notes. Secure a document. Create and manipulate forms. Create macros to automate tasks. Word for Microsoft 365 enables you to do far more than simple word processing. Word includes advanced image manipulation tools, collaboration features, cross-referencing and linking tools, entry forms and data collection, security features, and tools to automate document production.Being able to manipulate graphics and efficiently create, manage, revise, and distribute long documents and forms can help your organization create important and interesting documents. Implementing time-saving features that enable you to work well in a collaborative mode will benefit both you and your organization. Constructing document elements that ensure your readers have access to pertinent information at the click of a button, while at the same time protecting sensitive information, is another important skill. Mastering these skills and techniques will make you a valued employee in your organization.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will alsoenable you to access and effectively utilize many web-based resources provided with your Microsoft 365? subscription. Helpful notes throughout the material alert you to caseswhere the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for theMicrosoft Word (Microsoft 365 Apps and Office 2019): Exam MO-100 and Microsoft Word Expert (Microsoft 365 Apps and Office 2019): Exam MO-101 certification exams. Lesson 1: Manipulating Images Topic A: Integrate Pictures and Text Topic B: Adjust Image Appearance Lesson 2: Using Custom Graphic Elements Topic A: Create Text Boxes and Pull Quotes Topic B: Add WordArt and Other Text Effects Topic C: Draw Shapes Topic D: Create Complex Illustrations with SmartArt Lesson 3: Collaborating on Documents Topic A: Share and Co-Author a Document Topic B: Mark Up a Document Topic C: Review Markups Topic D: Merge Changes from Other Documents Lesson 4: Adding Document References and Links Topic A: Add Captions Topic B: Add Cross-References Topic C: Add Bookmarks Topic D: Add Links Topic E: Insert Footnotes and Endnotes Topic F: Add Citations and a Bibliography Lesson 5: Securing a Document Topic A: Suppress Information Topic B: Set Formatting and Editing Restrictions Topic C: Restrict Document Access Topic D: Add a Digital Signature to a Document Lesson 6: Using Forms to Manage Content Topic A: Create Forms Topic B: Modify Forms Lesson 7: Automating Repetitive Tasks with Macros Topic A: Automate Tasks by Using Macros Topic B: Create a Macro Additional course details: Nexus Humans Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX-T Data Center Explain the features and benefits of NSX-T Data Center Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠and KVM hosts to participate in NSX-T Data Center networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX-T Data Center Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T? Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.2 release, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and NSX-T Data Center Introduce the VMware Virtual Cloud Network vision Discuss NSX-T Data Center solutions, use cases, and benefits Explain NSX-T Data Center architecture and components Describe the VMware NSXTM product portfolio and features Explain the management, control, data, and consumption planes and function Preparing the NSX-T Data Center Infrastructure Describe NSX Management Cluster Deploy VMware NSXTM ManagerTM nodes on VMware ESXi and KVM hypervisors Navigate through the NSX Manager UI Explain data-plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and establish the data center infrastructure Verify transport node status and connectivity NSX-T Data Center Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the GENEVE encapsulation Configure logical segments and attach hosts using NSX Manager UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX-T Data Center Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 Gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 Gateways Examine the single-tier and multitier packet flow Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on Tier-0 Gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX-T Data Center Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX-T Data Center Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX-T Data Center Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy the NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of NSX Intelligence Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX-T Data Center Services Describe NSX-T Data Center services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX Manager UI NSX-T Data Center User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX-T Data Center Integrate VMware Identity Manager with NSX-T Data Center Integrate LDAP with NSX-T Data Center Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access NSX-T Data Center Federation Introduce the NSX-T Data Center Federation key concepts, terminology, and use-cases. Explain the onboarding process of NSX-T Data Center Federation Describe the NSX-T Data Center Federation switching and routing functions. Describe the NSX-T Data Center Federation security concepts.
Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats
Duration 5 Days 30 CPD hours This course is intended for Network EngineersSystems EngineersNetwork OperatorsNetwork Administrators Overview Upon completion of this course, students will be able to:Successfully configure and deploy ClearPass for policy management, AAA, network access control and reporting.Using the ClearPass GUI, you should become familiar with how to setup authentication services, add users and devices and perform administration tasks. The ClearPass Essentials course provides you with a foundation in Network Access Control using ClearPass product portfolio. This course covers in depth configuration of ClearPass policy manager with a focus on Enforcement and Device Profiling. Intro to ClearPassClearPass for AAAExternal AuthenticationGuestOnboardEndpoint AnalysisPostureOperations & Admin UsersClustering & RedundancyLicensingClearPass ExchangeFinal Case Study
Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Use the native tools available in NSX-T Data Center to identify and troubleshoot the problems related to the NSX-T Data Center environment Use VMware vRealize Log Insight⢠and VMware vRealize Network Insight⢠to identify and troubleshoot the problems related to the NSX-T Data Center environment Explain the NSX-T Data Center infrastructure components and the communications between them Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX-T Data Center Identify, analyze, and troubleshoot problems related to infrastructure preparation in NSX-T Data Center Identify, analyze, and troubleshoot problems related to logical switching and logical routing in NSX-T Data Center Identify, analyze, and troubleshoot network security problems related to the NSX-T Data Center Distributed and Gateway firewalls Identify, analyze, and troubleshoot problems related to VPN and the VMware NSX Advanced Load Balancer⢠Identify the components and packet flows involved in the NSX-T Data Center datapath and troubleshoot related problems This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX-T? Data Center environment. In this course, you are introduced to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your NSX-T Data Center environment.In addition, you are presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. Course Introduction Introduction and course logistics Course objectives NSX-T Data Center Operations and Tools Explain and validate the native troubleshooting tools (dashboards, Traceflow, live traffic analysis, port mirroring) for the NSX-T Data Center environment Configure syslog, IPFIX, and log collections for the NSX-T Data Center environment Integrate NSX-T Data Center with vRealize Log Insight and vRealize Network Insight Validate and review the API methods available to configure the NSX-T Data Center environment Troubleshooting the NSX Management Cluster Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Troubleshooting Infrastructure Preparation Describe the data plane architecture, components, and communication channels Explain and troubleshoot VMware ESXi? transport node preparation issues Explain and troubleshoot KVM transport node preparation issues Explain and troubleshoot VMware NSX© Edge? transport node preparation issue Troubleshooting Logical Switching Describe the architecture of logical switching List the modules and processes involved in configuring logical switching Explain the importance of N-VDS and VDS in transport nodes Describe the procedure to migrate from N-VDS to VDS Review the architecture and workflows involved in attaching workloads to segments Identify and troubleshoot common logical switching issues Troubleshooting Logical Routing Review the architecture of logical routing and NSX Edge nodes Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways Explain the high availability modes and validate logical router placements Identify and troubleshoot common logical routing issues using both BGP and OSPF Troubleshooting Security Review the architecture of the Distributed Firewall Explain the workflows involved in configuring the Distributed Firewall Review the architecture of the Gateway Firewall Explain the workflows involved in configuring the Gateway Firewall Identify and troubleshoot common distributed firewall and Gateway Firewall issues Troubleshooting the NSX Advanced Load Balancer and VPN Services Review the NSX Advanced Load Balancer architecture and components Identify and troubleshoot common NSX Advanced Load Balancer issues Review of IPsec and L2 VPN architecture and components Identify and troubleshoot common IPsec and L2 VPN issues Datapath Walkthrough Verify and validate the path of the packet on the NSX datapath (East-West and South-North) Identify and perform packet captures at various points in the datapath Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath
Duration 2 Days 12 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for vRealize Suite Lifecycle Manager Describe the architecture of vRealize Suite Lifecycle Manager Deploy and configure vRealize Suite Lifecycle Manager Create, manage, and scale vRealize Suite Lifecycle Manager environments Add VMware vRealize Suite products to vRealize Suite Lifecycle Manager Manage vRealize Suite products with vRealize Suite Lifecycle Manager Use vRealize Suite Lifecycle Manager to perform content lifecycle management Troubleshoot day-to-day operations of vRealize Suite Lifecycle Manager This two-day course features hands-on training that focuses on installing, configuring, and managing VMware vRealize© Suite Lifecycle Manager?, which includes products such as VMware vRealize© Operations?, VMware vRealize© Log Insight?, and VMware vRealize© Automation?. This course prepares you to administer a vRealize infrastructure for an organization. Course Introduction Introductions and course logistics Course objectives Introduction to Lifecycle Manager Describe the use cases for Lifecycle Manager List the features of Lifecycle Manager List system requirements for Lifecycle Manager Use vRealize Easy Installer to deploy Lifecycle Manager Verify that a Lifecycle Manager deployment is successful Lifecycle Manager Configuration Create SSL certificates for vRealize Suite product instances Import custom SSL certificates Add Lifecycle Manager infrastructure elements Create a Lifecycle Manager private cloud environment Add vRealize Suite product Installation media Adding vRealize Suite Applications Deploy a new vRealize Suite product Manage a vRealize Suite product using Lifecycle Manager Add an existing vRealize Suite product to an environment Day 2 Operations Perform On-going Management Tasks Monitor environment health Ensure product configuration compliance Scale-out VMware Identity Manager? Replace an existing certificate with a new one Manage SDDC content Perform source control Describe content pipelines Describe check-in and multi check-in feature Use content from Marketplace Lifecycle Manager Migration List the migration options available for Lifecycle Manager Migrate Lifecycle Manager using vRealize Easy Installer Troubleshooting Lifecycle Manager Access log files in Lifecycle Manager Configure the vRealize Log Insight Agent Use tools and log data to troubleshoot common problems
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers. System and technical support engineers. Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. Understand underlying Cisco Unified CCE processes, messaging and fault tolerance schemes. Install, upgrade and make basic configurations in Cisco Unified Communications Manager. Install, create databases, integrate, and upgrade all ICM components to include the ICM Router, Logger, Administration & Data Server, Peripheral Gateways, CTI Gateway and Cisco Finesse. Install, integrate, configure, and upgrade Cisco Unified CVP components to include the CVP Call Server, Voice XML Server, Media Server, Reporting Server and Cisco VVB. Install, upgrade, and make configurations for Cisco Unified Intelligence Center and Cisco Outbound Option Agent- and IVR-based campaigns. This course will provide the student with the underlying knowledge to understand deployment design solutions, requirements for deployment, and how to install and configure all major Cisco Unified CCE components. As a part of deployment activities, the student will understand how to install and integrate Intelligent Contact Manager (ICM) with Active Directory, how to install and integrate Cisco Unified CVP components using an IOS-based voice browser and Cisco Virtualized Voice Browser (Cisco VVB), how to install and integrate Cisco Finesse, how to install and integrate Cisco Unified Intelligence Center with Active Directory and associated Data Sources for reporting purposes, and how to install and configure Agent- and IVR-based Outbound Option dialing campaigns. And finally, the student will learn how to setup and use troubleshooting tools including RTMT, System CLI, Diagnostic Framework, and ICM command-line utilities to find status information and log files, and to track a call from the point of entry to the agent desktop. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Cisco Unified CCE Protocols, Processes and Services Lesson 1: Cisco Unified CM Lesson 2: Cisco Unified CCE/Intelligent Contact Manager Lesson 3: Cisco Unified CVP Installing Cisco Unified Communications Manager Lesson 1: Installation Prerequisites Lesson 2: Cisco Unified CM Installation Lesson 3: Post-installation Configurations Lesson 4: Creating Basic Infrastructure Lesson 5: Upgrading Cisco Unified CM Installing Intelligent Contact Manager Lesson 1: Installation Requirements Lesson 2: Pre-installation Tasks Lesson 3: Install the Main Installer Lesson 4: Install the Central Controller ?Lesson 5: Install the Administration and Data Server Lesson 6: Install the Peripheral Gateway Lesson 7: Install CTI Services Installing Cisco Unified CVP Lesson 1: Installation Prerequisites Lesson 2: Install the CVP Server Lesson 3: Configure Cisco Unified CVP Components Lesson 4: Upgrading Cisco Unified CVP Upgrade Path Installing and Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Cisco Unified Intelligence Center Supporting Cisco Unified CCE Lesson 1: Maintenance Activities Lesson 2: UCCE Troubleshooting Tools
Duration 3 Days 18 CPD hours This course is intended for Authors Overview Please refer to course overview This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting The Welcome page Consume report content Interactive filtering Working with reports Dimensionally modeled relational dataUse personal data sources and data modules Upload personal data Upload custom images Using navigation paths in a data module Examine list reports Group data Format columns Include headers and footers Aggregate fact data Identify differences in aggregation Multiple facts and repeated information Use shared dimensions to create multi-fact queries Present repeated information Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Work with crosstab data Format, sort, and aggregate a crosstab Create discontinuous crosstab reportsCreate visualization reports Visualization categories Customize visualizations Client side visualizations Enhanced map visualizations Focus reports using filters Create filters to narrow the focus Use advanced detail filters Apply a filter with aggregation Use summary filters Focus reports using prompts Examine parameters and prompts Create a parameter for a report item Add a prompt page Add a prompt item to a report Identify a prompt type Create a cascading prompt Use calculations What are calculations Add Date and Time functions Add string functions Display prompt selections in report titles Customize reports with conditional formatting Three steps for conditional formatting Create a variable Assign the variable to a report object Format based on the conditional value Conditionally render report objects Drill-through definitions Navigate to related data Enhance report layout View the structure of a report Use Guided report layout Force page breaks Create horizontal pagination Modify the report structure Format objects across reports Use additional report-building techniques Enhance a report design Add objects to reports Convert a list to a crosstab Explore reuse Additional course details: Nexus Humans B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System administrators System engineers Consultants Overview By the end of the course, you should be able to meet the following objectives: Identify the features and benefits of VMware Aria Operations for Logs Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements Describe the VMware Aria Operations for Logs architecture and use cases Deploy and configure a VMware Aria Operations for Logs cluster Use the Explore Logs page to get a deep understanding of log data Create and manage queries Manage VMware Aria Operations for Logs agents and agent Groups Create custom dashboards Explain how to use the VMware Aria Operations for Logs widgets Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions Discuss VMware Aria Operations for Logs (SaaS) This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations? for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Logs Describe the VMware Aria cloud management platform Describe the VMware Aria? use cases Describe the key capabilities of VMware Aria Operations for Logs Describe the requirements for a log analytics solution Explain the importance of efficient log management Navigate the VMware Aria Operations for Logs UI Describe the various stages of log processing VMware Aria Operations for Logs Architecture and Deployment Identify the minimum requirements for deploying VMware Aria Operations for Logs Explain how to use the VMware Aria Operations for Logs sizing calculator Describe VMware Aria Operations for Logs compatibility with other VMware products Describe the VMware Aria Operations for Logs architecture Explain how to install the VMware Aria Operations for Logs virtual appliance Analyzing Logs Describe the primary functions of the VMware Aria Operations for Logs UI Describe log events Use Explore Logs for understanding and analyzing the log data VMware Using Dashboards Alerts and Reports Create VMware Aria Operations for Logs custom dashboards Describe how to use the VMware Aria Operations for Logs widgets Configure alerts Explain how to view and manage reports Administering VMware Aria Operations for Logs Describe user access control in VMware Aria Operations for Logs Describe user management Configure VMware Aria Operations for Logs settings Managing Data Sources and Content packs Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Install and manage content packs Manage certificates Install and manage agents for VMware Aria Operations for Logs Describe the VMware Aria Operations for Logs Importer VMware Aria Operations for Logs Integrations Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of integrating VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of using the vSAN content pack Explain how to configure the NSX content pack VMware Aria Operations for Logs (SaaS) Explain the VMware Aria Operations for Logs (SaaS) architecture Describe the ingestion options for Aria Operations for Logs (SaaS) Discuss integration with on-premises Aria Operations for Logs