Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 3 Days 18 CPD hours This course is intended for Report Authors Overview What is IBM Cognos Analytics ? Reporting Examine dimensionally modelled and dimensional data sources Examine personal data sources and data modules Examine List reports Aggregate measure/fact data Use shared dimensions to create multi-fact queries Add repeated information to reports Create crosstab reports Create complex crosstab reports Format, sort, and aggregate data in a crosstab report Create discontinuous crosstab reports Create Visualization reports Add business logic to reports using IBM Cognos Analytics ? Reporting Focus reports using filters Focus reports using prompts Augment reports using calculations Extend report functionality in IBM Cognos Analytics - Reporting Customize reports with conditional formatting Conditionally format one crosstab measure based on another Drill-through definitions Enhance the report layout Use additional report building techniques This offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting? Create a simple list report Create a report from a dimensionally modeled relational data source Examine personal data sources and data modules Upload personal data Upload custom images Use navigation paths Create a report from a personal data source Examine list reports Group data in a list Format columns in a list Include headers and footers in a list Enhance a list report Aggregate measure/fact data Identify differences in aggregation Explore data aggregation Use shared dimensions to create multi-fact queries Create a multi-fact query in a list report Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create a simple crosstab report Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Create a complex crosstab report Format, sort, and aggregate data in a crosstab Sort, format, and aggregate a crosstab report Create discontinuous crosstab reports Present unrelated items using a discontinuous crosstab Create a visualization report Create and format a visualization report Create a report that uses a Map visualization Show the same data graphically and numerically Focus reports using filters Apply filters to a report Apply a detail filter on fact data in a report Apply a summary filter to a report Focus reports using prompts Create a prompt by adding a parameter Add a value prompt to a report Add a Select & search prompt to a report Create a cascading prompt Augment reports using calculations Add calculations to a report Display prompt selections in the report title Customize reports with conditional formatting Create a multilingual report Highlight exceptional data and conditionally render a column Drill-through definitions Let users navigate to related data in IBM Cognos Analytics Enhance report layout Create a report structured on data items Create a condensed list report Use additional report building techniques Section a report and reuse objects within the same report Reuse layout components in a different report Explore options for reports that contain no data Additional course details: Nexus Humans B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6158 IBM Cognos Analytics - Author Reports Fundamentals (v11.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After taking this course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Cisco Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and Domain Name System (DNS) policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Describe how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the Software as a Service (SaaS) application with Cisco SD-WAN Cloud OnRamp Describe and deploy Cloud OnRamp for multi-cloud, including interconnect and colocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.0 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application-aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and Transport Layer Security (TLS) or Secure Socket Layer (SSL) decryption. You will also learn about cloud integration with multiple cloud service providers across multiple use cases. Additionally, the course labs will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. The course lab environment is built using Cisco Catalyst 8000v IOS XE routers and Cisco SD-WAN 20.7 code, and it includes the integration of Cisco FirePOWER Threat Defense for network security and Cisco ThousandEyes for network monitoring. The course will allow you to earn 24 Continuing Education (CE) credits toward recertification. Course Outline Introducing Cisco SD-WAN Security Deploying On-Premises Threat Prevention Examining Content Filtering Exploring Cisco SD-WAN Dedicated Security Options Examining Cisco SASE Exploring Cisco Umbrella SIG Securing Cloud Applications with Cisco Umbrella SIG Exploring Cisco SD-Wan ThousandEyes Optimizing SaaS Applications Connecting Cisco SD-WAN to Public Cloud Examining Cloud Interconnect Solutions Exploring Cisco Cloud OnRamp for Colocation Monitoring Cisco SD-WAN Cloud and Security Solutions Additional course details: Nexus Humans Cisco SD-WAN Security and Cloud Onboarding v1.0 (SDWSCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Security and Cloud Onboarding v1.0 (SDWSCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers. System and technical support engineers. Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. Understand underlying Cisco Unified CCE processes, messaging and fault tolerance schemes. Install, upgrade and make basic configurations in Cisco Unified Communications Manager. Install, create databases, integrate, and upgrade all ICM components to include the ICM Router, Logger, Administration & Data Server, Peripheral Gateways, CTI Gateway and Cisco Finesse. Install, integrate, configure, and upgrade Cisco Unified CVP components to include the CVP Call Server, Voice XML Server, Media Server, Reporting Server and Cisco VVB. Install, upgrade, and make configurations for Cisco Unified Intelligence Center and Cisco Outbound Option Agent- and IVR-based campaigns. This course will provide the student with the underlying knowledge to understand deployment design solutions, requirements for deployment, and how to install and configure all major Cisco Unified CCE components. As a part of deployment activities, the student will understand how to install and integrate Intelligent Contact Manager (ICM) with Active Directory, how to install and integrate Cisco Unified CVP components using an IOS-based voice browser and Cisco Virtualized Voice Browser (Cisco VVB), how to install and integrate Cisco Finesse, how to install and integrate Cisco Unified Intelligence Center with Active Directory and associated Data Sources for reporting purposes, and how to install and configure Agent- and IVR-based Outbound Option dialing campaigns. And finally, the student will learn how to setup and use troubleshooting tools including RTMT, System CLI, Diagnostic Framework, and ICM command-line utilities to find status information and log files, and to track a call from the point of entry to the agent desktop. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Cisco Unified CCE Protocols, Processes and Services Lesson 1: Cisco Unified CM Lesson 2: Cisco Unified CCE/Intelligent Contact Manager Lesson 3: Cisco Unified CVP Installing Cisco Unified Communications Manager Lesson 1: Installation Prerequisites Lesson 2: Cisco Unified CM Installation Lesson 3: Post-installation Configurations Lesson 4: Creating Basic Infrastructure Lesson 5: Upgrading Cisco Unified CM Installing Intelligent Contact Manager Lesson 1: Installation Requirements Lesson 2: Pre-installation Tasks Lesson 3: Install the Main Installer Lesson 4: Install the Central Controller ?Lesson 5: Install the Administration and Data Server Lesson 6: Install the Peripheral Gateway Lesson 7: Install CTI Services Installing Cisco Unified CVP Lesson 1: Installation Prerequisites Lesson 2: Install the CVP Server Lesson 3: Configure Cisco Unified CVP Components Lesson 4: Upgrading Cisco Unified CVP Upgrade Path Installing and Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Cisco Unified Intelligence Center Supporting Cisco Unified CCE Lesson 1: Maintenance Activities Lesson 2: UCCE Troubleshooting Tools
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After completing the course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and DNS policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Discover how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics. The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.1 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and TLS or SSL decryption. You will also learn about cloud integration with multiple cloud services providers and multiple use-cases. Additionally, the lab will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. Course Outline Introducing Cisco SD-WAN Security Deploying On-Premises Threat Prevention Examining Content Filtering Exploring Cisco SD-WAN Dedicated Security Options Examining Cisco SASE Exploring Cisco Umbrella SIG Securing Cloud Applications with Cisco Umbrella SIG Exploring Cisco SD-Wan ThousandEyes Optimizing SaaS Applications Connecting Cisco SD-WAN to Public Cloud Examining Cloud Interconnect Solutions Exploring Cisco Cloud OnRamp for Colocation Monitoring Cisco SD-WAN Cloud and Security Solutions
Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switches deployed in a Cisco StackWise Virtual environment and an SD-Access fabric. Describe the new Cisco IOS XE software management, patchability, and Graceful Insertion and Removal (GIR) features on the Cisco Catalyst 9000 Series Switches. Describe the ThousandEyes Enterprise Agent using the Docker environment on the Cisco Catalyst 9000 Series switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe the Cisco Catalyst 9000 Series support for cloud hosting and connectivity, along with automation features. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. The Implementing Cisco Catalyst 9000 Switches (ENC9K) v3.0 course introduces you to the architecture, capabilities, and implementation of the Cisco© Catalyst© 9000 switching platform. This hands-on course covers many features of this Cisco IOS© XE platform and describes how to manage devices from a single dashboard called Cisco DNA Center?. You will learn how to use the Cisco Catalyst 9000 family of switches to enable Software Defined Access (SD-Access) and provide end-to-end security and automation with centralized management using Cisco DNA Center. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Positioning Cisco Catalyst 9000 Series Switches Examining the Cisco Catalyst 9000 Series Switches Management Capabilities Describing New Features on Cisco Catalyst 9000 Series Switches Describing Scale and Performance Features on Cisco Catalyst 9000 Series Switches Describing Security, QoS, and IoT Convergence Features on Cisco Catalyst 9000 Series Switches Describing Cloud and Automation Features on Cisco Catalyst 9000 Series Switches Describing Cisco SD-Access Solution and Cisco Catalyst 9000 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who have a foundational working knowledge of PowerPoint, who wish to take advantage of the application's higher-level usability, security, collaboration, and distribution functionality. Overview In this course, you will use the advanced tools and features in PowerPoint to create and deliver engaging presentations.You will: Customize design templates. Add tables. Add charts. Work with media. Build advanced transitions and animations. Collaborate on a presentation. Customize the delivery of a presentation. Modify presentation navigation. Secure and distribute a presentation. Meetings, instruction, training, pitches; these are all a part of our daily lives. We are often called upon to deliver presentations with little notice, at multiple venues, and with varying requirements. And, some of these presentations include sensitive information that needs to be guarded. Given all the variables, it may seem an overwhelming task to deliver your content, on time, to all audiences, and to only those who need to see it. Oh, and by the way, you need to make it interesting, informative, and memorable. So, how do you do it? Without the help of a robust set of tools, it would be nearly impossible. But Microsoft© PowerPoint© provides you with a variety of such tools that can help you deliver content in nearly any situation, while saving time and effort. By taking advantage of these tools, you will be creating presentations that not only stand out from the crowd, but also don't consume all of your available time. Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will also enable you to access and effectively utilize many web-based resources provided with your Microsoft 365? subscription. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version. This course may be a useful component in your preparation for the PowerPoint Associate (Microsoft 365 Apps and Office 2019): Exam MO-300 certification exam. Lesson 1: Customizing Design Templates Topic A: Modify Slide Masters and Slide Layouts Topic B: Modify the Notes Master and the Handout Master Topic C: Add Headers and Footers Lesson 2: Adding Tables Topic A: Create a Table Topic B: Format a Table Topic C: Insert a Table from Other Office Applications Lesson 3: Adding Charts Topic A: Create a Chart Topic B: Format a Chart Topic C: Insert a Chart from Microsoft Excel Lesson 4: Working with Media Topic A: Add Audio to a Presentation Topic B: Add Video to a Presentation Topic C: Add a Screen Recording Lesson 5: Building Advanced Transitions and Animations Topic A: Use the Morph Transition Topic B: Customize Animations Lesson 6: Collaborating on a Presentation Topic A: Review a Presentation Topic B: Co-author a Presentation Lesson 7: Customizing Presentation Delivery Topic A: Enhance a Live Presentation Topic B: Record a Presentation Topic C: Set Up a Slide Show Lesson 8: Modifying Presentation Navigation Topic A: Divide a Presentation into Sections Topic B: Add Links Topic C: Create a Custom Slide Show Lesson 9: Securing and Distributing a Presentation Topic A: Secure a Presentation Topic B: Create a Video or a CD
Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system
Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe network architectures, devices, and software used by service providers Describe the various Internet governance organizations, their roles, and tools available for governance information verification Configure Cisco Internetwork Operating System (Cisco IOS) and Cisco IOS XE routers Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks Describe various access and core technologies used by service providers Describe various major switching technologies used by service providers Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN) Describe various major routing protocols used by service providers Configure Layer 3 services used by service providers Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage Describe usage of various services used and maintained by service providers Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software This course is designed to provide you with the foundational knowledge for the suite of Cisco© CCNP© Service Provider courses. The course expands what you learned from the Cisco CCNA© course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. Course Outline Introducing Service Provider Architectures Describing Internet Governance Organizations Configuring the Cisco IOS and Cisco IOS XE Router Configuring Cisco IOS XR Router Introducing Access and Core Technologies in the Service Provider Environment Introducing Routing Technologies in the Service Provider Environment Describing MPLS Implementing Layer 3 Services Introducing Switching Technologies in the Service Provider Environment Introducing Overlay Technologies Implementing Service Provider Services Introducing Programmability on Cisco IOS XR Routers Lab outline Review Lab Environment Examine Governance Data Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices Perform Initial Cisco IOS XR Configuration Configure and Verify Connectivity on Cisco IOS XR Configure Intermediate System to Intermediate System (IS-IS) Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng) Configure Basic Border Gateway Protocol (BGP) Configure MPLS Configure Internet Protocol Service Level Agreement (IP SLA) Configure Hot Standby Router Protocol (HSRP) with Object Tracking Configure Virtual Routing and Forwarding (VRFs) Configure Network Time Protocol (NTP) Use Linux Command Line Interface Configure IOS XR Using a Bash Script
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.1 course helps you prepare for the Cisco© CCNP© Data Center and CCIE© Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System? (Cisco UCS©) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. Implementing Data Center Switching Protocols Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies (Self-study) Power On Auto Provisioning Cisco Data Center Network Manager Overview Additional course details: Nexus Humans Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.