• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

22748 Courses

IT Fundamentals Plus

By Nexus Human

Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures

IT Fundamentals Plus
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu RabbitMQ: Install, Configure, Manage

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers Architects Administrators Overview By the end of the course, you should be able to meet the following objectives: Install and configure RabbitMQ Activate and use plugins such as the web management console Implement messaging patterns and applications using the Java client Set up a cluster of RabbitMQ nodes Configure high availability appropriately Tune and optimize RabbitMQ for better performance Secure RabbitMQ This intensive instructor-led course in RabbitMQ provides a deep dive into how to install, configure, and develop applications which leverage RabbitMQ messaging. The course begins with RabbitMQ installation and general configuration. It continues with developing messaging applications using the Java APIs, and delves into more advanced topics including clustering, high availability, performance, and security. Modules are accompanied by lab exercises that provide hands-on experience Introduction to Spring Essentials Kubernetes Overview BOSH Introduction Deploy, Patch & Upgrade Deploy a simple release Inside the VM Persistent Disks Patch the OS Upgrade Nginx Entry Point Set up a jumpbox Platform Infrastructure Pave the IaaS Deploy ops manager Deploy BOSH director Containerized Workloads Deploy Pivotal Container Service Provision a Kubernetes Cluster Harbor Container Registry Application Deployment Helm Advanced BOSH Deploy a distributed system Deploy Concourse CredHub Troubleshooting Concourse Deployment Concourse Day 2 Operations

VMware Tanzu RabbitMQ: Install, Configure, Manage
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Intersight Overview v1.0 (DCISO)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview This course will help you: Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of tools Gain hands-on experience using Cisco Intersight Understand the X-Series, B-Series, and C-Series product line similarities and differences Describe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex Understand the process for upgrading firmware with Cisco Intersight Administering server profiles, pools, and policies with Cisco Intersight Describe how to get started with Cisco Intersight programmability Cisco Intersight Overview (DCISO) v1.0 is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform. Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight

Cisco Intersight Overview v1.0 (DCISO)
Delivered OnlineFlexible Dates
Price on Enquiry

CL207 IBM Db2 11.1 Administration Workshop for Linux

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate level course for students that will perform Database Administration tasks, who plan, implement, and maintain D22 11.1 databases. Overview These skills can be developed by taking: DB2 SQL Workshop DB2 Fundamentals This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database. Overview of Db2 11.1Db2 Command Line Processor (CLP) and GUI toolsThe Db2 database manager instanceCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryDatabase Maintenance, Monitoring and Problem DeterminationLocking and concurrencySecurity

CL207 IBM Db2 11.1 Administration Workshop for Linux
Delivered OnlineFlexible Dates
Price on Enquiry

CCMS Check Point Certified Multi-Domain Security Management Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX

CCMS Check Point Certified Multi-Domain Security Management Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Kanban Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Die Schulung ist zugeschnitten auf die Bedarfe von: Entwickler:innen, Menschen, die die Rollen Scrum Master oder Product Owner ausüben. Projekt- und Prozessexpertinnen und -experten. Manager:innen sowie Teams, die Kanban für das Managen von täglichen operativen Aktivitäten einsetzen, z. B. Mitglieder von DevOps-Teams. Fachleute aus Bereichen wie z. B. Personal, Finanzen, Marketing, Produktion und Support. Alle, die irgendwo den Arbeitsfluss optimieren möchten. Overview Kanban umfasst sechs Grundpraktiken: Arbeitsfluss visualisieren Work-in-Progress (WIP) begrenzen Arbeitsfluss kontrollieren Prozessregeln explizit machen Feedback-Schleifen implementieren Gemeinsam verbessern, experimentell weiterentwickeln Im Mittelpunkt der Schulung steht das Verständnis der Kanban-Prinzipien und wie man diese mit Hilfe der Kanban-Werkzeuge (Tools) in der Praxis anwendet. Der Kurs bereitet auf die entsprechende Zertifizierung EXIN Kanban Foundation vor. Kanban: Methode zur kontinuierlichen Verbesserung des Arbeitsflusses in kollaborativen Teams. Zentrales Mittel ist die Visualisierung und Begrenzung der parallel in Arbeit befindlichen Aufgaben. Einsatzgebiete: SW-Entwicklung, IT-Betrieb, Produktion. Vorteile von Kanban 1.1 Die Flexibilit„t von Kanban 1.2 Die Kanban-Kultur Kontinuierliche Verbesserung 2.1 Kaizen einfhren 2.2 Prozesse visualisieren und verbessern 2.3 Rahmenbedingungen fr Ver„nderungen Kanban implementieren 3.1 Arbeit visualisieren 3.2 Tickets erstellen 3.3 Work-in-Progress (WIP) begrenzen 3.4 Fluss und Lieferrhythmus kontrollieren 3.5 Priorisierung 3.6 Variabilit„t reduzieren Kanban skalieren 4.1 Kanban mit verteilten Teams 4.2 Kanban in Groáprojekten

EXIN Kanban Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. Installing Cisco Telepresence Management Server Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS Configuring Cisco TelePresence Management Suite (TMS) Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources Booking Conferencing Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Reporting on TMS Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System Managing and Troubleshooting TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black App Control Advanced Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Manage and configure the Carbon Black App Control sever based on organizational requirements. Implement rules to support business processes and automatic approvals. Identify scenarios and use cases for Custom rules and Event rules. Describe common troubleshooting scenarios for the Carbon Black App Control server. Describe common troubleshooting scenarios for the Carbon Black App Control Windows agent. This course teaches you how to configure and scope the rules within VMware Carbon Black© App ControlTM product to maintain the system according to your organization?s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Custom Rules Basics Execute / Write action rules Precedence Paths tom Rules Best Practices Rule Triad Rule multiplication Rule Types Custom rule type overview Optimizing Custom Rules Evaluating events Event Rules Creating and editing Testing before implementing Creating and editing Testing before implementing Server versus agent issues Server Capabilities Tools, logs, common issues, scenarios Agent Capabilities Tools, logs, common issues, scenarios

VMware Carbon Black App Control Advanced Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

E2E120 SAP Technical Monitoring in SAP Solution Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System AdministratorsTechnical Architects, and Support Consultants. Overview Understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution ManagerSetup and Configure the monitoring types System Monitoring, Self- Monitoring, End-user Experience, Integration Monitoring, Job & BI MonitoringUse the features of the Technical Monitoring Work CenterUse Technical Reporting options (EWA, SL Reporting, Interactive Reporting)Use the SAP Solution Manager Administration work center for Troubleshooting In this course, students learn to understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution Manager Setup and configure the monitoring types. Course Outline Get an overview about the Technical Monitoring in SAP Solution Manager 7.1 Get an overview about the Monitoring and Alerting Infrastructure (MAI) architecture Get a deep understanding about Monitoring Templates Using the Alert Inbox including Guided Procedures Configure Work Mode Management and Notification Management Configure and using System Monitoring Configure and using Interface Channel Monitoring and Connection Monitoring Configure and using End-user Experience Monitoring Configure and using BI-Monitoring and Job Monitoring Configure and using PI-Monitoring, Message Flow Monitoring and Workflow Monitoring Using Technical Reporting (EarlyWatch Alerts, Service Level Reporting, Interactive Reporting and Dashboards) Get an overview about SAP IT Infrastructure Management Get an overview about SAP Mobile Apps for the Monitoring and Alerting Infrastructure (MAI) Configure and using SAP Solution Manager Self-Monitoring and Self Diagnosis Using Monitoring and Alerting Infrastructure Analysis Tools

E2E120 SAP Technical Monitoring in SAP Solution Manager
Delivered OnlineFlexible Dates
Price on Enquiry