Duration 4 Days 24 CPD hours This course is intended for Cisco integrators and partners Network operators Network administrators Optical network administrators System administrators System integrators and professional services Overview After taking this course, you should be able to: Describe Cisco EPN Manager's features and navigate the Cisco EPN Manager's user interface Understand the network inventory, topologies, and circuits Manage dashboards, alarms, and events Create and interpret reports Distinguish the system requirements for Cisco EPN Manager, and procedures for new installations, upgrades, licensing, and high availability Manage device groups and virtual domains Establish user accounts and their role-based access to EPN Manager's features and devices Configure and combine devices Perform backups and restores Manage data retention, purging, and software updates Monitor system health and performance Update and manage software images Archive, review, and restore configuration files Configure Quality of Service (QoS) actions and policies Configure devices using templates Perform compliance audits Configure monitoring policies Provision Carrier Ethernet services Provision Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) services Provision Circuit Emulation (CEM) services Provision an Optical Channel Network Connection (OCHNC) circuit Provision an Optical Channel Client Connection (OCHCC) circuit Provision an optical Media Channel Group with an OCHCC circuit Describe how Cisco EPN Manager can work with Cisco Network Services Orchestrator (NSO) to provide automated service provisioning The Configuring and Operating Cisco EPN Manager (EPNM100) v4.0 course shows you how to create efficient and agile network management through automated device operations, fast provisioning install, network configuration, dashboard management, and device management using Cisco¸ Evolved Programmable Network (EPN) Manager. Through a combination of lessons and hands-on labs, you will learn to maximize the benefits of the Cisco EPN Manager as a simplified, flexible, and cost-effective end-to-end lifecycle management solution for network provisioning, and network assurance management for today?s converging packet and optical multilayer networks. Exploring Cisco EPN Manager Cisco EPN Manager Overview Cisco EPN Manager Key Features Viewing Devices and Inventory Device Types View Devices Viewing Network Topologies and Circuits Topology Map Basics Change Information Displayed Using Dashboards Dashboards Overview Customize Dashboards Managing Alarms and Events Alarms and Events Overview View Alarms and Events Generating Reports Report Fundamentals Create and Schedule Reports Performing Basic Administration Installation Basics Perform Server Setup Adding Devices Device Management Fundamentals Add a Device Manually Add User-Defined Fields Backup and Restoring Backup Fundamentals Schedule a Backup Performing System Maintenance Software Updates Data Retention and Purging Software Image Management (SWIM) Software Image Management Fundamentals Setting Up Software Image Management Configuration Management Configuration Management Fundamentals Archive Setup Configuring QoS QoS Basics Create a Classification Profile Configuring Devices with Templates Device Configuration Methods Template Basics Performing Compliance Management Compliance Audit Basics Compliance Policy Basics Monitoring with Policies Monitoring Policy Fundamentals Edit a Monitoring Policy Circuit and Video Conferencing (VC) Fundamentals Circuit Provisioning Basics Supported Service Types Provisioning Carrier Ethernet Services Provision a Carrier Ethernet Service Verify a Service Provisioning Cisco MPLS Traffic Engineering Services Cisco MPLS TE Service Basics Provision a Cisco MPLS TE Service Provisioning Circuit Emulation Services Circuit Emulation Services Basics Provision a CEM Service Provisioning an OCHNC Circuit OCHNC Circuit Basics Set Up Devices for Circuit Provisioning an Optical OCHCC Circuit OCHCC Circuit Basics Set Up Devices for Circuit Provisioning a Media Channel Group with an OCHCC Circuit Media Channel Group with OCHCC Basics Provision a Media Channel Group Introducing Cisco EPN Manager with Cisco NSO Cisco EPN Manager with Cisco NSO Basics For More Information Additional course details: Nexus Humans Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring and Operating Cisco EPN Manager v4.0 (EPNM100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Duration 3 Days 18 CPD hours This course is intended for This hands-on course is geared for experienced DBAs already working with Oracle. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll learn how to: Implement backup and recovery settings and perform backup operations to the media of your choice. Move data between databases and files Use Oracle Database recovery processes to recover from media and other failures. Diagnose and repair data failures Use flashback technologies and data duplication to complement backup and recovery procedures Secure the availability of their database using backup and recovery strategies Geared for DBAs and other technical support staff, Oracle Database 19c Backup and Recovery is a hands-on course that allows you to develop appropriate backup and recovery procedures to address their business model and requirements. Throughout the course you?ll explore how to implement basic backup and recovery procedures, move data between databases and files, and employ basic monitoring procedures. You?ll also learn how to secure the availability of a database by using appropriate backup and recovery strategies, how to how to perform backup and recovery operations using RMAN, and how to use Flashback features to recover from human error. This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you?ll learn how to:Implement backup and recovery settings and perform backup operations to the media of your choice.Move data between databases and filesUse Oracle Database recovery processes to recover from media and other failures.Diagnose and repair data failuresUse flashback technologies and data duplication to complement backup and recovery proceduresSecure the availability of their database using backup and recovery strategies Backup Methods User Managed Backups Oracle Managed Backups Types of Failures Types of Recoveries Recovery Configuration Configuring the Database for Archivelog Configuring the Database for No-Archivelog Configuring the Flash Recovery Area Configuring RMAN RMAN Default Settings Command Line Enterprise Manager RMAN Backups Full RMAN Backup Compressed Backups Uncompressed Backups Partial RMAN Backup Incremental Backups Change Tracking File Managing Backups Backup Reports Backup Maintenance Backup Catalog Backup Crosscheck RMAN Complete Recovery RMAN Complete Recovery Database Recovery Tablespace Recovery Datafile Recovery RMAN In-Complete Recovery Time Based Recovery Sequence Based Recovery SCN Based Recovery Non-Database File Recovery Spfile Recovery Controlfile Recovery Incremental Recovery Flash Recovery Area for a Fast Recovery User Managed Backup Configuring User Managed Backups Perform a User Managed Backup User Managed Recovery User Managed Complete Recovery User Managed Incomplete Recovery Configuring Flashback Flashback Query Flashback Drop Flashback Database Performing Flashback Recoveries Flashback Query Flashback Drop Flashback Transaction Query Flashback Versions Query Performing Flashback Database Determining the FRA Size FRA Retention Performing a Flashback Database RMAN Duplicate Command Setting up for a Duplicate Database Creating the Duplicate spfiles Performing the Duplicate Command. RMAN Recovery Catalog Configuring for the Recovery Catalog Creating the Recovery Catalog Backups with the Recovery Catalog Registering the Database with the Recovery Catalog Performing Backups with the Recovery Catalog Recoveries with the Recovery Catalog Identifying Type of Recoveries with the Recovery Catalog Performing Recoveries with the Recovery Catalog Recovery Catalog Maintenance Registering Additional Databases with the Recovery Catalog Cataloging Additional Backups with the Recovery Catalog Recovery Catalog Scripts DataPump Configuring Datapump DataPump Exports DataPump Imports Tuning RMAN RMAN Sessions RMAN Channels RMAN Job Progress Additional course details: Nexus Humans Oracle 19c Database Backup and Recovery (TTOR21619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Backup and Recovery (TTOR21619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who are currently using desktop or web-based data management tools such as Microsoft Excel or SQL Server reporting services to perform numerical or general data analysis. They are responsible for connecting to cloud-based data sources, as well as shaping and combining data for the purpose of analysis. They are also looking for alternative ways to analyze business data, visualize insights, and share those insights with peers across the enterprise. This includes capturing and reporting on data to peers, executives, and clients. This course is also designed for professionals who want to pursue the Microsoft Power BI Data Analyst (Exam PL-300) certification. Overview In this course, you will analyze data with Microsoft Power BI. You will: Analyze data with self-service BI. Connect to data sources. Perform data cleaning, profiling, and shaping. Visualize data with Power BI. Enhance data analysis by adding and customizing visual elements. Model data with calculations. Create interactive visualizations. Use advanced analysis techniques. Enhance reports and dashboards. Publish and share reports and dashboards. Extend Power BI beyond the desktop. As technology progresses and becomes more interwoven with our businesses and lives, more data is collected about business and personal activities. This era of 'big data' is a direct result of the popularity and growth of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantages. Creating data-backed visualizations is key for data scientists, or any professional, to explore, analyze, and report insights and trends from data. Microsoft© Power BI© software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and it enables users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, enabling users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action. Analyzing Data with Self-Service BI Topic A: Data Analysis and Visualization for Business Intelligence Topic B: Self-Service BI with Microsoft Power BI Connecting to Data Sources Topic A: Create Data Connections Topic B: Configure and Manage Data Relationships Topic C: Save Files in Power BI Performing Data Cleaning, Profiling, and Shaping Topic A: Clean, Transform, and Load Data with the Query Editor Topic B: Profile Data with the Query Editor Topic C: Shape Data with the Query Editor Topic D: Combine and Manage Data Rows Visualizing Data with Power BI Topic A: Create Visualizations in Power BI Topic B: Chart Data in Power BI Enhancing Data Analysis Topic A: Customize Visuals and Pages Topic B: Incorporate Tooltips Modeling Data with Calculations Topic A: Create Calculations with Data Analysis Expressions (DAX) Topic B: Create Calculated Measures and Conditional Columns Creating Interactive Visualizations Topic A: Create and Manage Data Hierarchies Topic B: Filter and Slice Reports Topic C: Create Dashboards Using Advanced Analysis Techniques Topic A: Create Calculated Tables, Variables, and Parameters Topic B: Enhance Visuals with Statistical Analysis Topic C: Perform Advanced Analysis Enhancing Reports and Dashboards Topic A: Enhance Reports Topic B: Enhance Dashboards Publishing and Sharing Reports and Dashboards Topic A: Publish Reports Topic B: Create and Manage Workspaces Topic C: Share Reports and Dashboards Extending Power BI Beyond the Desktop Topic A: Use Power BI Mobile Topic B: Extend Access with the Power BI API Additional course details: Nexus Humans Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system integrators and consultants responsible for designing and deploying vSphere environments Overview By the end of the course, you should be able to meet the following objectives: Identify the business objectives for the vSphere environment Identify business requirements, constraints, assumptions, and risks for all layers in the vSphere environment Apply a framework to a design Analyze design choices and best-practice recommendations Create a design that ensures availability, manageability, performance, recoverability, and security Design the core management infrastructure for an enterprise Design the virtual data center for an enterprise Design the compute infrastructure for an enterprise Design the storage and networking infrastructures for an enterprise Design virtual machines to run applications in a vSphere infrastructure Design security, manageability, and recoverability features for an enterprise This three-day training course equips you with the knowledge, skills, and abilities to design a VMware vSphere© 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Given a case study, you practice your design skills by working with peers on a design project Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Follow a proven process to design a virtualization solution Define customer business objectives Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Create a conceptual design Core Management Infrastructure Determine the number of VMware vCenter© Server ApplianceTM instances to include in a design Choose the appropriate single sign-on identity source Choose the time synchronization method Choose methods to collect log files and VMware ESXi? core dumps Design a vCenter Server deployment topology that is appropriate for the size and requirements of the data center Virtual Data Center Infrastructure Calculate total compute capacity requirements for a virtual data center Create a virtual data center cluster design that meets business and workload requirements Evaluate in the virtual data center the use of several management services, such as VMware vSphere© High Availability and VMware vSphere© Distributed Resource Scheduler? Evaluate the use of resource pools in the virtual data center design Compute Infrastructure Create a compute infrastructure design that includes the appropriate ESXi boot, installation, and configuration options Choose the ESXi host hardware for the compute infrastructure Storage Infrastructure Calculate storage capacity and performance requirements for a design Evaluate the use of different storage platforms and storage management solutions Design a storage platform infrastructure and storage management architecture that meets the needs of the vSphere environment Network Infrastructure Evaluate the use of different network component and network management solutions Design a network component architecture that includes information about network segmentation and virtual switch types Design a network management architecture that meets the needs of the vSphere environment Virtual Machine Design Make virtual machine design decisions, including decisions about resources Design virtual machines that meet the needs of the applications in the vSphere environment and follow VMware best practices Infrastructure Security Make security design decisions for various layers in the vSphere environment Design a security strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Manageability Make infrastructure manageability design decisions that adhere to business requirements Design an infrastructure manageability strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Recoverability Make infrastructure recoverability design decisions that adhere to business requirements Design an infrastructure recoverability strategy that meets the needs of the vSphere environment and follows VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Fans of Taylor Swift, Lady Gaga or Michael Jackson will be pleased to attend our fantastic pop singing courses offered in a relaxed and non-judgmental environment. Sing your favourite songs while improving your vocal abilities immensely. Open to adults from beginners to advanced.