Duration 3 Days 18 CPD hours This course is intended for This course is intended for application administrators, developers, IT leaders, and application architects. Overview As a result of attending this course, students should be able to configure, secure, and manage a Red Hat JBoss AMQ 7.0 broker to create and integrate message-driven applications. Red Hat© AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer the message broker, Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. This course is based on Red Hat JBoss AMQ 7.0. Red Hat JBoss AMQ, part of the Red Hat application integration suite, provides application administrators, software architects, and developers the ability to integrate disparate applications in a decoupled manner using enterprise messaging paradigms. Providing a highly performant and robust message broker, router, and client libraries for numerous languages, Red Hat JBoss AMQ is the solution for asynchronous and synchronous messaging. Red Hat AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. Course introduction Introduce and review the course. Install the broker Install JBoss AMQ, create a broker instance, and verify connectivity to the instance. Configuration Configure message addresses and queues. Secure access to the broker Configure authentication, authorization, and encryption on the broker. Configure broker persistence Configure zero, file-based, and database-backed persistence. Manage broker resource consumption Configure the broker to limit memory and other resource consumption. Implement broker clustering, high availability, and failover Create a scalable and highly available cluster of brokers. Monitor and manage the broker Monitor and manage broker resources using logging and the web console. Route messages to brokers Install JBoss AMQ interconnect and configure routes to brokers. Comprehensive review of Red Hat AMQ administration Configure Red Hat JBoss AMQ brokers and verify proper operation.
Duration 5 Days 30 CPD hours This course is intended for Senior Red Hat Enterprise Linux system administrators responsible for the management of multiple servers Overview - Verify a Red Hat Satellite 6.6 installation. - Regulate Red Hat Satellite with organizations, locations, users, and roles. - Manage software with Red Hat Satellite environments and content views. - Use Red Hat Satellite to configure hosts with Ansible playbooks and roles. - Provision hosts with integrated software and configuration management. - Implement Metal-as-a-Service (MaaS) with Satellite discovery and provisioning of unprovisioned hosts. Red Hat Satellite 6 Administration (RH403) is a lab-based course that explores the concepts and methods necessary for successful large-scale management of Red Hat© Enterprise Linux© systems. You will learn how to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible© configuration management upon deployment. This course is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6. 1 - Plan and deploy Red Hat Satellite Plan and deploy Red Hat Satellite Plan a Red Hat Satellite deployment, then perform installation and initial configuration of Red Hat Satellite servers. 2 - Manage software life cycles Create and manage Red Hat software deployment life cycle environments. 3 - Register hosts Register and configure your Red Hat Enterprise Linux systems to use Red Hat Satellite, then organize those systems into groups for easier management. 4 - Deploy software to hosts Manage software deployment to registered hosts of your Red Hat Satellite infrastructure and practice managing environment paths, life cycle environments, and content views. 5 - Deploy custom software Create, manage, and deploy custom software products and repositories. 6 - Deploy Satellite capsule servers Perform installation and initial configuration of Red Hat Satellite capsule servers as components of a deployment plan. 7 - Run remote execution commands Configure the ability to run ad hoc and scheduled tasks on managed hosts using a variety of configuration management tools. 8 - Provision hosts Configure Satellite server for host deployment and perform host provisioning. 9 - Manage Red Hat Satellite using the API Integrate Red Hat Satellite functionality with custom scripts or external applications that access the API over HTTP. 10 - Plan a Red Hat Satellite deployment on a cloud platform Plan a Red Hat Satellite deployment, installation, and initial configuration on a cloud platform. 11 - Perform Red Hat Satellite server maintenance Manage Red Hat Satellite for security, recoverability, and growth. 12 - Comprehensive review Install and configure Red Hat Satellite Server, then provision content hosts. Additional course details: Nexus Humans Red Hat Satellite 6 Administration (RH403) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Satellite 6 Administration (RH403) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The Hotel Manager Course is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with a recognised certification. This Hotel Manager Course consists of several modules that take around 3 hours to complete. The course is accompanied by instructional videos, helpful illustrations, how-to instructions and advice. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion PDF Certificate at £9.99. Print copy by post is also available at an additional cost of £15.99 and the same for PDF and printed transcripts.
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase AdministratorsDatabase DesignersSupport EngineerTechnical Administrator Overview Monitor the DatabaseManage Database PerformanceImplement Database AuditingConfigure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and TasksSchedule Jobs to Run Inside or Outside of the DatabaseConfigure Oracle Net ServicesConfigure your Database For Backup and Recovery OperationsDescribe Oracle Database ArchitectureManage the Oracle Database InstanceManage Oracle Database Storage structuresCreate and Administer User Accounts The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance. The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level course designed to teach experienced systems administrators how to install, maintain, monitor, troubleshoot, optimize, and secure Hadoop. Previous Hadoop experience is not required. Overview Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn to: Understand the benefits of distributed computing Understand the Hadoop architecture (including HDFS and MapReduce) Define administrator participation in Big Data projects Plan, implement, and maintain Hadoop clusters Deploy and maintain additional Big Data tools (Pig, Hive, Flume, etc.) Plan, deploy and maintain HBase on a Hadoop cluster Monitor and maintain hundreds of servers Pinpoint performance bottlenecks and fix them Apache Hadoop is an open source framework for creating reliable and distributable compute clusters. Hadoop provides an excellent platform (with other related frameworks) to process large unstructured or semi-structured data sets from multiple sources to dissect, classify, learn from and make suggestions for business analytics, decision support, and other advanced forms of machine intelligence. This is an introductory-level, hands-on lab-intensive course geared for the administrator (new to Hadoop) who is charged with maintaining a Hadoop cluster and its related components. You will learn how to install, maintain, monitor, troubleshoot, optimize, and secure Hadoop. Introduction Hadoop history and concepts Ecosystem Distributions High level architecture Hadoop myths Hadoop challenges (hardware / software) Planning and installation Selecting software and Hadoop distributions Sizing the cluster and planning for growth Selecting hardware and network Rack topology Installation Multi-tenancy Directory structure and logs Benchmarking HDFS operations Concepts (horizontal scaling, replication, data locality, rack awareness) Nodes and daemons (NameNode, Secondary NameNode, HA Standby NameNode, DataNode) Health monitoring Command-line and browser-based administration Adding storage and replacing defective drives MapReduce operations Parallel computing before MapReduce: compare HPC versus Hadoop administration MapReduce cluster loads Nodes and Daemons (JobTracker, TaskTracker) MapReduce UI walk through MapReduce configuration Job config Job schedulers Administrator view of MapReduce best practices Optimizing MapReduce Fool proofing MR: what to tell your programmers YARN: architecture and use Advanced topics Hardware monitoring System software monitoring Hadoop cluster monitoring Adding and removing servers and upgrading Hadoop Backup, recovery, and business continuity planning Cluster configuration tweaks Hardware maintenance schedule Oozie scheduling for administrators Securing your cluster with Kerberos The future of Hadoop
Duration 5 Days 30 CPD hours This course is intended for Technical Administrator Java EE Developer System Administrator Overview Configure WebLogic Server's authentication provider Deploy applications to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Install WebLogic Server 12c This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server. This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server.
Duration 5 Days 30 CPD hours This course is intended for Administrator Developer System Integrator Systems Administrator Overview Install WebLogic Server 12c Deploy applications to WebLogic Server Deploy share libraries and application that use them to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Configure WebLogic Server's authentication provider This Oracle WebLogic Server 12c: Administration I training teaches you how to perform the most important Oracle WebLogic Server 12c administrative tasks., and gives an overview of the architecture and concepts of Oracle WebLogic Server 12c. WebLogic Server OverviewInstalling and Patching WebLogic ServerCreating DomainsStarting ServersUsing the Administration ConsoleConfiguring JDBCMonitoring a DomainNode ManagerDeploying ApplicationsShared Java EE LibrariesNetwork Channels and Virtual HostsClusters: Overview, Create, & ConfigClusters: Proxies & SessionsClusters: Communication, Planning & TroubleshootingTransactionsWebLogic Server SecurityBacking Up a Domain and Upgrading WebLogic Server
Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs
Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java