Duration 2 Days 12 CPD hours This course is intended for System installers System integrators System administrators Network administrators Overview After taking this course, you should be able to: Describe the Cisco SD-Branch solution and its architecture Explain the hardware components of the Cisco ENCS 5400 and Cisco Catalyst 8200 Series Edge Universal Customer Premises Equipment (uCPE) Install and access the Cisco Enterprise NFVIS on Cisco ENCS 5400 Understand the VNF Lifecycle management and its deployment Identify Cisco Enterprise NFVIS Security considerations Explain the Cisco SD-WAN solution and its components Describe the Cisco ENCS orchestrations systems and Representational State Transfer (REST) APIs Deploy the Cisco ENCS using orchestrators Monitor and troubleshoot Cisco ENFV components using Cisco vManage The Implementing Cisco Enterprise SD-Branch (ENSDBI) v1.0 course is designed to teach you to understand the Cisco© Software-Defined (SD)-Branch architecture and Cisco Enterprise Network Functions Virtualization (ENFV) solution. Through a series of in-person or e-learning lectures and labs, you will learn about the supported hardware platforms with a focus on the components, installation, and upgraded workflows of the Cisco Enterprise Network Compute System (ENCS) 5400 series. Additionally, this course will help you build your skills on Virtual Network Functions (VNF) deployment and orchestration solutions on Cisco ENCS. Course Outline Introducing Cisco SD-Branch Architecture and Cisco ENFV Solution Preparing Cisco ENCS Device for Deployment Deploying VNFs on Cisco ENCS Working with Cisco ENCS Orchestration Monitoring and Managing Cisco ENFV Components Additional course details: Nexus Humans Cisco Implementing Cisco Enterprise SD-Branch v1.0 (ENSDBI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Enterprise SD-Branch v1.0 (ENSDBI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). Planning an IoT Implementation Defining IoT IoT Infrastructure Identify Benefits and Challenges of IoT Undertaking an IoT Project Identify Real World Applications for IoT The IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0
Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager⢠to automate driver and firmware installations Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure the vSAN iSCSI target Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration⢠Describe how to setup a stretched and a two-node vSAN cluster Discuss vSAN cluster backup methodology Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health During this five-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail VMware HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructors such as virtual services, pools, health monitors, and related components Understand and modify application behavior through profiles, policies, and DataScripts Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© Advanced Load Balancer? (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 20.x release. Features include the overall infrastructure, virtual services and application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic Virtual Service components such as Application Profiles, Network Profiles Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog, and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups Modifying Application Behavior Design and apply application solutions leveraging application profiles Design and apply application solutions leveraging Network and HTTP Policies and DataScripts Explain DataScript fundamentals Explain and leverage NSX Advanced Load Balancer analytics to understand application behavior Describe and configure Client SSL Certificate Validation Describe and configure Virtual Service DDoS, Rate Limiting, and Throttling capabilities Modify Network Profiles properties such as TCP connection properties Design and apply application solutions leveraging Persistence Profiles NSX Advanced Load Balancer Infrastructure Architecture Deep dive on the management, control, data, and consumption planes and functions Describe Control Plane Clustering and High Availability Describe Controller Process Sharding Describe Controller Sizing Describe Service Engine CPU and NIC Architecture Explain Tenants Deep dive and configure properties of Service Engine Groups Explain Service Engine Group High Availability Modes Describe and configure Active/Standby High Availability Mode Describe and configure Elastic HA High Availability Mode (Active/Active, N+M) Explain Service Engine Failure Detection and Self-Healing Describe Service Engine as a Router Deep dive on Virtual Service scale out options, such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Introduction to Cloud Connector Introduce Cloud Connectors Review Cloud Connector integration modes Introduce Cloud Connector types Install, Configure and Manage NSX Advanced Load Balancer in No-Access Cloud Explain No Access Cloud concepts Configure No Access Cloud integration Explain and Configure Linux Server Cloud Describe the Advanced Configuration options available in Bare-Metal (Linux Server Cloud) Install, Configure and Manage NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware No Access Cloud Connector Explain and configure VMware Write Access Cloud Connector Describe VMware Write with NSX-V Access Cloud Connector Describe VMware NSX-T integration AWS Cloud Configuration Describe NSX Advanced Load Balancer Public Cloud integrations Explain and demonstrate AWS Public Cloud Integration DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing Introduce Global Server Load Balancing Concepts and Benefits Explain and configure NSX Advanced Load Balancer infrastructure Explain and configure DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB Sites Explain and configure basic GSLB Services to include pools and health monitors Describe GSLB Service Load Balancing algorithms Explain and configure Data and Control Plane-based Health Monitors Describe GSLB Health Monitor Proxy NSX Advanced Load Balancer: Troubleshooting Introduce Infrastructure and Application Troubleshooting Concepts Describe Control Plane and Data Plane-based Troubleshooting Explain Application Analytics and Logs Describe client logs analysis Explain Headers troubleshooting and Packet Capture mechanism Leverage CLI for detailed data plane troubleshooting Explain Service Engine Logs Explain Health Monitors troubleshooting Explain BGP session troubleshooting Describe Control Plane Troubleshooting, Clustering, and Cloud Connector issues Events and Alerts Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities, leveraging SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface, leveraging browser and command line utility Explain Swagger-based API documentation Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants and Business Process Owners/Team Leads/Power Users. Overview This course is organized in a fashion that mimics the step by step process planners will undergo in executing production planning tasks on a daily basis. We start with setup up alert profiles to manage the day to day exceptions. Participants will walk through a detailed analysis of the net requirements calculation process that is executed during product heuristics. Gain an understanding of how scheduling is performed as new orders are created. This will include analyzing source determination rules as well as scheduling strategies. Participants will analyze the pegging functionality and the master data parameters that can control the outcome of pegging. Additionally, we will perform an analysis of process, service and REM heuristics. Lastly, perform an overview of the detailed scheduling activities involved in developing an execution schedule. In this course, students gain an in-depth understanding of the advanced topics required to implement production planning in SAP SCM APO. Introduction to Production Planning in SAP Advanced Planning and Optimization (SAP APO) Planning Demand in the Supply Chain Using Production Planning and Detailed Scheduling (PP/DS) Production Planning Results Evaluation Evaluating the Planning Run Results with Alerts Evaluating the Planning Results Evaluating the Planning Run with Advanced Tools Planning Procedure Configuring Basic Parameters for Planning Executing the Production Planning Run Planning a Product Using the Planning Procedure Order Creation with Product Heuristics Using Demand Management in PP/DS Planning Make-to-Order Production Using PP/DS Using Firming in PP/DS Configuring Product Heuristics Managing the Reuse of Procurement Proposals Using the Lot-Size Calculation In Production Planning Scheduling in Production Planning Determining the Source of Supply of the Order Scheduling Operations with the Strategy Profile Scheduling a Planned Order for Production Pegging in Production Planning Configuring Dynamic and Fixed Pegging Additional Heuristics in Production Planning Planning Production Using Process Heuristics Planning Production Using Service Heuristics Configuring Bottom-Up Heuristics Planning Production Using Repetitive Manufacturing (REM) Heuristics Outlining the Integration of Supply Network Planning (SNP) in PP/DS Detailed Scheduling Scheduling Operations with the Detailed Scheduling Planning Board Planning Production with Detailed Scheduling Strategies and Heuristics Managing Setup Times with the Setup Matrix Managing Scheduling with the PP/DS Optimizer Using MRP-Based Detailed Scheduling Additional course details: Nexus Humans SCM250 SAP Production Planning in SAP APO training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM250 SAP Production Planning in SAP APO course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This basic course is for persons needing an introductory knowledge of DB2, and persons preparing for advanced and specialized DB2 education. Overview List and describe the major components of IBM's relational database, DB2 Explain the characteristics of a DB2 table Relate the basic concepts of data modeling Comprehend the processing instructions given to DB2 via simple SQL statements List and describe several ways to build (write) and execute SQL statements List and describe steps needed to imbed SQL statements in an application program Explain some of the functions performed by, and the responsibilities of, database and system administrators Establish a base for more specialized DB2 education This course provides information about the functions of IBM's DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms (e.g., z/OS, VM, Linux, UNIX, Windows, etc.) Understanding a Table Identify the advantages of a relational database Define a relation Name the language used to talk to a relational database manager (RDBM) List three characteristics assigned to each column Define the tasks performed by DB2 when running an application Defi Data Modeling and Database Design State the purpose of a business model Identify an Entity-Relational Diagram (ERD) model List several DB2 column data types Identify non-standard column and table names Identify the characteristics of a primary key and a foreign key State the purpose of re How does a User use DB2? List several ways to talk to DB2 List multiple ways to generate an SQL statement List several ways to ADD, REMOVE, or CHANGE table rows List several ways to READ data and produce reports How does a Programmer use DB2? List the steps needed to create a test environment List the necessary steps to coding SQL in a program Describe the purpose of SQL delimiters Describe the purpose of an SQLCA List the steps involved in preparing a program for execution State the differenc What does an Administrator do in DB2? List some of the tasks performed by a DB2 System Administrator: Identifying the DB2 product, Installing DB2, Creating subsystems/instances, databases and table spaces, Authorizing, and Monitoring List some of the tasks performed by a DB2 Database Administ Information Management with DB2 List several planning considerations for distributing data List some of the skills required to successfully distribute data Differentiate between remote unit of work, distributed unit of work, and distributed request List some of the security concerns whe
Duration 3 Days 18 CPD hours This course is intended for The EXIN BCS Artificial Intelligence Foundation certification is focused on individuals with an interest in, (or need to implement) AI in an organization, especially those working in areas such as science, engineering, knowledge engineering, finance, education or IT services. Overview You will be able to Describe how Artificial (AI) is Part of 'Universal Design', and 'The Fourth Industrial Revolution' Demonstrate Understanding of the Artificial Intelligence (AI) Intelligen Agent Description Explain the Benefits of Artificial Intelligence (AI) Describe how we Learn from Data - Functionality, Software and Hardware Demonstrate an Understanding that Artificial Intelligence (AI) (in Particular, Machine Learning (ML)) will Drive Humans and Machines to Work Together Describe a ''Learning from Experience'' Agile Approach to Projects Candidates should be able to demonstrate a knowledge and understanding in the application of ethical and sustainable Artificial Intelligence (AI):- Human-centric Ethical and Sustainable Human and Artificial Intelligence (AI) Ethical and Sustainable Human and Artificial Intelligence (AI) Recall the General Definition of Human and Artificial Intelligence (AI) Describe what are Ethics and Trustworthy Artificial Intelligence (AI) Describe the Three Fundamental Areas of Sustainability and the United Nationïs Seventeen Sustainability Goals Describe how Artificial Intelligence (AI) is Part of 'Universal Design', and 'The Fourth Industrial Revolution' Understand that Machine Learning (ML) is a Significant Contribution to the Growth of Artificial Intelligence (AI) Artificial Intelligence (AI) and Robotics Demonstrate Understanding of the Artificial Intelligence (AI) Intelligent Agent Description Describe what a Robot is Describe what an intelligent Robot is Applying the Benefits of Artificial Intelligence (AI) ? Challenges and Risks Describe how Sustainability Relates to Human-Centric Ethical Artificial Intelligence (AI) and how our Values will Drive our use of Artificial Intelligence (AI) and will Change Humans, Society and Organizations Explain the Benefits of Artifical Intelligence (AI) Describe the Challenges of Artificial Intelligence (AI) Projects Demonstrate Understanding of the Risks of Artificial Intelligence (AI) Projects List Opportunities for Artificial Intelligence (AI) Identify a Typical Funding Source for Artificial Intelligence (AI) Projects and Relate to the NASA Technology Readiness Levels (TRLs) Starting Artificial Intelligence (AI): how to Build a Machine Learning (ML) Toolbox ? Theory and Practice Describe how we Learn from Data - Functionality, Software and Hardware Recall which Rypical, Narrow Artificial Intelligence (AI) Capability is Useful in Machine Learning (ML9 and Artificial Intelligence (AI) AgentsïFunctionality The Management, Roles and Responsibilities of Humans and Machines Demonstrate an Understanding that Artificial Intelligence (AI) (in Particular, Machine Learning (ML)) will Drive Humans and Machines to Work Together List Future Directions of Humans and Machines Working Together Describe a ''Learning from Experience'' Agile Approach to Projects
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.