Duration 3 Days 18 CPD hours This course is intended for Senior Executives CIOs and CTOs Business Intelligence Executives Marketing Executives Data & Business Analytics Specialists Innovation Specialists & Entrepreneurs Academics, and other people interested in Big Data Overview More specifically, BDAW addresses advanced big data architecture topics, including, data formats, transformation, real-time, batch and machine learning processing, scalability, fault tolerance, security and privacy, minimizing the risk of an unsound architecture and technology selection. Big Data Architecture Workshop (BDAW) is a learning event that addresses advanced big data architecture topics. BDAW brings together technical contributors into a group setting to design and architect solutions to a challenging business problem. The workshop addresses big data architecture problems in general, and then applies them to the design of a challenging system. Throughout the highly interactive workshop, students apply concepts to real-world examples resulting in detailed synergistic discussions. The workshop is conducive for students to learn techniques for architecting big data systems, not only from Cloudera?s experience but also from the experiences of fellow students. Workshop Application Use Cases Oz Metropolitan Architectural questions Team activity: Analyze Metroz Application Use Cases Application Vertical Slice Definition Minimizing risk of an unsound architecture Selecting a vertical slice Team activity: Identify an initial vertical slice for Metroz Application Processing Real time, near real time processing Batch processing Data access patterns Delivery and processing guarantees Machine Learning pipelines Team activity: identify delivery and processing patterns in Metroz, characterize response time requirements, identify Machine Learning pipelines Application Data Three V?s of Big Data Data Lifecycle Data Formats Transforming Data Team activity: Metroz Data Requirements Scalable Applications Scale up, scale out, scale to X Determining if an application will scale Poll: scalable airport terminal designs Hadoop and Spark Scalability Team activity: Scaling Metroz Fault Tolerant Distributed Systems Principles Transparency Hardware vs. Software redundancy Tolerating disasters Stateless functional fault tolerance Stateful fault tolerance Replication and group consistency Fault tolerance in Spark and Map Reduce Application tolerance for failures Team activity: Identify Metroz component failures and requirements Security and Privacy Principles Privacy Threats Technologies Team activity: identify threats and security mechanisms in Metroz Deployment Cluster sizing and evolution On-premise vs. Cloud Edge computing Team activity: select deployment for Metroz Technology Selection HDFS HBase Kudu Relational Database Management Systems Map Reduce Spark, including streaming, SparkSQL and SparkML Hive Impala Cloudera Search Data Sets and Formats Team activity: technologies relevant to Metroz Software Architecture Architecture artifacts One platform or multiple, lambda architecture Team activity: produce high level architecture, selected technologies, revisit vertical slice Vertical Slice demonstration Additional course details: Nexus Humans Big Data Architecture Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Big Data Architecture Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Overview In this course you?ll learn how to: Containerize and deploy a new Python script Configure the deployment with ConfigMaps, Secrets and SecurityContexts Understand multi-container pod design Configure probes for pod health Update and roll back an application Implement services and NetworkPolicies Use PersistentVolumeClaims for state persistence And more In this vendor agnostic course, you will use Python to build, monitor and troubleshoot scalable applications in Kubernetes. Introduction Objectives Who You Are The Linux Foundation Linux Foundation Training Preparing Your System Course Registration Labs Kubernetes Architecture What Is Kubernetes? Components of Kubernetes Challenges The Borg Heritage Kubernetes Architecture Terminology Master Node Minion (Worker) Nodes Pods Services Controllers Single IP per Pod Networking Setup CNI Network Configuration File Pod-to-Pod Communication Cloud Native Computing Foundation Resource Recommendations Labs Build Container Options Containerizing an Application Hosting a Local Repository Creating a Deployment Running Commands in a Container Multi-Container Pod readinessProbe livenessProbe Testing Labs Design Traditional Applications: Considerations Decoupled Resources Transience Flexible Framework Managing Resource Usage Multi-Container Pods Sidecar Container Adapter Container Ambassador Points to Ponder Labs Deployment Configuration Volumes Overview Introducing Volumes Volume Spec Volume Types Shared Volume Example Persistent Volumes and Claims Persistent Volume Persistent Volume Claim Dynamic Provisioning Secrets Using Secrets via Environment Variables Mounting Secrets as Volumes Portable Data with ConfigMaps Using ConfigMaps Deployment Configuration Status Scaling and Rolling Updates Deployment Rollbacks Jobs Labs Security Security Overview Accessing the API Authentication Authorization ABAC RBAC RBAC Process Overview Admission Controller Security Contexts Pod Security Policies Network Security Policies Network Security Policy Example Default Policy Example Labs Exposing Applications Service Types Services Diagram Service Update Pattern Accessing an Application with a Service Service without a Selector ClusterIP NodePort LoadBalancer ExternalName Ingress Resource Ingress Controller Labs Troubleshooting Troubleshotting Overview Basic Troubleshooting Steps Ongoing (Constant) Change Basic Troubleshooting Flow: Pods Basic Troubleshooting Flow: Node and Security Basic Troubleshooting Flow: Agents Monitoring Logging Tools Monitoring Applications System and Agent Logs Conformance Testing More Resource Labs Additional course details: Nexus Humans Kubernetes for App Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Kubernetes for App Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for the person who has responsibility for daily system operations. Overview Send, display, and respond to messages Use the online help and reference materials Monitor and control job queues, active jobs, and output queues Create and change user profiles Use authorization lists and group profiles Start and stop Power Systems with IBM i Manage system devices, user display stations, and printers Save and restore objects and libraries Monitor job and history logs Diagnose a system problem Order, receive, and install PTFs This course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i Power Systems and IBM i concepts and overview . Reference material and support . Overview of 5250 emulation and help . Overview of System i Navigator . Overview of IBM Navigator for i . Messaging concepts . Messaging with 5250 emulation . Messaging with System i Navigator . Messaging with IBM Navigator for i . CL command concepts . CL commands with 5250 emulation . Concepts: Object, library, and the IFS . Object management with 5250 emulation . Object management with System i Navigator . Object management with IBM Navigator for i . Introduction to work management . Work management with 5250 emulation . Job control with 5250 emulation . Job control with System i Navigator . Job control with IBM Navigator for i . Print concepts . Print control with 5250 emulation . Print control with System i Navigator . Print control with IBM Navigator for i . Starting and stopping the system . System security concepts . System security with 5250 emulation . System security with System i Navigator . System security with IBM Navigator for i . System configuration overview . Configuration with 5250 emulation . Configuration with System i Navigator . Configuration with IBM Navigator for i . Save concepts . Save with 5250 emulation . Save with System i Navigator . Save with IBM Navigator for i . Restore concepts and overview . Problem determination with 5250 emulation . Problem determination with System i Navigator . Overview of the PTF process . PTFs with 5250 Emulation . Class summary . Additional course details: Nexus Humans AS24 IBM System Operator Workshop for IBM i training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AS24 IBM System Operator Workshop for IBM i course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This introductory-level Python course is geared for experienced web developers new to Python who want to use Python and Django for full stack web development projects. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Develop full-stack web sites based on content stored in an RDMS Use python data types appropriately Define data models Understand the architecture of a Django-based web site Create Django templates for easy-to-modify views Map views to URLs Take advantage of the built-in Admin interface Provide HTML form processing Geared for experienced web developers new to Python, Introduction to Full Stack Web Development with Python and Django is a five-day hands-on course that teaches students how to develop Web applications using the Django framework. Students will explore the basics of creating basic applications using the MVC (model-view-controller) design pattern, as well as more advanced topics such as administration, session management, authentication, and automated testing. This comprehensive, practical course provides an in-depth exploration of working with the programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world. The Python Environment Starting Python Using the interpreter Running a Python script Getting help Editors and IDEs Getting Started Using variables Built in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control Conditional expressions Relational and Boolean operators while loops Lists and Tuples About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Working with Files File overview The with statement Opening a file Reading/writing files Dictionaries and Sets About dictionaries Creating and using dictionaries About sets Creating and using sets Functions Returning values Function parameters Variable Scope Sorting with functions Errors and Exception Handling Exception overview Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages Creating Modules The import statement Module search path Creating packages Classes About OO programming Defining classes Constructors Properties Instance methods and data Class/static methods and data Inheritance Django Architecture Django overview Sites and apps Shared configuration Minimal Django layout Built in flexibility Configuring a Project Executing manage.py Starting the project Generating app files App configuration Database setup The development server Using cookiecutter Creating models Defining models Related objects SQL Migration Simplel model access Login for Nothing and Admin for Free Setting up the admin user Using the admin interface Views What is a view HttpResponse URL route configuration Shortcut: get_object_or_404() Class-based views Templates About templates Variable lookups The url tag Shortcut: render() Querying Models QuerySets Field lookups Chaining filters Slicing QuerySets Related fields Q objects Advanced Templates Use Comments Inheritance Filters Escaping HTML Custom filters Forms Forms overview GET and POST The Form class Processing the form Widgets Validation Forms in templates Automated Testing Why create tests? When to create tests Using Django's test framework Using the test client Running tests Checking code coverage
Duration 5 Days 30 CPD hours This course is intended for This course is intended for administrators in a Microsoft-centric environment who want to build reusable units of automation, automate business processes, and enable less-technical colleagues to accomplish administrative tasks. Overview Describe the correct patterns for building modularized tools in Windows PowerShell Build highly modularized functions that comply with native PowerShell patterns Build controller scripts that expose user interfaces and automate business processes Manage data in a variety of formats Write automated tests for tools Debug tools This course covers advanced Windows PowerShell topics, with an emphasis on building reusable tools. Students are introduced to workflow, engage in best practices, and learn a variety of script development and toolmaking techniques. Tool Design Tools do one thing Tools are flexible Tools look native Start with a Command Why start with a command? Discovery and experimentation Build a Basic Function and Module Start with a basic function Create a script module Check prerequisites Run the new command Adding CmdletBinding and Parameterizing About CmdletBinding and common parameters Accepting pipeline input Mandatory-ness Parameter validation Parmeter aliases Emitting Objects as Output Assembling information Constructing and emitting output Quick tests An Interlude: Changing Your Approach Examining a script Critiquing a script Revising the script Using Verbose, Warning, and Informational Output Knowing the six channels Adding verbose and warning output Doing more with verbose output Informational output Comment-Based Help Where to put your help Getting started Going further with comment-based help Broken help Handling Errors Understanding errors and exceptions Bad handling Two reasons for exception handling Handling exceptions in our tool Capturing the actual exception Handling exceptions for non-commands Going further with exception handling Deprecated exception handling Basic Debugging Two kinds of bugs The ultimate goal of debugging Developing assumptions Write-Debug Set-PSBreakpoint The PowerShell ISE Going Deeper with Parameters Parameter positions Validation Multiple parameter sets Value from remaining arguments Help messages Aliases More CmdletBinding Writing Full Help External help Using PlatyPs Supporting online help ?About? topics Making your help updatable Unit Testing Your Code Sketching out the test Making something to test Expanding the test Going further with Pester Extending Output Types Understanding types The Extensible Type System Extending an object Using Update-TypeData Analyzing Your Script Performing a basic analysis Analyzing the analysis Publishing Your Tools Begin with a manifest Publishing to PowerShell Gallery Publishing to private repositories Basic Controllers: Automation Scripts and Menus Building a menu Using UIChoice Writing a process controller Proxy Functions A proxy example Creating the proxy base Modifying the proxy Adding or removing parameters Working with XML Data Simple: CliXML Importing native XML ConvertTo-XML Creating native XML from scratch Working with JSON Data Converting to JSON Converting from JSON Working with SQL Server Data SQL Server terminology and facts Connecting to the server and database Writing a query Running a query Invoke-SqlCmd Thinking about tool design patterns Design tools that use SQL Server for data storage Final Exam Lab problem Break down the problem Do the design Test the commands Code the tool
It's About Ideas: The Care, Feeding, and Development of Ideas The Care, Feeding, and Development of Ideas. This video will explore specifically how to cultivate and implement new ideas across the global organization. Based on the work of Dr. Ed Hoffman and Dr. Larry Prusak this presentation will offer a proven process for idea development and application. These concepts, principles and processes will be explored and directly applied to ideas you want to bring to your organization. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Information Field Hypothesis: Shifting From a Red to a Green Worldview Shifting from a Red to a Green Worldview How we lead our life, run our business and shape the world around us, depends on our self-conception. This self-conception is based on our worldview - our perception of how reality works. Updating our worldview can therefore result in a Better Life, a Better Business, and a Better World. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Duration 2 Days 12 CPD hours This course is intended for This is an intermediate level training course, designed for experienced Java developers and architects who need to identify, design, and implement web services. We will explore and apply the terminology, the specification, the processes and technologies specific to web services. Students should have at least a year of practical development experience with Java and servlets, and should be familiar with XML and JSON. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core RESTful development skills, coupling the most current, effective techniques with the soundest industry practices. Working within in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand and apply the basic concepts of REST Understand and intelligently discuss the similarities and differences between RESTful services and SOAP-based services Appreciate the security concerns associated with RESTful services Design, develop, and deploy real-world RESTful Services Effectively define and design endpoints Work with query parameters Determine the best format to use for exchanging data Understand the principles associated with HTTP methods and how to stay congruent to them Extend the semantics of the RESTful service beyond the HTTP methods Implement RESTful services using JAX-RS to Handle various HTTP methods Use different approaches for parameters Deal with content negotiation Work with different data formats including XML and JSON Handle exceptions Implement RESTful Java clients Develop JAX-RS Java clients using the JAX-RS 2.0 Client API Manage different Web targets Deal with content negotiation on the client Work with different data formats including XML and JSON Properly process server responses Implement JAX-RS Filters and Interceptors Intercept and manipulate service requests and responses Dynamically register interceptor to resources Understand the concept of NameBinding Discover asynchronous JAX-RS processing Implement an asynchronous JAX-RS service endpoint Register response listeners Geared for experienced Java developers, Java REST Essentials is a two day, lab-intensive services training course that introduces developers to the core concepts, principles, and Java implementations for RESTful services. Today's development environments are increasingly dominated by sophisticated tooling that makes the implementation of RESTful services less arduous. The proper design of these services is far more complex and demanding. Java RESTful Service Essentials focuses on providing an understanding of the fundamental principles and technologies that are used in building these services. This understanding is critical to being able to diagnose, troubleshoot, tune, and perform other lifecycle activities. Session: Working with REST Overview of REST Designing RESTful Services JAX-RS Lesson: Introduction to JAX-RS @Path: URI Matching JAX-RS Content Negotiation JAX-RS Request and Response JAX-RS Client API JAX-RS Filters and Interceptors Asynchronous JAX-RS Additional course details: Nexus Humans Java REST Essentials (TT7305) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java REST Essentials (TT7305) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for the following roles: Network designer Network engineer Systems engineer Data center engineer Consulting systems engineer Technical solutions architect Cisco integrators/partners Overview After taking this course, you should be able to: Design Cisco ACI access policies according to best practices Use fabric system settings Design Cisco ACI logical components Design the migration of IP and logical components from an existing data center to Cisco ACI Design Cisco ACI physical structure Migrate existing data center connectivity and physical components from an existing environment to Cisco ACI Design Cisco ACI external Layer 3 connectivity and Cisco ACI Layer 4-7 service insertion, including PBR-based service redirection Design the L4-L7 service insertion in single-pod Cisco ACI, by evaluating the available options and choosing the optimal connectivity flow Design L4-L7 service insertion in Cisco ACI Multi-Pod Design a transit routing solution Design service sharing using vzAny Build a migration plan for Layer 2 and Layer 3 connectivity, including L3Outs and contracts Migrate vSphere compute environment to Cisco ACI Design QoS for interpod and intersite networks Design the DHCP Relay feature, SPAN feature, Port Tracking feature, Import/Export policies, and Snapshot/Rollback feature The Designing Cisco Application Centric Infrastructure (DCACID) v1.0 is a 5-day product training course that provides you with the knowledge and skills to understand and utilize a programmable fabric design built on Cisco Nexus© 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is a deep dive into Cisco ACI design, covering design considerations and best practices, so you can build solid ACI solutions and avoid common mistakes that can impact the network infrastructure. With a focus on various design use cases, this course provides information that can help you practice design decisions, validate your designs, and apply best practices while using Cisco ACI in your multiservice or cloud data centers. Course Outline Designing Access Policies Using Fabric System Settings Designing Logical Components Use Case: Migration of IP and Logical Structure Designing Physical Structure Use Case: Migration of Connectivity and Physical Components Designing L3Outs and Service Insertion Use Case: Service Insertion in Single Pod Use Case: Service Insertion in Cisco ACI Multi-Pod Use Case: L3Out Transit Routing Use Case: Shared Services vzAny and Endpoint Security Groups Use Case: Migration of Layer 2 and Layer 3 Connectivity Use Case: VMware Data Center Migration to Cisco ACI Use Case: IPN and ISN QoS Use Case: DHCP Relay and SPAN Additional course details: Nexus Humans Cisco Designing Cisco Application Centric Infrastructure v1.0 (DCACID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Application Centric Infrastructure v1.0 (DCACID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.