Duration 5 Days 30 CPD hours This course is intended for This section specifies the primary and secondary target audiences of this course by job roles and notes the relevance to each job role. Collaboration Engineers and Administration Primary audiences: Collaboration engineers involved in the design, implementation, and troubleshooting of Cisco collaboration core technologies. Secondary audiences: Administration involved in support and troubleshooting of Cisco collaboration technologies. Overview Upon completing this course, you will be able to meet these objectives: Describe the Cisco Expressway - C features and functionality within the collaboration architecture Configure and troubleshoot Cisco Unified Communications Manager and Cisco expressway Series integration Describe the Cisco Expressway - C additional features Configure and troubleshoot Cisco Collaboration solutions for B2B calls Describe how to secure B2B communication with Cisco Expressway Series Describe the MRA feature Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco IM&P Configure Cisco Webex Hybrid Services This course provides students knowledge about Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Configuring and Troubleshooting the Cisco Expressway Series Cisco Expressway Series Architecture Discovery 1: Deploy virtualized Cisco Expressway Discovery 2: Perform the initial Cisco Expressway series configuration Describe SIP and H.323 in the Cisco Expressway series Describe interworking in the Cisco Expressway series Discovery 3: Register endpoints on Cisco Expressway series Zones Digital string manipulation Search rules Transforms Discovery 4: Call search history and registrations Troubleshoot call processing on Cisco Expressway series Discovery 5: Troubleshooting tools Backup and restore Rerference Configuring Cisco Expressway Additional Freatures Describe bandwidth management Hardening local endpoint registrations Discovery 6: Configure Cisco Expressway series bandwidth management and registration restrictions Discovery 7: Troubleshoot Cisco Expressway series endpoint registration and local dial plan Describe Cisco Expressway security and clustering features Discovery 8: Configure Cisco Expressway series security features Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series Cisco unified communications manager and Cisco Expressway-C integration overview Dian plan overview Call policy Discovery 9: Configure Cisco unified communications manager to connect with Cisco Expressway-C Troubleshooting options for Cisco unified communications manager and Cisco Expressway-C intergration Discovery 10: Troubleshoot Cisco unified communications manager and Cisco Expressway series integration Discovery 11: Configure and troubleshoot Cisco unified communications manager and Cisco Expressway series integration (practice activity) References Configuring and Troubleshooting Cisco Collaboration Solutions for Bussiness-to-Bussiness Describe supported services for B2B collaboration Describe prerequisites for business to business collaboration Call flow including Cisco unified communications manager endpoints Network address translation in a collaboration environment Discovery 12: Implement a B2B Cisco collaboration solution Cisco Expressway series B2B call troubleshooting Discovery 13: Troubleshoot B2B calls on the Cisco Expressway series References Discovery 14: Troubleshoot B2B calls on the Cisco Expressway series (practice activity) Securing Business-Business Communication Firewall Traversal Secure media Secure media between Cisco unified communications manager and Cisco Expressway series Toll fraud prevention Discovery 15: Secure a B2B Cisco collaboration communication Refrences Configuring and Troubleshooting Mobile and Remote Access Describe prerequisites for mobile and remote access Describe service discovery Explore Expressway settings for MRA Certificates HTTP proxy Cisco jabber registration procedure Cisco jabber registration procedure in Hybrid deployment Cisco jabber configuration file Discovery 16: Configure MRA on the Cisco Expressway series MRA troubleshooting Discovery 17: Troubleshoot MRA on the Cisco Expressway series Integrating and Securing Mobile and Remote Access Secure Cisco unified communications integration Cisco unity connection integration Cisco MRA access control options Additional Cisco MRA features Discovery 18: Configure MRA with additional application integrations References Configuring Cisco Webex Hybrid Services Cisco Webex teams Describe Cisco Webex control hub Describe Cisco Webhex hybrid media services Describe Cisco Expressway requirements for using hybrid call service connect Explore Cisco Expressway requirements for using hybrid call service connect Describe Cisco Webex video mesh Discovery 19: Prepare for Cisco Webex teams integration Discovery 20: Configure Cisco Webex hybrid services Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with solid Python skills who wish to learn and use basic machine learning algorithms and concepts Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Topics Covered: This is a high-level list of topics covered in this course. Please see the detailed Agenda below Getting Started & Optional Python Quick Refresher Statistics and Probability Refresher and Python Practice Probability Density Function; Probability Mass Function; Naive Bayes Predictive Models Machine Learning with Python Recommender Systems KNN and PCA Reinforcement Learning Dealing with Real-World Data Experimental Design / ML in the Real World Time Permitting: Deep Learning and Neural Networks Machine Learning Essentials with Python is a foundation-level, three-day hands-on course that teaches students core skills and concepts in modern machine learning practices. This course is geared for attendees experienced with Python, but new to machine learning, who need introductory level coverage of these topics, rather than a deep dive of the math and statistics behind Machine Learning. Students will learn basic algorithms from scratch. For each machine learning concept, students will first learn about and discuss the foundations, its applicability and limitations, and then explore the implementation and use, reviewing and working with specific use casesWorking in a hands-on learning environment, led by our Machine Learning expert instructor, students will learn about and explore:Popular machine learning algorithms, their applicability and limitationsPractical application of these methods in a machine learning environmentPractical use cases and limitations of algorithms Getting Started Installation: Getting Started and Overview LINUX jump start: Installing and Using Anaconda & Course Materials (or reference the default container) Python Refresher Introducing the Pandas, NumPy and Scikit-Learn Library Statistics and Probability Refresher and Python Practice Types of Data Mean, Median, Mode Using mean, median, and mode in Python Variation and Standard Deviation Probability Density Function; Probability Mass Function; Naive Bayes Common Data Distributions Percentiles and Moments A Crash Course in matplotlib Advanced Visualization with Seaborn Covariance and Correlation Conditional Probability Naive Bayes: Concepts Bayes? Theorem Naive Bayes Spam Classifier with Naive Bayes Predictive Models Linear Regression Polynomial Regression Multiple Regression, and Predicting Car Prices Logistic Regression Logistic Regression Machine Learning with Python Supervised vs. Unsupervised Learning, and Train/Test Using Train/Test to Prevent Overfitting Understanding a Confusion Matrix Measuring Classifiers (Precision, Recall, F1, AUC, ROC) K-Means Clustering K-Means: Clustering People Based on Age and Income Measuring Entropy LINUX: Installing GraphViz Decision Trees: Concepts Decision Trees: Predicting Hiring Decisions Ensemble Learning Support Vector Machines (SVM) Overview Using SVM to Cluster People using scikit-learn Recommender Systems User-Based Collaborative Filtering Item-Based Collaborative Filtering Finding Similar Movie Better Accuracy for Similar Movies Recommending movies to People Improving your recommendations KNN and PCA K-Nearest-Neighbors: Concepts Using KNN to Predict a Rating for a Movie Dimensionality Reduction; Principal Component Analysis (PCA) PCA with the Iris Data Set Reinforcement Learning Reinforcement Learning with Q-Learning and Gym Dealing with Real-World Data Bias / Variance Tradeoff K-Fold Cross-Validation Data Cleaning and Normalization Cleaning Web Log Data Normalizing Numerical Data Detecting Outliers Feature Engineering and the Curse of Dimensionality Imputation Techniques for Missing Data Handling Unbalanced Data: Oversampling, Undersampling, and SMOTE Binning, Transforming, Encoding, Scaling, and Shuffling Experimental Design / ML in the Real World Deploying Models to Real-Time Systems A/B Testing Concepts T-Tests and P-Values Hands-on With T-Tests Determining How Long to Run an Experiment A/B Test Gotchas Capstone Project Group Project & Presentation or Review Deep Learning and Neural Networks Deep Learning Prerequisites The History of Artificial Neural Networks Deep Learning in the TensorFlow Playground Deep Learning Details Introducing TensorFlow Using TensorFlow Introducing Keras Using Keras to Predict Political Affiliations Convolutional Neural Networks (CNN?s) Using CNN?s for Handwriting Recognition Recurrent Neural Networks (RNN?s) Using an RNN for Sentiment Analysis Transfer Learning Tuning Neural Networks: Learning Rate and Batch Size Hyperparameters Deep Learning Regularization with Dropout and Early Stopping The Ethics of Deep Learning Learning More about Deep Learning Additional course details: Nexus Humans Machine Learning Essentials with Python (TTML5506-P) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Machine Learning Essentials with Python (TTML5506-P) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. Basic RDBMS Principles Relational design principles Accessing data through a structured query language Entity relationship diagrams Data Domains Null values Indexes Views Denormalization Data Model Review The SQL Language and Tools Using SQL*Plus Why Use SQL*Plus When Other Tools Are Available? Starting SQL*Plus EZConnect SQL Commands PL/SQL Commands SQL*Plus Commands The COLUMN Command The HEADING Clause The FORMAT Clause The NOPRINT Clause The NULL Clause The CLEAR Clause Predefined define variables LOGIN.SQL Command history Copy and paste in SQL*Plus Entering SQL commands Entering PL/SQL commands Entering SQL*Plus commands Default output from SQL*Plus Entering Queries What about PL/SQL? Using SQL Developer Choosing a SQL Developer version Configuring connections Creating A Basic Connection Creating A TNS Connection Connecting Configuring preferences Using SQL Developer The Columns Tab The Data Tab The Constraints Tab The Grants Tab The Statistics Tab Other Tabs Queries In SQL Developer Query Builder Accessing Objects Owned By Other Users The Actions Pulldown Menu Differences between SQL Developer and SQL*Plus Reporting Commands Missing In SQL Developer General Commands Missing In SQL Developer Data Dictionary report User Defined reports Using scripts in SQL Developer WHERE and ORDER BY WHERE clause basics Comparison operators Literals and Constants in SQL Simple pattern matching Logical operations The DUAL table Arithmetic operations Expressions in SQL Character operators Pseudo columns Order by clause basics Ordering Nulls Accent and case sensitive sorts Sampling data WHERE and ORDER BY in SQL Developer All, Any, Some Functions The basics of Oracle functions Number functions Character functions Date functions Conversion functions Other functions Large object functions Error functions The RR format mode; Leveraging your knowledge ANSI 92 JOINS Basics of ANSI 92 Joins Using Query Builder with multiple tables Table Aliases Outer joins Outer Joins In Query Builder Set operators Self-referential joins Non-Equijoins ANSI 99 Joins Changes with ANSI99 CROSS Join NATURAL Join JOIN USING JOIN ON LEFT / RIGHT OUTER JOIN FULL OUTER JOIN Subqueries Why use subqueries? WHERE clause subqueries FROM clause subqueries HAVING clause subqueries CORRELATED subqueries SCALAR subqueries DML and subqueries EXISTS subqueries Hierarchical queries TOP N AND BOTTOM N queries Creating subqueries using Query Builder Regular Expressions Available Regular Expressions Regular Expression Operators Character Classes Pattern matching options REGEX_LIKE REGEXP_SUBSTR REGEXP_INSTR REGEXP_REPLACE REGEXP_COUNT Analytics The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity More Analytics RANKING functions RANK DENSE_RANK CUME_DIST PERCENT_RANK ROW_NUMBER Windowing aggregate functions RATIO_TO_REPORT LAG / LEAD Linear Regression functions Inverse Percentile functions Hypothetical ranking functions Pattern Matching Additional course details: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This in an intermediate and beyond-level course is geared for experienced Python developers looking to delve into the exciting field of Natural Language Processing. It is ideally suited for roles such as data analysts, data scientists, machine learning engineers, or anyone working with text data and seeking to extract valuable insights from it. If you're in a role where you're tasked with analyzing customer sentiment, building chatbots, or dealing with large volumes of text data, this course will provide you with practical, hands on skills that you can apply right away. Overview This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you'll: Master the fundamentals of Natural Language Processing (NLP) and understand how it can help in making sense of text data for valuable insights. Develop the ability to transform raw text into a structured format that machines can understand and analyze. Discover how to collect data from the web and navigate through semi-structured data, opening up a wealth of data sources for your projects. Learn how to implement sentiment analysis and topic modeling to extract meaning from text data and identify trends. Gain proficiency in applying machine learning and deep learning techniques to text data for tasks such as classification and prediction. Learn to analyze text sentiment, train emotion detectors, and interpret the results, providing a way to gauge public opinion or understand customer feedback. The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. Launch into the Universe of Natural Language Processing The journey begins: Unravel the layers of NLP Navigating through the history of NLP Merging paths: Text Analytics and NLP Decoding language: Word Sense Disambiguation and Sentence Boundary Detection First steps towards an NLP Project Unleashing the Power of Feature Extraction Dive into the vast ocean of Data Types Purification process: Cleaning Text Data Excavating knowledge: Extracting features from Texts Drawing connections: Finding Text Similarity through Feature Extraction Engineer Your Text Classifier The new era of Machine Learning and Supervised Learning Architecting a Text Classifier Constructing efficient workflows: Building Pipelines for NLP Projects Ensuring continuity: Saving and Loading Models Master the Art of Web Scraping and API Usage Stepping into the digital world: Introduction to Web Scraping and APIs The great heist: Collecting Data by Scraping Web Pages Navigating through the maze of Semi-Structured Data Unearth Hidden Themes with Topic Modeling Embark on the path of Topic Discovery Decoding algorithms: Understanding Topic-Modeling Algorithms Dialing the right numbers: Key Input Parameters for LSA Topic Modeling Tackling complexity with Hierarchical Dirichlet Process (HDP) Delving Deep into Vector Representations The Geometry of Language: Introduction to Vectors in NLP Text Manipulation: Generation and Summarization Playing the creator: Generating Text with Markov Chains Distilling knowledge: Understanding Text Summarization and Key Input Parameters for TextRank Peering into the future: Recent Developments in Text Generation and Summarization Solving real-world problems: Addressing Challenges in Extractive Summarization Riding the Wave of Sentiment Analysis Unveiling emotions: Introduction to Sentiment Analysis Tools Demystifying the Textblob library Preparing the canvas: Understanding Data for Sentiment Analysis Training your own emotion detectors: Building Sentiment Models Optional: Capstone Project Apply the skills learned throughout the course. Define the problem and gather the data. Conduct exploratory data analysis for text data. Carry out preprocessing and feature extraction. Select and train a model. ? Evaluate the model and interpret the results. Bonus Chapter: Generative AI and NLP Introduction to Generative AI and its role in NLP. Overview of Generative Pretrained Transformer (GPT) models. Using GPT models for text generation and completion. Applying GPT models for improving autocomplete features. Use cases of GPT in question answering systems and chatbots. Bonus Chapter: Advanced Applications of NLP with GPT Fine-tuning GPT models for specific NLP tasks. Using GPT for sentiment analysis and text classification. Role of GPT in Named Entity Recognition (NER). Application of GPT in developing advanced chatbots. Ethics and limitations of GPT and generative AI technologies.
Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs
Duration 3 Days 18 CPD hours This course is intended for This course is geared for experienced Scala developers who are new to the world of machine learning and are eager to expand their skillset. Professionals such as data engineers, data scientists, and software engineers who want to harness the power of machine learning in their Scala-based projects will greatly benefit from attending. Additionally, team leads and technical managers who oversee Scala development projects and want to integrate machine learning capabilities into their workflows can gain valuable insights from this course Overview Working in a hands-on learning environment led by our expert instructor you'll: Grasp the fundamentals of machine learning and its various categories, empowering you to make informed decisions about which techniques to apply in different situations. Master the use of Scala-specific tools and libraries, such as Breeze, Saddle, and DeepLearning.scala, allowing you to efficiently process, analyze, and visualize data for machine learning projects. Develop a strong understanding of supervised and unsupervised learning algorithms, enabling you to confidently choose the right approach for your data and effectively build predictive models Gain hands-on experience with neural networks and deep learning, equipping you with the know-how to create advanced applications in areas like natural language processing and image recognition. Explore the world of generative AI and learn how to utilize GPT-Scala for creative text generation tasks, broadening your skill set and making you a more versatile developer. Conquer the realm of scalable machine learning with Scala, learning the secrets to tackling large-scale data processing and analysis challenges with ease. Sharpen your skills in model evaluation, validation, and optimization, ensuring that your machine learning models perform reliably and effectively in any situation. Machine Learning Essentials for Scala Developers is a three-day course designed to provide a solid introduction to the world of machine learning using the Scala language. Throughout the hands-on course, you?ll explore a range of machine learning algorithms and techniques, from supervised and unsupervised learning to neural networks and deep learning, all specifically crafted for Scala developers. Our expert trainer will guide you through real-world, focused hands-on labs designed to help you apply the knowledge you gain in real-world scenarios, giving you the confidence to tackle machine learning challenges in your own projects. You'll dive into innovative tools and libraries such as Breeze, Saddle, DeepLearning.scala, GPT-Scala (and Generative AI with Scala), and TensorFlow-Scala. These cutting-edge resources will enable you to build and deploy machine learning models for a wide range of projects, including data analysis, natural language processing, image recognition and more. Upon completing this course, you'll have the skills required to tackle complex projects and confidently develop intelligent applications. You?ll be able to drive business outcomes, optimize processes, and contribute to innovative projects that leverage the power of data-driven insights and predictions. Introduction to Machine Learning and Scala Learning Outcome: Understand the fundamentals of machine learning and Scala's role in this domain. What is Machine Learning? Machine Learning with Scala: Advantages and Use Cases Supervised Learning in Scala Learn the basics of supervised learning and how to apply it using Scala. Supervised Learning: Regression and Classification Linear Regression in Scala Logistic Regression in Scala Unsupervised Learning in Scala Understand unsupervised learning and how to apply it using Scala. Unsupervised Learning:Clustering and Dimensionality Reduction K-means Clustering in Scala Principal Component Analysis in Scala Neural Networks and Deep Learning in Scala Learning Outcome: Learn the basics of neural networks and deep learning with a focus on implementing them in Scala. Introduction to Neural Networks Feedforward Neural Networks in Scala Deep Learning and Convolutional Neural Networks Introduction to Generative AI and GPT in Scala Gain a basic understanding of generative AI and GPT, and how to utilize GPT-Scala for natural language tasks. Generative AI: Overview and Use Cases Introduction to GPT (Generative Pre-trained Transformer) GPT-Scala: A Library for GPT in Scala Reinforcement Learning in Scala Understand the basics of reinforcement learning and its implementation in Scala. Introduction to Reinforcement Learning Q-learning and Value Iteration Reinforcement Learning with Scala Time Series Analysis using Scala Learn time series analysis techniques and how to apply them in Scala. Introduction to Time Series Analysis Autoregressive Integrated Moving Average (ARIMA) Models Time Series Analysis in Scala Natural Language Processing (NLP) with Scala Gain an understanding of natural language processing techniques and their application in Scala. Introduction to NLP: Techniques and Applications Text Processing and Feature Extraction NLP Libraries and Tools for Scala Image Processing and Computer Vision with Scala Learn image processing techniques and computer vision concepts with a focus on implementing them in Scala. Introduction to Image Processing and Computer Vision Feature Extraction and Image Classification Image Processing Libraries for Scala Model Evaluation and Validation Understand the importance of model evaluation and validation, and how to apply these concepts using Scala. Model Evaluation Metrics Cross-Validation Techniques Model Selection and Tuning in Scala Scalable Machine Learning with Scala Learn how to handle large-scale machine learning problems using Scala. Challenges of Large-Scale Machine Learning Data Partitioning and Parallelization Distributed Machine Learning with Scala Machine Learning Deployment and Production Understand the process of deploying machine learning models into production using Scala. Deployment Challenges and Best Practices Model Serialization and Deserialization Monitoring and Updating Models in Production Ensemble Learning Techniques in Scala Discover ensemble learning techniques and their implementation in Scala. Introduction to Ensemble Learning Bagging and Boosting Techniques Implementing Ensemble Models in Scala Feature Engineering for Machine Learning in Scala Learn advanced feature engineering techniques to improve machine learning model performance in Scala. Importance of Feature Engineering in Machine Learning Feature Scaling and Normalization Techniques Handling Missing Data and Categorical Features Advanced Optimization Techniques for Machine Learning Understand advanced optimization techniques for machine learning models and their application in Scala. Gradient Descent and Variants Regularization Techniques (L1 and L2) Hyperparameter Tuning Strategies