Duration 4 Days 24 CPD hours This course is intended for This class is ideal for admins with at least 6 months of experience administering Salesforce, and is a great foundational course for anyone looking to earn their Salesforce Advanced Administrator credential. Overview Determine and implement appropriate data access and visibility settings. Manage configuration changes in a sandbox environment and move metadata between environments using change sets. Extend the functionality of your implementation with custom objects and apps. Extend your reporting to provide up-to-date views of your business. Customize the Salesforce mobile app and create quick actions to increase efficiency. Improve data quality so that the ongoing task of data maintenance is not so overwhelming. Implement complex business processes using workflow rules, Process Builder, approval processes, and flows. Take your Salesforce Administrator skills to the next level and supercharge your knowledge to solve pressing business needs. In this 4-day class, discover how to extend Salesforce with custom objects and Lightning apps, generate complex reports and dashboards, and automate complex business requirements to work more efficiently. Our Salesforce experts will share tips and best practices to take your admin skills to the next level and arm you with the skills to get more out of Salesforce. Record Access and Field Visibility Troubleshoot Record Access Understand the Impact of Territory Management on the Sharing Model Manage Field Visibility Change Management Manage Changes in a Sandbox Deploy Changes Using Change Sets Custom Objects and Apps Build Custom Objects, Tabs, and Apps Create Relationships Between Objects Use Delegated Administration Advanced Reporting Create Custom Report Types Build Exception Reports with Cross Filters Categorize Report Data with Bucketing Extend Summaries in Reports and Dashboards Display Multiple Views of Data Using Joined Reports Analyze Data Over Time with Historical Trending and Reporting Snapshots Salesforce Mobile App and Quick Actions Customize the Salesforce Mobile App Create Object-Specific Quick Actions Create Global Quick Actions Data Quality Assess, Cleanse, and Maintain Data Prevent Duplicate Records Using Duplicate Management Automated Business Processes Use Validation Rules, Formula Fields, Workflow Rules, and Process Builder to Enforce and Automate Business Processes Approval Processes Manage Approval Processes Troubleshoot Approval Processes Visual Workflow Understand Use Cases for Visual Workflow Build and Deploy a Flow Advanced Business Process Automation Understand When to Use Apex and Visualforce for Extending Business Process Automation Understand the Order of Execution for Automated Processes Use Debug Logs to Troubleshoot Business Process Issues
Duration 5 Days 30 CPD hours This course is intended for Channel Field Engineers Employees Overview After taking this course, you should be able to: Define Cisco Business TelePresence Solutions components and architectures Implement Cisco TelePresence Video Communication Server (Expressway) for basic and advanced video networks Implement Cisco TelePresence Management Suite (TMS) Configure Cisco Meeting Server Features Define integration of Cisco Collaboration Premise Solutions with Cisco Cloud, including Cisco Spark, Cisco Spark Hybrid, and WebEx Cisco Video Infrastructure Implementation (VII) v1.0 will provide you with the necessary knowledge and skills to implement a complete Cisco TelePresence solution, including TelePresence endpoints, integration of premise with cloud solutions, meeting solutions, and management software. It describes Cisco business TelePresence solutions and enables students to implement and troubleshoot basic and advanced TelePresence network solutions. Module 1: Advanced Cisco Expressway Features Lesson 1: Introducing Cisco Video Network Solutions Lesson 2: Exploring Cisco Expressway Basic Setup Lesson 3: Explaining Regular Expressions in a Cisco Expressway Environment Lesson 4: Deploying Components of Cisco Expressway Security Lesson 5: Exploring the Fundamentals of Subzones on a Cisco Expressway Lesson 6: Administering Call Control on a Cisco Expressway Lesson 7: Implementing Subzone Bandwidth Management on a Cisco Expressway Lesson 8: Implementing Zones on a Cisco Expressway Lesson 9: Exploring Clustering on the Cisco Expressway Lesson 10: Applying Troubleshooting on the Cisco Expressway Module 2: Advanced Cisco Meeting Server Features Lesson 1: Introducing the Cisco Meeting Server Lesson 2: Exploring Cisco Meeting Server API Configuration Lesson 3: Exploring Cisco Meeting Server Resilient and Scalable Deployments Lesson 4: Exploring Additional Features with Cisco Meeting Server Module 3: Cisco Collaboration Meetin gRoom Solutions wiht Cisco TelePresence Server Lesson 1: Introducing Cisco Collaboration Meeting Room Cloud, Premises, and Hybrid Products Lesson 2: Deploying the Cisco TelePresence Server and Cisco TelePresence Conductor Lesson 3: Applying Troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite Solution Lesson 1: Explaining Cisco TMS Installation Lesson 2: Describing Cisco TMS Operation Lesson 3: Explaining Cisco TMS Conference Scheduling and Management Lesson 4: Configuring Permissions on Cisco TMS for Administration Lesson 5: Applying Troubleshooting to Cisco TMS Module 5: Cisco Cloud Solutions?WebEx and Spark Lesson 1: Introducing Cisco WebEx and Cisco Spark Cloud Solutions Lesson 2: Exploring Cisco Spark Administration Configuration Lesson 3: Deploying Cisco Spark Hybrid Services Lesson 4: Exploring Cisco Spark APIs and BOTs Configuration Module 6: Cisco TelePresence Content Server (Optional Module) Lesson 1: Examining Cisco TCS Operation and Configuration
Duration 5 Days 30 CPD hours This course is intended for Technical Administrator Java EE Developer System Administrator Overview Configure WebLogic Server's authentication provider Deploy applications to WebLogic Server Backup and restore a WebLogic Server domain Create a WebLogic Server domain Configure and monitor WebLogic Server Configure WebLogic Server database resources Create and configure a WebLogic Server cluster Install WebLogic Server 12c This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server. This Oracle WebLogic Server 12c: Administration I training teaches administrators to install and configure Oracle WebLogic Server 12c. It gives administrators an overview of the basic concepts and architecture of WebLogic Server.
Join us for the ultimate crash course in all things social media. Learn the essential tips and tricks to conquer the digital world. Essential Guide to Social Media Join us for an online event that will help you navigate the ever-changing world of social media. Whether you're a newbie or a seasoned pro, this event is for you! Our expert speakers will share insider tips and tricks to boost your social media game. From mastering Instagram to harnessing the power of Facebook ads, we've got you covered. Don't miss out on this opportunity to connect with like-minded individuals and learn from the best in the biz. Sign up now and take your social media presence to the next level!
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 is a Cisco ISE training program that discusses the Cisco Identity Services Engine, an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device onboarding, and guest management, into a single context-aware identity-based platform. This CCNA course provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints as well as enhance infrastructure security using the Cisco ISE. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F
Duration 3 Days 18 CPD hours This course is intended for Team leaders, managers, executives, and other business and IT professionals who lead others as well as Individual contributors ready for transformational self-development as a leader. Overview Recognize vulnerability as the emotion we feel during times of uncertainty, risk, and emotional exposure. Explain why courage requires vulnerability. Establish a link between what I learned and behaviors I want to change. Recognize the critical role that self-awareness plays in daring leadership. Give examples to support how armor - not fear -is the greatest obstacle to daring leadership. Identify the four skill sets that make up courage: rumbling with vulnerability, living into our values, BRAVING trust, and learning to rise. Recognize that courage is a collection of four skill sets that are measurable, observable, and teachable. Recognize that vulnerability is the birthplace of many of the behaviors that define daring leadership, including creativity, accountability, and difficult conversations. Give examples of why daring leadership requires showing up for hard conversations and rumbles, including giving and receiving feedback. This workshop is all about your own leadership self-awareness, identifying your call to courage as a leader and the learning, practice and integration of the four courage skills sets so you can show up authentically in life and leadership. Dare to Lead? is the ultimate playbook for developing brave leaders and courageous cultures. The greatest barrier to daring leadership is not fear; the greatest obstacle is armor ? how we self-protect when we feel uncertainty, risk and emotional exposure. Learn the skills to move from armored leadership to daring leadership. Daring leaders are self-aware, know how to have hard conversations, hold themselves and others accountable, build trust, lead with empathy and connection, take smart risks that lead to innovation, reset quickly after disappointments and setbacks, and give and receive feedback. This interactive curriculum is delivered in five, half-day sessions and is based on the research by Brenâ Brown. This course comes with a PDF workbook and an Amazon gift card to purchase the Dare to Lead? book in the version of your choice. You also have access to a series of leadership and personal development assessments and exclusive training videos led by Dr. Brenâ Brown. At the end of the event, a digital badge is awarded to those who complete 24 hours of course content. The Heart of Daring Leadership Permission Slips Container Building Armored Leadership versus Daring Leadership Call to Courage Assembling Our Armor Building Grounded Confidence to Replace our Armor Aplying the 5Cs Self-Awareness & Emotional Literacy Developing Emotional Literacy Getting Curious About Emotions Exploring the Iceberg The Myths of Vulnerability Rumbling with Vulnerability The Six Myths of Vulnerability Exploring Your Arena Shame Resilience Shame 101 Defining Shame The Physiology of Shame Shame Shields How Shame Shows Up in Organizations How Shame Shows up at Work Empathy and Self-Compassion Attributes of Empathy What Does Empathy Look Like? Empathy Misses Comparative Suffering Self-Compassion Talk to Yourself the Way You Talk to Someone You Love Empathy & Self-Compassion Commitment Supplemental Exercise: Kristin Neff?s Self-Compassion Scale Supplemental Exercise: Putting Empathy, Curiosity, and Rumble Tools in Action Living Into Our Values Living Into Our Values Values Clarification Taking Values from Professing Words to Practicing Behaviors Grounded Confidence and Rumbling Skills Grounded Confidence and Rumbling Skills Rumble Starters The 5Cs of Strategic Thinking, Decision Making, and Delegation Using the 5Cs Supplemental Exercise ? Gritty Faith & Gritty Facts Supplemental Exercise ? Horizon Conflict Engaged Feedback Giving Engaged Feedback Recognizing Defensiveness in Feedback Conversations BRAVING Trust BRAVING Trust Square Squad Rumbling with Self-Trust Trust with Others Trust on Teams Rumbling with Living BIG Learning to Rise: The Reckoning Learning to Rise: The Rising Strong Process The Rising Strong Process Getting Emotionally Hooked Offloading Hurt: Barriers to Reckoning with Emotion Strategies for Reckoning with Emotion The Rumble and The Revolution Writing My SFD The Delta The Revolution: When the Process Becomes a Daily Practice Supplemental Exercise ? Reset and Resilience Practices Integration Dare to Lead Integration Plan
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase AdministratorsDatabase DesignersSupport EngineerTechnical Administrator Overview Monitor the DatabaseManage Database PerformanceImplement Database AuditingConfigure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and TasksSchedule Jobs to Run Inside or Outside of the DatabaseConfigure Oracle Net ServicesConfigure your Database For Backup and Recovery OperationsDescribe Oracle Database ArchitectureManage the Oracle Database InstanceManage Oracle Database Storage structuresCreate and Administer User Accounts The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance. The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.
Duration 3 Days 18 CPD hours This course is intended for Cluster administrators (Junior systems administrators, junior cloud administrators) interested in deploying additional clusters to meet increasing demands from their organizations. Cluster engineers (Senior systems administrators, senior cloud administrators, cloud engineers) interested in the planning and design of OpenShift clusters to meet performance and reliability of different workloads and in creating work books for these installations. Site reliability engineers (SREs) interested in deploying test bed clusters to validate new settings, updates, customizations, operational procedures, and responses to incidents. Overview Validate infrastructure prerequisites for an OpenShift cluster. Run the OpenShift installer with custom settings. Describe and monitor each stage of the OpenShift installation process. Collect troubleshooting information during an ongoing installation, or after a failed installation. Complete the configuration of cluster services in a newly installed cluster. Installing OpenShift on a cloud, virtual, or physical infrastructure. Red Hat OpenShift Installation Lab (DO322) teaches essential skills for installing an OpenShift cluster in a range of environments, from proof of concept to production, and how to identify customizations that may be required because of the underlying cloud, virtual, or physical infrastructure. This course is based on Red Hat OpenShift Container Platform 4.6. 1 - Introduction to container technology Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform. 2 - Create containerized services Provision a server using container technology. 3 - Manage containers Manipulate prebuilt container images to create and manage containerized services. 4 - Manage container images Manage the life cycle of a container image from creation to deletion. 5 - Create custom container images Design and code a Dockerfile to build a custom container image. 6 - Deploy containerized applications on OpenShift Deploy single container applications on OpenShift Container Platform. 7 - Troubleshoot containerized applications Troubleshoot a containerized application deployed on OpenShift. 8 - Deploy and manage applications on an OpenShift cluster Use various application packaging methods to deploy applications to an OpenShift cluster, then manage their resources. 9 - Design containerized applications for OpenShift Select a containerization method for an application and create a container to run on an OpenShift cluster. 10 - Publish enterprise container images Create an enterprise registry and publish container images to it. 11 - Build applications Describe the OpenShift build process, then trigger and manage builds. 12 - Customize source-to-image (S2I) builds Customize an existing S2I base image and create a new one. 13 - Create applications from OpenShift templates Describe the elements of a template and create a multicontainer application template. 14 - Manage application deployments Monitor application health and implement various deployment methods for cloud-native applications. 15 - Perform comprehensive review Create and deploy cloudinative applications on OpenShift.