Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for experienced administrators with a background in either software development or system administration. Team leaders, lead developers, and other accidental Team Foundation Server administrators are also encouraged to take this course. This course will also help a student prepare for the relevant Microsoft certification exam. Overview At course completion, attendees will have had exposure to: - TFS editions and components - Supported topologies and environments - Must-have TFS administration tools - Hardware and software requirements - Required service accounts and permissions - Installing Team Foundation Server - Configuring Team Foundation Server - Managing relevant SQL Server components - Managing relevant SharePoint components - Installing and using Team Explorer - Team project collections and team projects - Using and customizing process templates - TFS licensing and Client Access Licenses - Connecting and using Microsoft Excel & Project - Installing and using Team Explorer Everywhere - Integrating TFS and SharePoint - Using the TFS web portal - Git and TFVC version control systems - Basic and advanced version control workflows - Configuring and using code search - Controlling access to version controlled items - Command-line and third party tools - Configuring automated builds - Deploying and using Visual Studio agents - Configuring agent pools and queues - Creating and queuing automated builds - Configuring Package Management - Configuring Release Management - Creating a release definition - Creating and deploying a release - Strategies for upgrading and migrating to TFS - Integrating TFS with other systems and data - High availability and scalability options - Capacity planning and disaster recovery - Backing up, restoring, and moving TFS data - Managing the data warehouse - Using PowerShell to manage TFS - Customizing Team Foundation Server - Extending Team Foundation Server Provides students with the knowledge and skills to deploy, configure, and manage Microsoft Team Foundation Server 2019 and related software components. Introduction to Team Foundation Server Introduction to Team Foundation Server Editions, components, and configurations Visual Studio Team Services comparison TFS' support of Application Lifecycle Management TFS administrator responsibilities and tasks ?Must-have? tools of a TFS administrator Planning and Deploying TFS Planning the deployment System requirements, software, and accounts Installing and configuring TFS Installing Team Explorer Troubleshooting Configuring TFS Administrator roles and tools Managing team project collections Managing team projects Managing process templates Securing TFS, SharePoint, and SQL Server Renaming and deleting a team project Client Applications TFS Client Access Licenses (CAL) Team Explorer and the web portal Microsoft Excel and Microsoft Project SharePoint project portal Team Explorer Everywhere Command-line and 3rd party tools Version Control Overview of Git and TFVC version control systems Integration with Visual Studio Using TFVC and Git version control Basic and advanced workflows Controlling access to version control Command-line tools and utilities TFS Proxy, MSSCCI Provider, and TFS Sidekicks Building and Releasing Overview of the Visual Studio build system Build agents, agent pools, agent queues Creating and queuing a build Monitoring, and managing a build Securing the build process Running tests as part of the build Overview of Package Management Overview of Release Management Defining, creating, and deploying a release Upgrading, Migrating, and Integrating Upgrading Team Foundation Server In-place vs. migration upgrade Performing post-upgrade tasks Migrating work items Migrating items under version controlled Integrating with Team Foundation Server Custom and 3rd party solutions Advanced Administration Monitoring the health of Team Foundation Server Web-based diagnostic tools Options for scalability and high availability Disaster recovery, backup, and restore Moving Team Foundation Server Managing the data warehouse Using PowerShell to manage TFS Customizing and Extending Customizing vs. extending Customizing a process template Customizing a work item type Creating default work items Creating and using a global list Using Witadmin.exe Using work item templates Creating a custom report Using the REST API to extend Team Foundation Server Additional course details: Nexus Humans Administering Team Foundation Server 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Team Foundation Server 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. This course provides participants with a foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices with banks of sample questions. PMI-ACP© Exam Preperation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process Core Agile Concepts Core Agile Concepts Overview Traditional Project Management Methodologies Drawbacks of Waterfall Methodologies Agile Approach Empirical Process Control Agile and Traditional Project Management Choice of Methodologies/Frameworks The Agile Manifesto The Agile Manifesto Overview Manifesto Contributors Manifesto Values Manifesto Principles Common Agile Methodology Elements Common Agile Methodology Elements Overview Project (Product; Release) Initiation Agile Planning Iteration Planning and Executing Project Initiation Project Initiation Overview Determine Project Justifications and Metrics Provide Value-Driven Delivery Write Project Vision Statement Create Project Charter Identify Stakeholders and Leader/Coach Form Project Team Agile Teams and Team Space Agile Teams and Team Space Overview Scrum Master/Coach Product Owner/Customer Team Members/Developers (XP) Trackers and Testers Other Roles Team Space Physical Space Recommendations Agile Planning Agile Planning Overview Develop Epics and Stories Create Stories Non-Customer Facing Stories Personas and Extreme Personas Story Maps Estimating Stories Prioritizing Stories Create Product Backlog Create Product Roadmap Conduct Release Planning Create Parking Lot Iterations/Sprints Iterations/Sprints Overview Velocity Determination Iteration Planning Meeting Iteration Planning Guidelines Development Testing Daily Standup Meetings Progress Tracking Velocity Tracking Interpersonal Aspects of Agile Interpersonal Aspects of Agile Overview Methodologies and Uncertainty Coach/Scrum Master Team Motivation Soft Skills Emotional Intelligence Collaboration Negotiations Active listening Conflict Resolution Speed Leas? Model of Group Conflict Conducting Retrospectives Mindsets of Agile Coaches Leadership Stages Key Coaching Responsibilities Agile Methodologies Agile Methodologies Overview XP and Scrum Terms XP Terms and Concepts XP Primary Practices XP Corollary Practices Scrum Lean Software Development Seven Principles of Lean Seven Types of Muda Responsibilities Core Beliefs of Lean-Agile Software Development Other Principles of Lean-Agile Software Development Value Stream Mapping Lean-Agile Software Development Portfolio Management Additional course details: Nexus Humans PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. Course Introduction Introductions and course logistics Course objectives Overview of Network Transformation Reviews the technologies that enable modern networks Lists the components of modern service provider networks Outlines characteristics of modern service provider networks in meeting customer application needs Service Delivery with VMware Telco Cloud Outlines the components of the VMware Telco Cloud portfolio Reviews the role each VMware Telco Cloud product plays in delivering telco services Specifies the dependencies each product has on underlying technologies Supporting VMware Telco Cloud Service Delivery Reviews the products that implements the virtualization, management, platform, and orchestration layers Outlines the role played by other VMware products such as NSX in delivering cloud services Outline opensource integration options with VMware Telco Cloud products Securing VMware Telco Cloud Reviews security threats that affect telco services Identifies the critical telco assets that are prone to attack Outlines best practice for securing VMware Telco Cloud products and underlying technology Provides overview of appropriate security controls for VMware Telco Cloud products Assessing Service Provision Reviews tools and methodologies used to gather requirements Outlines how to assess cloud-native capabilities Documenting findings Identifying security vulnerabilities with Helm. Reviews VMware?s Customer Engagement process Capturing infrastructure requirements from TCA Designing a VMware Telco Cloud Solution Selecting appropriate deployment topology Pros and cons of design choices How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture Outlines typical scenarios where specific products align with identified requirements Documenting a design Designing for availability Ensuring a design aligns with best practice Specifying monitoring options Implementing VMware Telco Cloud Products Review deployment options for VMware products Integrating new products with existing ones Outline post-installation tasks Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight Ensuring products meet security requirements Configuring monitoring software Outlines the xNF onboarding process in TCA Maintaining Telco Services Outlines typical administrative tasks in ensuring services are maintained Use of native and other VMware performance monitoring tools Reviewing performance data Role of SLAs in service maintenance Reviews scenarios where known behaviors indicate problems Troubleshooting Deployed Telco Services Reviews the troubleshooting tools available Using tools to gather useful data Outlines how event correlation can be used to isolate problems Using a methodology to determine the root cause of a problem Steps to identify and resolve a problem Reviews scenarios where known problems are isolated and resolution steps identified Scaling VMware Telco Cloud Products Assessing if operations are impacted by lack of resources now or will be in the future Reviews performance optimization options Identifies implications for other products if you scale VMware Telco Cloud products Reviews VMware sizing guidelines Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for an IT person wanting to learn about administrating SharePoint 2016. Overview After completing this course, you will be able to: The Installation and configure a SharePoint 2016 Farm How to manage a SharePoint 2016 Farm through the GUI and PowerShell How to create site collections via GUI and PowerShell How to create and configure the all the required service applications for SharePoint 2016 How to backup and restore in SharePoint 2016 This SharePoint 2016 Administrator course is design for Administrators who are new to SharePoint Server Administration or who are upgrading from previous versions of SharePoint.This course covers content that was in retired Microsoft Course 20339-1. Module 1: Hardware, Installation and Patching How to build a Min Role Farm How to View ULS Logs How to document and check IIS Settings for SharePoint 2016 Module 2: Farm Management How to manage the SharePoint Farm Administors group How to configure Outgoing Email How to configure Incoming Email How to Configure Diagnostic and Usage Log Options Module 3: Web Applications How to define a new Managed Account How to add new IP Addresses to a SharePoint Server How to create a claims based web application in SharePoint Central Administration How to create a claims based web application in PowerShell How to create a hosting web application in PowerShell Module 4: Site Collections How to create a managed path How to create a site collection using SharePoint Central Administration How to create a site collection using PowerShell How to create a site collection in its own database using SharePoint Central Administration How to create a site collection in its own database using PowerShell How to create a host named site collection using PowerShell Module 5: Service Applications How to create a State Service Application How to create a Search Service Application How to create the Managed Metadate Service Module 6: Application Management How to add a new IP and Certificate to a SharePoint Web Application How to configure DNS for SharePoint Web Application How to Create a Subscription Settings Service Application How to create the Application Management Application Service How to configure the application URLs How to create the App Catalog Site Colleciton How to Add Apps to the catalog Module 7: Managing the User Profile Service How to create the My Site Web Application How to create the User Profile Service Application How to Configure the User Profile Synchronization Permissions How to create the Active Directory Import Connection How to assign permissions for the AD Group to create a My Site How to create a My Site Module 8: Search How to view the currenty Search Topology How to create an Enterprise Search Centre How to configure a new search schema property How to create a site collection-level result source How to create a new content source Module 9: Office Online Server How to install the pre-requisites for Office Online Server How to install the Office Online Server Binaries How to create the Office Online Server SSL Certifcate How to create the Office Online Server Farm How to connect to the farm from SharePoint How to test the connectivity Module 10: Enterprise Content Management How to create and Apply a site policy How to create discovery sets How to configure In Place records management How to configure the records centre How to configure DLP Module 11: Web Content Management How to configure cross-site publication How to configure content deployment Module 12: Workflow Server How to install Workflow Manger server and Client Binaires How to configure the workflow farm How to patch the workflow farm manager and clients How to register the workflow service in SharePoint How to test Workflow creation Module 13: Business Connectity Services and Secure Store How to configure the secure store service How to create the BCS service Application How to setup the products database How to import the BCS Definition How to use the BDC file in a list web part Module 14: Hybrid SharePoint Shown and Demonstrated the Hybrid features of SharePoint 2016 Module 15: Backup and Restore How to backup SharePoint 2016 Content How to delete SharePoint 2016 Content How to restore SharePoint 2016 Content via PowerShell How to recover a unattached content database Module 16: Upgrade How to restore and attach a SharePoint 2013 Database How to upgrade a SharePoint 2013 MMS Service Application Additional course details: Nexus Humans 55355 SharePoint 2016 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55355 SharePoint 2016 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback
Duration 5 Days 30 CPD hours This course is intended for Application DevelopersBusiness AnalystsBusiness Intelligence DeveloperData ModelersData Warehouse AdministratorData Warehouse AnalystReports DeveloperTechnical Consultant Overview Build and run analyses to test and validate a repositorySet up query logging for testing and debuggingSet up a multiuser development environmentUse the Administration Tool wizards and utilities to manage, maintain, and enhance repositoriesEnable usage tracking to track queries and database usage, and improve query performancePerform a patch merge in a development-to-production scenarioDescribe Exalytics machine and the Summary Advisor tool used in the machineBuild simple and calculated measures for a fact tableCreate logical dimension hierarchies and level-based measuresCheck the model and then model aggregate tables to speed query processingModel partitions and fragments to improve application performance and usabilityUse variables to streamline administrative tasks and modify metadata content dynamicallyUse time series functions to support historical time comparison analysesSet up security to authenticate users and assign appropriate permissions and privilegesBuild the Physical, Business Model and Mapping, and Presentation layers of a repositoryApply cache management techniques to maintain and enhance query performance This Oracle BI 11g R1: Build Repositories training is based on OBI EE release 11.1.1.7. Expert Oracle University instructors will teach you step-by-step procedures for building and verifying the three layers of an Oracle BI repository. This Oracle BI 11g R1: Build Repositories training is based on OBI EE release 11.1.1.7. Expert Oracle University instructors will teach you step-by-step procedures for building and verifying the three layers of an Oracle BI repository. Additional course details: Nexus Humans Oracle BI 11g R1 - Build Repositories training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle BI 11g R1 - Build Repositories course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.