• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

57530 Courses

Introduction to Test Automation Essentials (TT3511)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success

Introduction to Test Automation Essentials (TT3511)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Data Center engineers Cloud engineers System engineers Field engineers Implementation/operation/support/installation and upgrade specialists IT administrators Network engineers Cloud computing experts Security specialists Cisco integrators and partners Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe items to be aware of before installing a Cisco CSR 1000V, including virtual machine requirements for installing Cisco CSR 1000V, licensing options that are available with Cisco CSR 1000V, supported Cisco IOS XE technologies, and management options for Cisco CSR 1000V. Prepare for installation of Cisco CSR 1000V Series routers. Explain common Cisco IOS XE Command-Line Interface (CLI) commands and conventions that can make it easier to work in the CLI, and describe how you can get help with command syntax and command options. Describe the options you can use to activate the license for Cisco CSR 1000V and activate the license for each option. Troubleshoot issues with Cisco CSR 1000V licenses. Upgrade the Cisco IOS XE software for an existing Cisco CSR 1000V installation. Describe the Call Home feature and its benefits, configure the feature on the Cisco CSR 1000V, including the anonymous reporting option, and display the Call Home configuration. List the different Call Home events that trigger alerts and commands that are executed as a result of the alert. Troubleshoot Cisco CSR 1000V Virtual Machine (VM) issues. Rehost a Cisco CSR 1000V license to a new VM, whether the current Cisco CSR 1000V router is accessible or not. Describe the Virtual Extensible LAN (VXLAN) Layer 2 gateway feature and configure this feature on the Cisco CSR 1000V router. Deploy the Cisco CSR 1000V in a virtual private cloud using Microsoft Azure or Amazon Web Services (AWS). Describe common network operations that the Cisco CSR 1000V supports. Explore programmability support on Cisco CSR 1000V, including APIs, shells, and data models. The Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) course shows you how to deploy and operate Cisco© Cloud Services Router 1000V (CSR1000V) to provide comprehensive WAN gateway and network services functions including connectivity, routing, and security into virtual and cloud environments. Through expert instruction and hands-on labs, you will learn: Cisco CSR 1000V deployment options and requirements; hypervisor support, licensing models, features and programmability support; and how to implement, integrate, install, manage, and troubleshoot the deployment process and common operation issues.This class will help you:Learn how to use the CSR 1000V Series to extend your enterprise network to public and private cloudsGain hands-on practice acquiring skills in virtual and cloud-based technologies Course Outline Introducing Cisco CSR Product Overview Preparing for Installation Installing Cisco CSR 1000V in VMware Elastic Sky X (ESXi) Environments Booting Cisco CSR 1000V and Accessing the Console Using Cisco IOS XE Software Managing Cisco CSR 1000V Licenses Upgrading the Cisco IOS XE Software Mapping Cisco CSR 1000V Network Interfaces to Virtual Machine Network Interfaces Using GRUB Mode (Bootstrap Program) Configuring Call Home for Cisco CSR 1000V Configuring Virtual CPU (vCPU) Distribution Across Data, Control, and Service Planes Troubleshooting Cisco CSR 1000V Virtual Machine Issues Rehosting a Smart License Supporting the Cisco CSR 1000V Virtual Extensible LAN (VXLAN) Feature Deploying Cisco CSR 1000V in a Virtual Private Cloud Exploring Cisco CSR 1000V Operations Exploring Programmability on Cisco CSR 1000V

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)
Delivered OnlineFlexible Dates
Price on Enquiry

CVPD Scripting - Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Developers; Programmers, Sales and Pre Sales, Technical Support, Project Managers, Cisco customers, partners and employees involved in UCCE/CVP or CVP stand alone deployments Overview Upon completing this course, the learner will be able to meet these overall objectives: Introduction to the Java API, its capabilities and limitations - Practice - This course is applicable for any version of CVP and Studio. Introduction to Voice Elements and their complexity - creating every different Java component to extend Studio (see below) Overview of a UCCE with CVP Comprehensive Call Flow Module 1 Overview of a UCCE with CVP Comprehensive Call Flow Module 2 ICM routing scripts to route calls to CVP VXML Server applications Passing data (e.g., global variables) Parsing and evaluating data returned Queueing Assigning data to send to Finesse. Module 3 Writing Call Studio scripts (applications) Prompting Callers ? using pre-recorded audio; TTS text-to-speech; Say it Smart to format audio as digits, date, time, currency; input error reprompting Menus Collecting and confirming caller input, such as account numbers, dates of birth, etc Working with variables ? Session data, Element data, Call data, Local data (CVP11) Introduction to retrieving data from back end systems: SQL Database interaction ? using the Studio Database element to select data Web service interaction- Studio Web Services element for SOAP-web services and calling a simple REST web service Playing audio to callers during back-end data retrieval Catch events Working with counters, decisions, math Introduction to javascript for substrings and string length Setting VoiceXML properties affecting the gateway Multi-Language applications Module 4 Working with Version Control Module 5 ÿImplementing a Post Call Survey Module 6 Using the Studio Debugger to test applications within Studio Module 7 CVP Reporting Server and CVP CUIC Reports Best practices regarding naming elements and variables Configuring data to pass to the Reporting Server using OAMP Understanding Reporting Server tables Understanding the Application Summary CUIC reports Module 8 Administration covered throughout the course OAMP Operations Console to deploy applications to VXML Server Using Studio Documenter to print Visio-like diagrams of the application Configuring log file properties Using logs for debugging applications Administrative scripts for graceful updates or suspensions of the server Important log, debug, administration files Module 9 Cisco Courtesy Callback Detailed discussion of the CCB Call flow, the ICM script, and the 5 Studio scripts used for Courtesy Callback.

CVPD Scripting - Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: What's New [V8]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. Course Introduction Introductions and course logistics Course objectives Artificial Intelligence and Machine Learning Describe how device groups support AI and ML in vSphere 8 Describe how device virtualization extensions support AI and ML in vSphere 8 vSphere Distributed Services Engine Describe the benefits of Distributed Services Engine Explain how Distributed Services Engine works Recognize use cases for Distributed Services Engine Install ESXi on a host equipped with a DPU View DPU information in vSphere Client Add an ESXi host equipped with a DPU to a cluster Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager Create a vSphere Distributed Switch for network offloads Add a host with a DPU to the vSphere Distributed Switch Configure a VM to use Uniform Passthrough Mode vSphere and vCenter Management Review the improvements to the communication between vCenter and ESXi hosts Review the enhancements to the vCenter recovery process ESXi Enhancements Describe the function of the central configuration store in ESXi Explain how ConfigStore affects your interaction with ESXi configuration files Recognize the supported system storage partition configuration on ESXi 8.0 Identify devices supported for system storage on ESXi 8.0 Configure an RDMA host local device on ESXi vSphere Storage Describe the vSAN Express Storage Architecture Recognize the benefits of using vSAN Express Storage Architecture Describe the benefits of using NVMe Recognize the support for NVMe devices in vSphere Guest OS and Workloads Review the enhancements of the latest virtual hardware versions Describe the features introduced with virtual hardware version 20 Create a snapshot of a VM with an NVDIMM device Resource Management View energy and carbon emission metrics in vRealize Operations Manager Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality Describe how vMMR enhances the performance of vSphere DRS Security and Compliance Describe how to handle vTPM secrets when cloning a VM Manage OVF templates for VMs that are configured with vTPM Deploy an OVF template with vTPM Describe the enhancements to trusted binary enforcement in ESXi Describe ESXi 8 enhanced security features vSphere Lifecycle Manager Describe the enhancements to life cycle management of standalone ESXi hosts Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager Use Auto Deploy to boot a host with the desired image and configuration specifications Upgrade multiple ESXi hosts in a cluster in parallel Stage an ESXi host image prior to remediation Auto Deploy Manage custom host certificates using Auto Deploy vSphere with Tanzu Describe the features of the Tanzu Kubernetes Grid 2.0 offering Announcing vSphere+ Describe the functionality and benefits of vSphere+

VMware vSphere: What's New [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware App Volumes and Dynamic Environment Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for implementing VMware Horizon, Citrix XenApp and XenDesktop, and RDHS solutions. Overview By the end of the course, you should be able to meet the following objectives: Describe the features and functions of App Volumes and VMware Dynamic Environment Manager Demonstrate the architectures of App Volumes and VMware Dynamic Environment Manager Install and configure App Volumes Create and deploy Application Packages and writable volumes Install and configure VMware Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings This three-day course builds your skills in application management using VMware App Volumes© and VMware Dynamic Environment Manager©. You learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use VMware Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Overview of Application and Profile Management Profile Management Application Management Overview of App Volumes Describe the basic architecture and operation of App Volumes Explain the function of App Volumes Manager Explain the function of App Volumes Agent Describe the principles of SAM List the stages of application package life cycle Describe what is a writable volume and how it differs from an AppStack Identify the major requirements to deploy App Volumes App Volumes components App Volumes Installation Overview Describe the installation sequence for the App Volumes Manager Describe the App Volumes operation modes for packages and writable volumes Describe the App Volumes hypervisor connection types and their relationships with operation modes Describe the process of initial configuration of the App Volumes Manager Describe the basic configuration parameters and where these are configured in the App Volumes Manager Web interface Install and perform the initial configuration of the App Volumes Manager in a lab environment Describe the installation steps for the App Volumes Agent Install the App Volumes Agent in target client machines in a lab environment Working with Application Packages Explain the concept of simplified application packaging List the steps of application package life cycle Differentiate between an application, package, and program Create an application package Use markers to assign the new version of an application package Edit an application Edit a package Working with Writable Volumes Overview Describe what a writable volume is and where it is used Compare AppStacks with writable volumes Describe the operation of a writable volume Explain how to assign a writable volume to a desktop Create and assign a writable volume in a lab environment Working with AppStacks Explain how applications in an AppStack are available to a user Describe how to create an AppStack and populate it with applications Describe how to update an application in an existing AppStack Overview of Dynamic Environment Manager Describe VMware Dynamic Environment Manager and its architecture Describe the functional areas and benefits of VMware Dynamic Environment Manager Describe VMware Dynamic Environment Manager features and how it manages profiles Installation of Dynamic Environment Manager Recognize considerations for planning a Dynamic Environment Manager deployment Identify pre-configuration requirements before installing and starting the Dynamic Environment Manager - Management Console Recognize key steps in the installation process of Dynamic Environment Manager Describe the initial configuration process for the management console and FlexEngine Application Configuration Management Explain how a user can use the Dynamic Environment Manager Self-Support tool to recover from application configuration mistakes Explain how administrators and support staff can use the Dynamic Environment Manager Helpdesk Support Tool to troubleshoot profile problems Describe how the Dynamic Environment Manager SyncTool enables and synchronizes the offline use of Dynamic Environment Manager Describe how the Dynamic Environment Manager Application Profiler can be used to create predefined configurations for applications Application Configuration Management Predefined and user-customized application settings Using Application Profiler Using the Self-Support Tool Using the Helpdesk Support Tool

VMware App Volumes and Dynamic Environment Manager
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Design [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives NSX Design Concepts Identify design terms Describe framework and project methodology Describe the role of VMware Cloud Foundation? in NSX design Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX Manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe the NSX single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify EVPN requirements and design considerations Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Compare NSX NAT solutions Explain how to select DHCP and DNS services Compare policy-based and route-based IPSec VPN Describe an L2 VPN topology that can be used to interconnect data centers Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare the Federation disaster recovery designs NSX Optimization and DPU-Based Acceleration Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes Describe DPU-Based Acceleration Define the NSX features supported by DPUs Describe the hardware and networking configurations supported with DPUs

VMware NSX: Design [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center: Design [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and VMware NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX-T Data Center requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX-T Data Center Design logical switching and routing Recognize NSX-T Data Center security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX-T Data Center infrastructure across multiple sites Describe the factors that drive performance in NSX-T Data Center This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T? Data Center environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of NSX-T Data Center offered in release 3.2, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX-T Data Center architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives Design Concepts Identify design terms Describe framework and project methodology Describe VMware Validated Design? Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX-T Data Center architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile, VMware vSphere© Network I/O Control profile, and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe NSX-T Data Center single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX-T Data Center Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX-T Data Center security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX-T Data Center Describe stateful and stateless NSX-T Data Center NAT Identify benefits of NSX-T Data Center DHCP Identify benefits of metadata proxy Describe IPSec VPN and L2 VPN Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Describe a typical design for a KVM compute hypervisor with two pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX-T Data Center multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare Federation disaster recovery designs NSX Optimization Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available N-VDS enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes

VMware NSX-T Data Center: Design [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

OL19 IBM i System Administration

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s Overview Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security Develop a security plan for your Power Systems with IBM i Describe the options to implement security auditing Develop a plan to audit security on your Power Systems with IBM i Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i Develop a backup and recovery plan for your Power Systems with IBM i Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Class administration and introductions . IBM i overview and concepts . Management central overview . Security concepts and overview . System values . User security . Resource security . Security auditing . Designing security . IBM i availability overview . Disk management . Backup and recovery strategy using Save/Restore . Journal management . Commitment control overview . Backup and recovery planning . Problem determination . Overview of Systems Director Navigator for i . Introduction to BRMS .

OL19 IBM i System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to SQL Programming Basics (TTSQL002)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. Basic RDBMS Principles Relational design principles Accessing data through a structured query language Entity relationship diagrams Data Domains Null values Indexes Views Denormalization Data Model Review The SQL Language and Tools Using SQL*Plus Why Use SQL*Plus When Other Tools Are Available? Starting SQL*Plus EZConnect SQL Commands PL/SQL Commands SQL*Plus Commands The COLUMN Command The HEADING Clause The FORMAT Clause The NOPRINT Clause The NULL Clause The CLEAR Clause Predefined define variables LOGIN.SQL Command history Copy and paste in SQL*Plus Entering SQL commands Entering PL/SQL commands Entering SQL*Plus commands Default output from SQL*Plus Entering Queries What about PL/SQL? Using SQL Developer Choosing a SQL Developer version Configuring connections Creating A Basic Connection Creating A TNS Connection Connecting Configuring preferences Using SQL Developer The Columns Tab The Data Tab The Constraints Tab The Grants Tab The Statistics Tab Other Tabs Queries In SQL Developer Query Builder Accessing Objects Owned By Other Users The Actions Pulldown Menu Differences between SQL Developer and SQL*Plus Reporting Commands Missing In SQL Developer General Commands Missing In SQL Developer Data Dictionary report User Defined reports Using scripts in SQL Developer WHERE and ORDER BY WHERE clause basics Comparison operators Literals and Constants in SQL Simple pattern matching Logical operations The DUAL table Arithmetic operations Expressions in SQL Character operators Pseudo columns Order by clause basics Ordering Nulls Accent and case sensitive sorts Sampling data WHERE and ORDER BY in SQL Developer All, Any, Some Functions The basics of Oracle functions Number functions Character functions Date functions Conversion functions Other functions Large object functions Error functions The RR format mode; Leveraging your knowledge ANSI 92 JOINS Basics of ANSI 92 Joins Using Query Builder with multiple tables Table Aliases Outer joins Outer Joins In Query Builder Set operators Self-referential joins Non-Equijoins ANSI 99 Joins Changes with ANSI99 CROSS Join NATURAL Join JOIN USING JOIN ON LEFT / RIGHT OUTER JOIN FULL OUTER JOIN Subqueries Why use subqueries? WHERE clause subqueries FROM clause subqueries HAVING clause subqueries CORRELATED subqueries SCALAR subqueries DML and subqueries EXISTS subqueries Hierarchical queries TOP N AND BOTTOM N queries Creating subqueries using Query Builder Regular Expressions Available Regular Expressions Regular Expression Operators Character Classes Pattern matching options REGEX_LIKE REGEXP_SUBSTR REGEXP_INSTR REGEXP_REPLACE REGEXP_COUNT Analytics The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity More Analytics RANKING functions RANK DENSE_RANK CUME_DIST PERCENT_RANK ROW_NUMBER Windowing aggregate functions RATIO_TO_REPORT LAG / LEAD Linear Regression functions Inverse Percentile functions Hypothetical ranking functions Pattern Matching Additional course details: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to SQL Programming Basics (TTSQL002)
Delivered OnlineFlexible Dates
Price on Enquiry