Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview Please refer to course overview This course is designed to teach you how to:Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.Implement Db2 Self Tuning Memory management for specific database memory areas. Advanced MonitoringDb2 Table Space ManagementDb2 Database Memory ManagementDatabase rebuild supportDb2 database and tablespace relocationDb2 Incremental Backup
Duration 3 Days 18 CPD hours This course is intended for Field engineers Network engineers Network administrators System engineers Overview After taking this course, you should be able to: Describe Cisco SD-Access architecture and its components Explain Cisco DNA Center deployment models, scaling, and high availability Identify Cisco SD-Access fabric protocols and node roles Understand the Cisco SD-Access Wireless deployment models Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP Deploy simple Cisco SD-Access fabric networks Monitor health and performance of the network with Cisco DNA Center Assurance Interact with the Cisco DNA Center Platform Intent APIs The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco© Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks.You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFNDwill introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks. Course Outline Introducing Cisco SD-Access Introducing Cisco DNA Center Exploring Cisco SD-Access Solution Components Exploring Cisco SD-Access Wireless Architecture Automating Network Changes with Cisco DNA Center Deploying Fabric Networks with Cisco DNA Center Exploring Cisco DNA Center Assurance Exploring Cisco DNA Center Programmability
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators , Cloud solution architects , Customer sales engineers , DevOps engineers , Sales engineers , Systems engineers, Technical solutions architects. Overview After taking this course, you should be able to: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multi-tenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud The course, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) v1.0 teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes. Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs
Duration 3 Days 18 CPD hours This course is intended for Project team members & Consultants In this course, students become familiar with logistics invoice verification as the final stage in the external procurement process. Students also learn how to enter invoices relating to purchase orders, block them, and release them for payment. Course Outline Introduction to invoice verification Invoice entry and parking Taxes, cash discounts, and foreign currency Invoices for purchase orders with account assignment Variances with and without reference to an item, invoice blocking reasons Invoice reduction, releasing blocked invoices Delivery costs Subsequent debits and credits Credit memos and cancellations Invoice verification in the background Automated processing GR/IR clearing account maintenance Customizing for invoice verification
Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client⢠to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority⢠to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi⢠host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms
Duration 4 Days 24 CPD hours This course is intended for System administrators System engineers Migration engineers Migration architects Overview By the end of the course, you should be able to meet the following objectives: Describe core VMware HCX use cases and common triggers for mobility Describe the core components and features of VMware HCX Describe a real-life example of a VMware HCX project Identify all major Cloud Providers offering and supporting VMware HCX Describe the features of VMware HCX services Explain the different deployment types for VMware HCX and choose the correct components to deploy for a particular use case Understand the resource, network, and VMware ESXi⢠and VMware vCenter requirements for VMware HCX Install and configure VMware HCX Understand, deploy, and manage the HCX Service Mesh Understand Network Extension and Traffic Engineering Create Network Extension and enable Mobility Optimized Networking Understand WAN Optimization Understand the different migration types and be able to choose the best one for different applications and workloads Incorporate VMware HCX into a disaster recovery strategy Design a VMware HCX deployment for different use cases Manage the lifecycle of VMware HCX This four-day course gives you knowledge and practical exercises sufficient to manage VMware HCX© and to migrate virtual machines using VMware HCX. The course focuses on configuration and management of VMware HCX. The course equips system administrators with the knowledge, skills, and abilities to achieve competence in migrating virtual machines. Course Introduction Introductions and course logistics Course objectives Introduction to VMware HCX Describe workload mobility challenges that VMware HCX addresses Recognize use cases for VMware HCX Identify all major Cloud providers offering and supporting VMware HCX HCX Services and Deployment Types Describe the functions of VMware HCX components Recognize the services provided by VMware HCX Recognize when to use different deployment types for VMware HCX Be able to choose which components to install and configure for a different VMware HCX service HCX Deployment Identify the resource, network, and ESXi/VMware vCenter server requirements for VMware HCX Understand the VMware vCenter user roles and access requirements Describe the installation workflow Install, activate, and configure VMware HCX manager Understand the compute and network profile requirements for VMware HCX and its services Create site pair, compute, and network profiles Describe and manage the HCX Service Mesh Create and configure a HCX Service Mesh Network Extension Describe network extension use case and benefits Compare the HCX-Network extension service with other solutions Examine Network Extension capabilities and topology Create a Network Extension Describe network traffic packet flow Describe Mobility Optimized Networking Enable Mobility Optimized Networking Describe the TCP Flow Conditioning and Application path resiliency feature of VMware HCX Recognize the key benefits of TCP flow conditioning and Application path resiliency Describe WAN optimization Workload Mobility Describe different migration types Recognize the limitation of each migration method and consideration when planning a migration Understand Bulk and Replication Assisted VMware HCX© vMotion© migration methods Migrate a VM using Bulk migration Describe cold and vMotion migration method Migrate a VM using HCX vMotion migration Examine non VMware vSphere© workload migration Migrate a VM using an OS assisted migration method Business Continuity and Disaster Recovery Examine disaster recovery concepts Describe disaster recovery networks Plan and create disaster recovery networks Describe VM protection operations Protect, recover, and test recovery and reverse replication of a VM Understand VMware HCX and SRM integration and value HCX Lifecycle Management Backup and restore the VMware HCX manager Locate and access VMware HCX logs Troubleshoot VMware HCX Plan for VMware HCX manager and component updates Customer Design Scenarios Design a VMware HCX deployment Choose workload mobility methods for the migration Discuss customer requirements and proposed design Discuss components, services, and migration methods for the scenario
Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course
Duration 3 Days 18 CPD hours This course is intended for Before taking this course delegates should already be familiar with basic analytics techniques, comfortable with basic data manipulation tools such as spreadsheets and databases and already familiar with at least one programming language Overview This course teaches delegates who are already familiar with analytics techniques and at least one programming language how to effectively use the programming language for three tasks: data manipulation and preparation, statistical analysis and advanced analytics (including predictive modelling and segmentation). Mastery of these techniques will allow delegates to immediately add value in their work place by extracting valuable insight from company data to allow better, data-driven decisions. Outcomes: After completing the course, delegates will be capable of writing production-ready R code to perform advanced analytics tasks enabling their organisations make better, data-driven decisions. Becoming a world class data analytics practitioner requires mastery of the most sophisticated data analytics tools. These programming languages are some of the most powerful and flexible tools in the data analytics toolkit. Topic 1 Intro to our chosen language Topic 2 Basic programming conventions Topic 3 Data structures Topic 4 Accessing data Topic 5 Descriptive statistics Topic 6 Data visualisation Topic 7 Statistical analysis Topic 8 Advanced data manipulation Topic 9 Advanced analytics ? predictive modelling Topic 10 Advanced analytics ? segmentation