Duration 5 Days 30 CPD hours This course is intended for This course is designed for business analysts. Overview After completing this course, you should be able to:Describe the benefits of implementing an Operational Decision Manager solution, and the collaboration that is required between the business and development teamsIdentify the main user roles that are involved in designing and developing an Operational Decision Manager solution, and the tasks that are associated with each roleExplain modeling concepts and the UML notation that is relevant to modeling for business rules and eventsDefine and implement object models for business rulesSet up the rule authoring environment in Designer by working with decision services and synchronizing across development and business environmentsCustomize the vocabulary that is used in rulesDiscover and analyze business rules for implementationUse the Operational Decision Manager rule editors to author business rules and decision tablesRun tests and simulations in the Decision Center Enterprise console to validate decision logic and rule changesExplain governance issues and work with Operational Decision Manager features that support decision governance This course introduces business analysts to IBM Operational Decision Manager V8.7.1. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager. Course Outline Course introduction Introducing IBM Operational Decision Manager V8.7.1 Exercise: Operational Decision Manager in action Modeling for business rules Exercise: Building the model on paper Exercise: Implementing the model Understanding decision services Exercise: Setting up a decision service Working with the BOM Exercise: Working with the BOM Introducing Decision Center Exercise: Exploring the Decision Center Business console Exercise: Exploring the Decision Center Enterprise console Introducing rule authoring Exercise: Understanding the case study Discovering and analyzing rules Exercise: Discovering rules Exercise: Analyzing rules Working with conditions in rules Exercise: Working with conditions in rules Working with definitions in rules Exercise: Working with definitions in rules Writing complete rules Exercise: Writing complete rules Authoring decision tables and trees Exercise: Authoring decision tables and trees Exercise: Authoring rules: Putting it all together Running tests and simulations in the Enterprise console Exercise: Running tests and simulations in the Enterprise console Introducing decision governance Exercise: Working with the decision governance framework Course summary
Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for IT professionals who support a Cisco ACI data center network, including: Data center engineers Field engineers Network engineers Systems engineers Overview After taking this course, you should be able to: Operationalize and troubleshoot the ACI fabric Understand Cisco Application Policy Infrastructure Controller (APIC) and its monitoring, management, and troubleshooting capabilities Avoid common mistakes and recognize common symptoms The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v1.0 course shows you how to operate and troubleshoot Cisco© data center network infrastructure running Cisco ACI. Through expert instruction and hands-on practice, you will learn about operational tools, and best practices and caveats for configuration management, performance tracking, and more. You will practice troubleshooting common issues on a live fabric. Based on lessons learned in over 100 production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment. Course Outline ACI Overview and Configuration Review ACI Configuration Management Installing, Upgrading, Backing Up, and Restoring ACI Fabric Monitoring ACI Always-On and On-Demand Monitoring Tools Exercises: Visore, CLI Commands, Audit Logs, Traffic Map Troubleshooting ACI Methodologies, Tools, and Specific Examples Exercises: iPing, End Point Tracker, Troubleshooting Tool, Contract Drops, Contracts, Traceroute, Atomic Counters Additional course details: Nexus Humans Cisco ACI Operations and Troubleshooting Boot Camp (DCACIO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco ACI Operations and Troubleshooting Boot Camp (DCACIO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is a must-have for the Business Analyst, Business Systems Analyst, Systems Analyst, and Requirements Engineer. The Business Sponsor and the Project Manager who are actively involved with specifying requirements for their project will also benefit from this workshop. Overview Describe the planning, techniques, and partnerships that are vital to the success of requirements elicitationIdentify and differentiate between the different types of requirements that need to be elicitedDescribe the importance of documenting business objectives and project scope before eliciting requirementsUtilize a context diagram to scope the requirementsUtilize a process, techniques, and templates for stakeholder identification and analysisApply industry best practices to common issues with Stakeholders during requirements elicitationPlan and conduct a good InterviewIntroduce standards in process modelingPlan and develop a prototype to elicit requirements In this interactive 2-day course, you will learn how to enhance and refine your elicitation skills. Working in small groups, you will practice new techniques and discuss strategies that your organization should be using to better define stakeholder needs. Day 1 Unit 1: Course Introduction Unit 2: Fundamentals of Requirements Elicitation Unit 3: Understanding the Project Objectives and Scope Unit 4: Identifying and Analyzing Your Stakeholders Unit 5: Interviewing Techniques Day 2 Unit 6: Facilitation Techniques Unit 7: Process Modeling Unit 8: Prototyping Unit 9: Document Analysis, Interface analysis, and Reverse Engineering Unit 10: Course Summary Additional course details: Nexus Humans BA26 - Requirements Elicitation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA26 - Requirements Elicitation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow
Duration 1 Days 6 CPD hours This course is intended for It is essential information for beginning IT Asset Managers and other IT professionals involved in asset management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview During this course, students learn best practices in Software Asset Management Reducing Risk Increasing Accountability Uncovering Savings Gaining Control of the IT Environment The IAITAM Certified Software Asset Manager (CSAM) Course is a foundational education program that ensures students are able to manage software assets. Students also learn about the ever-changing variables throughout our industry. From software piracy and compliance issues to legislation and organizational challenges, it is necessary to evaluate both the internal and external influences that bring about change in how organizations manage their IT assets. A successful Software Asset Manager must look at the overall goals of the organization and determine where Software Asset Management will be a strategic influence in achieving those goals. This course also includes the exam for CSAM certification. Course Outline The Scope of Software Strategic License Management Software Harvesting License Documentation The Right to Audit Proactive vs. Reactive SAM Developing Goals Savings Opportunities ITAM Compliance Audit Letter Examples of License Data Documentation Compliance Enforcement Understanding the EULA Due Diligence for Compliance The Art of Negotiation Ts & Cs Advice ITAM Automation Selecting a Discovery Tool ITAM Repository Hardware & Organizational Impacts Additional course details: Nexus Humans Certified Software Asset Manager (CSAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Software Asset Manager (CSAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little or no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC traffic management. Overview Optimize the Citrix ADC system for traffic handling and management Customize the ADC system for traffic flow and content-specific requirements Employ recommended tools and techniques to troubleshoot common Citrix ADC network and connectivity issues Configure advanced load balancing and GSLB on the Citrix ADC system Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing. At the end of the course, students will be able to configure their ADC environments to address efficient traffic switching and resilience requirements including Content Switching, Traffic Optimization, and Disaster Recovery. Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings App Expert Additional Features Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Content Switching Content Switching Overview Content Switching Configuration Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB Additional course details: Nexus Humans CNS-224: Implement Citrix ADC 13.x with Traffic Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-224: Implement Citrix ADC 13.x with Traffic Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers and engineers including: Network Engineer Systems Engineer Data Center Engineer Consulting Systems Engineer Technical Solutions Architect Cisco Integrators/Partners Field Engineer Server Administrator Network Manager Overview After taking this course, you should be able to: Describe the Cisco ACI built0in tools for operating and monitoring the fabric. Describe the complex challenges related to monitoring and Cisco tools that address them: Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights. Describe fabric installation upgrade, backup, restore, and best practices for Cisco NX-OS-to-ACI migration and Cisco ACI management access. Describe the tools and best practices for monitoring ACI fabric. Describe best practices for Cisco ACI naming conventions, Day-0 configuration, VMM integration, and Cisco ACI migrations. The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v5.2 course shows you how to manage, monitor, and troubleshoot Cisco© Nexus© 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. Through expert instruction and hands-on practice, you will learn about operational tools, best practices, caveats, and practice troubleshooting common issues on a live fabric. Based on lessons learned in wide range of production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment. Course Outline Describing Cisco ACI Day-0 to Day-2 Operations Describing Day-2 Operational Tools Describing Cisco ACI Configuration Management Describing Cisco ACI Monitoring Cisco ACI Best Practices Additional course details: Nexus Humans Cisco Application Centric Infrastructure Operations and Troubleshooting v5.2 (DCACIO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Application Centric Infrastructure Operations and Troubleshooting v5.2 (DCACIO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.