• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17437 Addition courses

Advanced C Plus Plus

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for If you have worked in C++ but want to learn how to make the most of this language, especially for large projects, this course is for you. Overview By the end of this course, you'll have developed programming skills that will set you apart from other C++ programmers. After completing this course, you will be able to: Delve into the anatomy and workflow of C++ Study the pros and cons of different approaches to coding in C++ Test, run, and debug your programs Link object files as a dynamic library Use templates, SFINAE, constexpr if expressions and variadic templates Apply best practice to resource management This course begins with advanced C++ concepts by helping you decipher the sophisticated C++ type system and understand how various stages of compilation convert source code to object code. You'll then learn how to recognize the tools that need to be used in order to control the flow of execution, capture data, and pass data around. By creating small models, you'll even discover how to use advanced lambdas and captures and express common API design patterns in C++. As you cover later lessons, you'll explore ways to optimize your code by learning about memory alignment, cache access, and the time a program takes to run. The concluding lesson will help you to maximize performance by understanding modern CPU branch prediction and how to make your code cache-friendly. ANATOMY OF PORTABLE C++ SOFTWARE * Managing C++ Projects * Writing Readable Code NO DUCKS ALLOWED ? TYPES AND DEDUCTION * C++ Types * Creating User Types * Structuring our Code NO DUCKS ALLOWED ? TEMPLATES AND DEDUCTION * Inheritance, Polymorphism, and Interfaces * Templates ? Generic Programming * Type Aliases ? typedef and using * Class Templates NO LEAKS ALLOWED ? EXCEPTIONS AND RESOURCES * Exceptions in C++ * RAII and the STL * Move Semantics * Name Lookup * Caveat Emptor SEPARATION OF CONCERNS ? SOFTWARE ARCHITECTURE, FUNCTIONS, AND VARIADIC TEMPLATES * Function Objects and Lambda Expressions * Variadic Templates THE PHILOSOPHERS' DINNER ? THREADS AND CONCURRENCY * Synchronous, Asynchronous, and Threaded Execution * Review Synchronization, Data Hazards, and Race Conditions * Future, Promises, and Async STREAMS AND I/O * File I/O Implementation Classes * String I/O Implementation * I/O Manipulators * Making Additional Streams * Using Macros EVERYBODY FALLS, IT'S HOW YOU GET BACK UP ? TESTING AND DEBUGGING * Assertions * Unit Testing and Mock Testing * Understanding Exception Handling * Breakpoints, Watchpoints, and Data Visualization NEED FOR SPEED ? PERFORMANCE AND OPTIMIZATION * Performance Measurement * Runtime Profiling * Optimization Strategies * Cache Friendly Code

Advanced C Plus Plus
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. FUNDAMENTALS OF INFORMATION PRIVACY * Reviewing the modern history of privacy * Foundational privacy concepts * Data protection roles and fair information practices * Exploring the impacts of privacy and data protection regulations on information management PRIVACY IN THE IT ENVIRONMENT * Compliance requirements * IT risks * Stakeholder privacy expectations * Differentiating between privacy and security CORE PRIVACY CONCEPTS * Foundational elements for embedding privacy in IT * Common privacy principles * Data protection by design and default PRIVACY CONSIDERATIONS IN THE INFORMATION LIFE CYCLE * Privacy considerations throughout the stages of the information life cycle PRIVACY IN SYSTEMS AND APPLICATIONS * Examining the risks inherent in the IT environment and options for addressing them * Identity and access management * Credit card information and processing * Remote access * BYOD and telecommuting * Data encryption * Additional privacy-enhancing technologies in the enterprise environment PRIVACY TECHNIQUES * Strengths and weaknesses of authentication techniques * Using identifiers * Privacy by design ONLINE PRIVACY ISSUES * Unique challenges that come from online privacy issues * Laws and regulations * Online threats * Social media * E-commerce * Tracking technologies * Web security protocols TECHNOLOGIES WITH PRIVACY CONSIDERATIONS * Privacy considerations associated with a variety of technologies * Cloud computing * Wireless IDs * Location-based services * ?Smart? technologies * Video/data/audio surveillance * Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. MODULE 1: DETECTING INTRUSIONS WITH SNORT 3.0 * History of Snort * IDS * IPS * IDS vs. IPS * Examining Attack Vectors * Application vs. Service Recognition MODULE 2: SNIFFING THE NETWORK * Protocol Analyzers * Configuring Global Preferences * Capture and Display Filters * Capturing Packets * Decrypting Secure Sockets Layer (SSL) Encrypted Packets MODULE 3: ARCHITECTING NEXTGEN DETECTION * Snort 3.0 Design * Modular Design Support * Plug Holes with Plugins * Process Packets * Detect Interesting Traffic with Rules * Output Data MODULE 4: CHOOSING A SNORT PLATFORM * Provisioning and Placing Snort * Installing Snort on Linux MODULE 5: OPERATING SNORT 3.0 * Start Snort * Monitor the System for Intrusion Attempts * Define Traffic to Monitor * Log Intrusion Attempts * Actions to Take When Snort Detects an Intrusion Attempt * License Snort and Subscriptions MODULE 6: EXAMINING SNORT 3.0 CONFIGURATION * Introducing Key Features * Configure Sensors * Lua Configuration Wizard MODULE 7: MANAGING SNORT * Pulled Pork * Barnyard2 * Elasticsearch, Logstash, and Kibana (ELK) MODULE 8: ANALYZING RULE SYNTAX AND USAGE * Anatomy of Snort Rules * Understand Rule Headers * Apply Rule Options * Shared Object Rules * Optimize Rules * Analyze Statistics MODULE 9: USE DISTRIBUTED SNORT 3.0 * Design a Distributed Snort System * Sensor Placement * Sensor Hardware Requirements * Necessary Software * Snort Configuration * Monitor with Snort MODULE 10: EXAMINING LUA * Introduction to Lua * Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered on-request, onlineDelivered Online
Price on Enquiry

Microsoft Outlook for Office 365 (Desktop or Online) - Part 2

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for people who have a basic understanding of Microsoft© Outlook© and want to know how to use its advanced features to manage their email communications, calendar events, contact information, search functions, and other communication tasks. Overview In this course, you will use Outlook?s advanced features to customize and manage your email communications, including using advanced features to organize emails; managing calendar settings and options; managing contact information; scheduling tasks; and managing Outlook archives and data file settings. You will: Insert objects in messages, and modify properties and global options. Organize, search, and manage messages. Protect your mailbox and manage its size. Use rules and Quick Steps to automate message management. Work with advanced calendar settings. Import and forward contacts. Assign delegate permissions and share Outlook items with others. Archive and back up Outlook items using data files. In this course, you will customize command sets, configure mail accounts, set global options, perform advanced searches, apply filters to intercept mail and control spam, create rules to automate mail management tasks, work with calendars and contacts, manage tasks, preserve data with archives and data files, as well as share and delegate access to your Outlook items. In short, you'll work with a wide range of features and options and, in so doing, understand why Outlook is a leading personal management system.This course builds upon the foundational knowledge presented in the Microsoft© Outlook© for Office 365? (Desktop or Online): Part 1 course and will help you customize a communication system well-suited to your work style.This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Outlook Associate (Office 365 and Office 2019): Exam MO-400 . MODIFYING MESSAGE PROPERTIES AND CUSTOMIZING OUTLOOK * Topic A: Insert Hyperlinks and Symbols * Topic B: Modify Message Properties * Topic C: Add Email Accounts to Outlook * Topic D: Customize Outlook Options ORGANIZING, SEARCHING, AND MANAGING MESSAGES * Topic A: Group and Sort Messages * Topic B: Filter and Manage Messages * Topic C: Search Outlook Items MANAGING YOUR MAILBOX * Topic A: Manage Junk Email Options * Topic B: Manage Your Mailbox Size AUTOMATING MESSAGE MANAGEMENT * Topic A: Use Automatic Replies * Topic B: Use Rules to Organize Messages * Topic C: Create and Use Quick Steps WORKING WITH CALENDAR SETTINGS * Topic A: Set Advanced Calendar Options * Topic B: Create and Manage Additional Calendars * Topic C: Manage Meeting Responses MANAGING CONTACTS * Topic A: Import and Export Contacts * Topic B: Use Electronic Business Cards * Topic C: Forward Contacts SHARING OUTLOOK ITEMS * Topic A: Assign and Manage Tasks * Topic B: Share Your Calendar * Topic C: Share Your Contacts MANAGING OUTLOOK DATA FILES * Topic A: Use Archiving to Manage Mailbox Size * Topic B: Work with Outlook Data Files

Microsoft Outlook for Office 365 (Desktop or Online) - Part 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. BUG HUNTING FOUNDATION * Why Hunt Bugs? * Safe and Appropriate Bug Hunting/Hacking SCANNING WEB APPLICATIONS * Scanning Applications Overview MOVING FORWARD FROM HUNTING BUGS * Removing Bugs FOUNDATION FOR SECURING APPLICATIONS * Principles of Information Security BUG STOMPING 101 * Unvalidated Data * Broken Authentication * Sensitive Data Exposure * XML External Entities (XXE) * Broken Access Control BUG STOMPING 102 * Security Misconfiguration * Cross Site Scripting (XSS) * Deserialization/Vulnerable Components * Insufficient Logging and Monitoring * Spoofing, CSRF, and Redirects MOVING FORWARD WITH APPLICATION SECURITY * Applications: What Next? * Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. GETTING STARTED WITH THE CLASSROOM ENVIRONMENT * Given a virtualized environment, begin to administrate multiple systems using prerequisite skills ENHANCE USER SECURITY * Configure system to use Kerberos to verify credentials and grant privileges via sudo BASH SCRIPTING AND TOOLS * Automate system administration tasks utilizing Bash scripts and text-based tools FILE SECURITY WITH GNUPG * Secure files with GnuPG. SOFTWARE MANAGEMENT * Use yum plugins to manage packages and understand the design of packages to build a simple package NETWORK MONITORING * Profile running services then capture and analyze network traffic ROUTE NETWORK TRAFFIC * Configure system to route traffic and customize network parameters with sysctl SECURE NETWORK TRAFFIC * Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP SERVER CONFIGURATION * Configure an NTP server FILESYSTEMS AND LOGS * Manage local file system integrity, monitor system over time, and system logging CENTRALIZED AND SECURE STORAGE * Access centralized storage (iSCSI) and encrypt filesystems SSL-ENCAPSULATED WEB SERVICES * Understand SSL certificates and deploy an SSL encapsulated web service WEB SERVER ADDITIONAL CONFIGURATION * Configure web server with virtual hosts, dynamic content, and authenticated directories BASIC SMTP CONFIGURATION * Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) CACHING-ONLY DNS SERVER * Understand DNS resource records and configure a caching-only name server FILE SHARING WITH NFS * Configure file sharing between hosts with NFS FILE SHARING WITH CIFS * Configure file and print sharing between hosts with CIFS FILE SHARING WITH FTP * Configure file sharing with anonymous FTP TROUBLESHOOTING BOOT PROCESS * Understand the boot process and recover unbootable systems with rescue mode

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Red Hat OpenShift Installation Lab (DO322)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cluster administrators (Junior systems administrators, junior cloud administrators) interested in deploying additional clusters to meet increasing demands from their organizations. Cluster engineers (Senior systems administrators, senior cloud administrators, cloud engineers) interested in the planning and design of OpenShift clusters to meet performance and reliability of different workloads and in creating work books for these installations. Site reliability engineers (SREs) interested in deploying test bed clusters to validate new settings, updates, customizations, operational procedures, and responses to incidents. Overview Validate infrastructure prerequisites for an OpenShift cluster. Run the OpenShift installer with custom settings. Describe and monitor each stage of the OpenShift installation process. Collect troubleshooting information during an ongoing installation, or after a failed installation. Complete the configuration of cluster services in a newly installed cluster. Installing OpenShift on a cloud, virtual, or physical infrastructure. Red Hat OpenShift Installation Lab (DO322) teaches essential skills for installing an OpenShift cluster in a range of environments, from proof of concept to production, and how to identify customizations that may be required because of the underlying cloud, virtual, or physical infrastructure. This course is based on Red Hat OpenShift Container Platform 4.6. 1 - INTRODUCTION TO CONTAINER TECHNOLOGY * Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform. 2 - CREATE CONTAINERIZED SERVICES * Provision a server using container technology. 3 - MANAGE CONTAINERS * Manipulate prebuilt container images to create and manage containerized services. 4 - MANAGE CONTAINER IMAGES * Manage the life cycle of a container image from creation to deletion. 5 - CREATE CUSTOM CONTAINER IMAGES * Design and code a Dockerfile to build a custom container image. 6 - DEPLOY CONTAINERIZED APPLICATIONS ON OPENSHIFT * Deploy single container applications on OpenShift Container Platform. 7 - TROUBLESHOOT CONTAINERIZED APPLICATIONS * Troubleshoot a containerized application deployed on OpenShift. 8 - DEPLOY AND MANAGE APPLICATIONS ON AN OPENSHIFT CLUSTER * Use various application packaging methods to deploy applications to an OpenShift cluster, then manage their resources. 9 - DESIGN CONTAINERIZED APPLICATIONS FOR OPENSHIFT * Select a containerization method for an application and create a container to run on an OpenShift cluster. 10 - PUBLISH ENTERPRISE CONTAINER IMAGES * Create an enterprise registry and publish container images to it. 11 - BUILD APPLICATIONS * Describe the OpenShift build process, then trigger and manage builds. 12 - CUSTOMIZE SOURCE-TO-IMAGE (S2I) BUILDS * Customize an existing S2I base image and create a new one. 13 - CREATE APPLICATIONS FROM OPENSHIFT TEMPLATES * Describe the elements of a template and create a multicontainer application template. 14 - MANAGE APPLICATION DEPLOYMENTS * Monitor application health and implement various deployment methods for cloud-native applications. 15 - PERFORM COMPREHENSIVE REVIEW * Create and deploy cloudinative applications on OpenShift.

Red Hat OpenShift Installation Lab (DO322)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. BUG HUNTING FOUNDATION * Why Hunt Bugs? * Safe and Appropriate Bug Hunting/Hacking SCANNING WEB APPLICATIONS * Scanning Applications Overview MOVING FORWARD FROM HUNTING BUGS * Removing Bugs FOUNDATION FOR SECURING APPLICATIONS * Principles of Information Security BUG STOMPING 101 * Unvalidated Data * Injection * Broken Authentication * Sensitive Data Exposure * XML External Entities (XXE) * Broken Access Control BUG STOMPING 102 * Security Misconfiguration * Cross Site Scripting (XSS) * Deserialization/Vulnerable Components * Insufficient Logging and Monitoring * Spoofing, CSRF, and Redirects MOVING FORWARD WITH APPLICATION SECURITY * Applications: What Next? * .NET Issues and Best Practices * Making Application Security Real TIME PERMITTING TOPICS * Cryptography Overview * .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AutoCAD Level 3 - Creating and Presenting 3D Models

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Professionals who want unparalleled creative freedom, productivity, and precision for producing superb 3D modeling. Overview Fundamental concepts and workflows for creating 3D models using AutoCAD, Represent a design by creating solid primitives, solid or surface models from cross-sectional geometry, or composite models from multiple solid models, Complete a solid model design by adding the necessary features to detail, duplicate, and position 3D models, Convert 2D objects to 3D objects, Document a 3D design by creating 2D drawings for production and visualization, Communicate design ideas using visual styles, lights, model walk-through tools, and renderings. In this course, you will learn the fundamental concepts and workflows for creating 3D models using AutoCAD. INTRODUCTION ADVANCED TEXT OBJECTS * Annotation Scale Overview * Using Fields * Controlling the Draw Order WORKING WITH TABLES * Working with Linked Tables * Creating Table Styles PROJECTS - ADVANCED ANNOTATION DYNAMIC BLOCKS * Working with Dynamic Blocks * Creating Dynamic Block Definitions * Dynamic Block Authoring Tools * Additional Visibility Options ATTRIBUTES * Inserting Blocks with Attributes * Editing Attribute Values * Defining Attributes * Redefining Blocks with Attributes * Extracting Attributes PROJECTS - ADVANCED BLOCKS & ATTRIBUTES OUTPUT AND PUBLISHING * Output For Electronic Review * Autodesk Design Review * Publishing Drawing Sets OTHER TOOLS FOR COLLABORATION * eTransmit * Hyperlinks CLOUD COLLABORATION AND 2D AUTOMATION * Connecting to the Cloud * Sharing Drawings in the Cloud * Attach Navisworks Files * Attach BIM 360 Glue Models INTRODUCTION TO SHEET SETS * Overview of Sheet Sets * Creating Sheet Sets * Creating Sheets in Sheet Sets * Adding Views to Sheets * Importing Layouts to Sheet Sets PUBLISHING & CUSTOMIZING SHEET SETS * Transmitting and Archiving Sheet Sets * Publishing Sheet Sets * Customizing Sheet Sets * Custom Blocks for Sheet Sets PROJECTS - SHEET SETS MANAGING LAYERS * Working in the Layer Properties Manager * Creating Layer Filters * Setting Layer States CAD STANDARDS * CAD Standards Concepts * Configuring Standards * Checking Standards * Layer Translator SYSTEM SETUP * Options Dialog Box * System Variables * Dynamic Input Settings * Drawing Utilities * Managing Plotters * Plot Styles INTRODUCTION TO CUSTOMIZATION * Why Customize? * Creating a Custom Workspace CUSTOMIZING THE USER INTERFACE * Using the Customize User Interface (CUI) Dialog Box * Customizing the Ribbon * Customizing the Quick Access Toolbar * Customizing Menus * Keyboard Shortcuts MACROS & CUSTOM ROUTINES * Custom Commands & Macros * Running Scripts * Action Recorder * Editing Action Macros * Loading Custom Routines

AutoCAD Level 3 - Creating and Presenting 3D Models
Delivered on-request, onlineDelivered Online
Price on Enquiry

Red Hat Virtualization with RHCVA Exam (RH319)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). RED HAT VIRTUALIZATION OVERVIEW * Explain the purpose and architecture of Red Hat Virtualization. INSTALL AND CONFIGURE RED HAT VIRTUALIZATION * Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. CREATE AND MANAGE DATACENTERS AND CLUSTERS * Organize hypervisors into groups using datacenters and clusters. MANAGE USER ACCOUNTS AND ROLES * Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. ADDING PHYSICAL HOSTS * Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. SCALE RED HAT VIRTUALIZATION INFRASTRUCTURE * Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. MANAGE RED HAT VIRTUALIZATION NETWORKS * Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. MANAGE RED HAT VIRTUALIZATION STORAGE * Create and manage data and ISO storage domains. DEPLOY AND MANAGE VIRTUAL MACHINES * Operate virtual machines in the Red Hat Virtualization environment. MIGRATE VIRTUAL MACHINES * Migrate and control automatic migration of virtual machines. MANAGE VIRTUAL MACHINE IMAGES * Manage virtual machine snapshots and disk images. AUTOMATING VIRTUAL MACHINE DEPLOYMENT * Automate deployment of virtual machines by using templates and cloud-init. BACK UP AND UPGRADE RED HAT VIRTUALIZATION * Back up, restore, and upgrade the software in a Red Hat Virtualization environment. EXPLORE HIGH-AVAILABILITY PRACTICES * Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. PERFORM COMPREHENSIVE REVIEW * Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.

Red Hat Virtualization with RHCVA Exam (RH319)
Delivered on-request, onlineDelivered Online
Price on Enquiry