• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2200 Architect courses delivered Online

Introduction to SQL Programming Basics (TTSQL002)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. BASIC RDBMS PRINCIPLES * Relational design principles * Accessing data through a structured query language * Entity relationship diagrams * Data Domains * Null values * Indexes * Views * Denormalization * Data Model Review THE SQL LANGUAGE AND TOOLS * Using SQL*Plus * Why Use SQL*Plus When * Other Tools Are Available? * Starting SQL*Plus * EZConnect * SQL Commands * PL/SQL Commands * SQL*Plus Commands * The COLUMN Command * The HEADING Clause * The FORMAT Clause * The NOPRINT Clause * The NULL Clause * The CLEAR Clause * Predefined define variables * LOGIN.SQL * Command history * Copy and paste in SQL*Plus * Entering SQL commands * Entering PL/SQL commands * Entering SQL*Plus commands * Default output from SQL*Plus * Entering Queries * What about PL/SQL? USING SQL DEVELOPER * Choosing a SQL Developer version * Configuring connections * Creating A Basic Connection * Creating A TNS Connection * Connecting * Configuring preferences * Using SQL Developer * The Columns Tab * The Data Tab * The Constraints Tab * The Grants Tab * The Statistics Tab * Other Tabs * Queries In SQL Developer * Query Builder * Accessing Objects Owned By Other Users * The Actions Pulldown Menu * Differences between SQL Developer and SQL*Plus * Reporting Commands Missing In SQL Developer * General Commands Missing In SQL Developer * Data Dictionary report * User Defined reports * Using scripts in SQL Developer WHERE AND ORDER BY * WHERE clause basics * Comparison operators * Literals and Constants in SQL * Simple pattern matching * Logical operations * The DUAL table * Arithmetic operations * Expressions in SQL * Character operators * Pseudo columns * Order by clause basics * Ordering Nulls * Accent and case sensitive sorts * Sampling data * WHERE and ORDER BY in SQL Developer * All, Any, Some FUNCTIONS * The basics of Oracle functions * Number functions * Character functions * Date functions * Conversion functions * Other functions * Large object functions * Error functions * The RR format mode; * Leveraging your knowledge ANSI 92 JOINS * Basics of ANSI 92 Joins * Using Query Builder with multiple tables * Table Aliases * Outer joins * Outer Joins In Query Builder * Set operators * Self-referential joins * Non-Equijoins ANSI 99 JOINS * Changes with ANSI99 * CROSS Join * NATURAL Join * JOIN USING * JOIN ON * LEFT / RIGHT OUTER JOIN * FULL OUTER JOIN SUBQUERIES * Why use subqueries? * WHERE clause subqueries * FROM clause subqueries * HAVING clause subqueries * CORRELATED subqueries * SCALAR subqueries * DML and subqueries * EXISTS subqueries * Hierarchical queries * TOP N AND BOTTOM N queries * Creating subqueries using Query Builder REGULAR EXPRESSIONS * Available Regular Expressions * Regular Expression Operators * Character Classes * Pattern matching options * REGEX_LIKE * REGEXP_SUBSTR * REGEXP_INSTR * REGEXP_REPLACE * REGEXP_COUNT ANALYTICS * The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity MORE ANALYTICS * RANKING functions * RANK * DENSE_RANK * CUME_DIST * PERCENT_RANK * ROW_NUMBER * Windowing aggregate functions * RATIO_TO_REPORT * LAG / LEAD * Linear Regression functions * Inverse Percentile functions * Hypothetical ranking functions * Pattern Matching ADDITIONAL COURSE DETAILS: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to SQL Programming Basics (TTSQL002)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). DESCRIBING THE CISCO EMAIL SECURITY APPLIANCE * Cisco Email Security Appliance Overview * Technology Use Case * Cisco Email Security Appliance Data Sheet * SMTP Overview * Email Pipeline Overview * Installation Scenarios * Initial Cisco Email Security Appliance Configuration * Centralizing Services on a Cisco ADMINISTERING THE CISCO EMAIL SECURITY APPLIANCE * Distributing Administrative Tasks * System Administration Managing and Monitoring Using the Command Line Interface (CLI) * Other Tasks in the GUI * Advanced Network Configuration * Using Email Security Monitor * Tracking Messages * Logging CONTROLLING SENDER AND RECIPIENT DOMAINS * Public and Private Listeners * Configuring the Gateway to Receive Email * Host Access Table Overview * Recipient Access Table Overview * Configuring Routing and Delivery Features CONTROLLING SPAM WITH TALOS SENDERBASE AND ANTI-SPAM * SenderBase Overview * Anti-Spam * Managing Graymail * Protecting Against Malicious or Undesirable URLs * File Reputation Filtering and File Analysis * Bounce Verification USING ANTI-VIRUS AND OUTBREAK FILTERS * Anti-Virus Scanning Overview * Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering * Configuring the Appliance to Scan for Viruses * Outbreak Filters * How the Outbreak Filters Feature Works Managing Outbreak Filters USING MAIL POLICIES * Email Security Manager Overview * Mail Policies Overview * Handling Incoming and Outgoing Messages Differently * Matching Users to a Mail Policy Message Splintering * Configuring Mail Policies USING CONTENT FILTERS * Content Filters Overview * Content Filter Conditions * Content Filter Actions * Filter Messages Based on Content * Text Resources Overview * Using and Testing the Content Dictionaries Filter Rules * Understanding Text Resources * Text Resource Management * Using Text Resources USING MESSAGE FILTERS TO ENFORCE EMAIL POLICIES * Message Filters Overview * Components of a Message Filter * Message Filter Processing * Message Filter Rules * Message Filter Actions * Attachment Scanning * Examples of Attachment Scanning Message Filters * Using the CLI to Manage Message Filters * Message Filter Examples * Configuring Scan Behavior PREVENTING DATA LOSS * Overview of the Data Loss Prevention (DLP) Scanning Process * Setting Up Data Loss Prevention * Policies for Data Loss Prevention * Message Actions * Updating the DLP Engine and Content Matching Classifiers USING LDAP * Overview of LDAP * Working with LDAP * Using LDAP Queries * Authenticating End-Users of the Spam Quarantine * Configuring External LDAP Authentication for Users * Testing Servers and Queries * Using LDAP for Directory Harvest Attack Prevention * Spam Quarantine Alias Consolidation Queries * Validating Recipients Using an SMTP Server SMTP SESSION AUTHENTICATION * Configuring AsyncOS for SMTP Authentication * Authenticating SMTP Sessions Using Client Certificates * Checking the Validity of a Client Certificate * Authenticating User Using LDAP Directory * Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate * Establishing a TLS Connection from the Appliance * Updating a List of Revoked Certificates EMAIL AUTHENTICATION * Email Authentication Overview * Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing * Verifying Incoming Messages Using DKIM * Overview of Sender Policy Framework (SPF) and SIDF Veri?cation * Domain-based Message Authentication Reporting and Conformance (DMARC) Verification * Forged Email Detection EMAIL ENCRYPTION * Overview of Cisco Email Encryption * Encrypting Messages * Determining Which Messages to Encrypt * Inserting Encryption Headers into Messages * Encrypting Communication with Other Message Transfer Agents (MTAs) * Working with Certificates * Managing Lists of Certificate Authorities * Enabling TLS on a Listener?s Host Access Table (HAT) * Enabling TLS and Certi?cate Verification on Delivery * Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services USING SYSTEM QUARANTINES AND DELIVERY METHODS * Describing Quarantines * Spam Quarantine * Setting Up the Centralized Spam Quarantine * Using Safelists and Blocklists to Control Email Delivery Based on Sender * Configuring Spam Management Features for End Users * Managing Messages in the Spam Quarantine * Policy, Virus, and Outbreak Quarantines * Managing Policy, Virus, and Outbreak Quarantines * Working with Messages in Policy, Virus, or Outbreak Quarantines * Delivery Methods CENTRALIZED MANAGEMENT USING CLUSTERS * Overview of Centralized Management Using Clusters * Cluster Organization * Creating and Joining a Cluster * Managing Clusters * Cluster Communication * Loading a Configuration in Clustered Appliances * Best Practices TESTING AND TROUBLESHOOTING * Debugging Mail Flow Using Test Messages: Trace * Using the Listener to Test the Appliance * Troubleshooting the Network * Troubleshooting the Listener * Troubleshooting Email Delivery * Troubleshooting Performance * Web Interface Appearance and Rendering Issues * Responding to Alerts * Troubleshooting Hardware Issues * Working with Technical Support REFERENCES * Model Specifications for Large Enterprises * Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces * Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

55234 SharePoint 2016 Site Collections and Site Owner Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those who provide site collection and site administration and are power users or IT professionals who are tasked with supporting or working within the SharePoint 2016 environment on premise and/or in Office 365. Overview After completing this course, students will be able to: - Design and implement a company portal structure using SharePoint 2016 objects including sites, libraries, lists and pages - Explain the role of security and permissions throughout SharePoint 2016 - Implement guidelines for consistency in building a company portal to aid in the day-to-day administration of content in SharePoint 2016 - Enhance the design and content of a company portal using SharePoint 2016 pages and web parts - Explain the importance of governance for the planning and managing future growth of the - SharePoint 2016 implementation - Identify options to integrate data from other systems such as Microsoft Office, as well as preserve existing data - Explain the role of social networking in SharePoint 2016 and its impact on collaboration This course is intended for power users and IT professionals who are tasked with working within the SharePoint 2016 environment and conduct site collection and site administration. GETTING STARTED WITH SHAREPOINT 2016 * Exploring SharePoint 2016 Site Collection and Site Administrator Roles * Defining SharePoint Terminology * Navigating a SharePoint Site * Interacting with the Ribbon * Creating and Editing Basic Content * What is Metadata? * Versions of SharePoint * Standard * Enterprise * O365 * BUILDING A SITE COLLECTION WITH APPS * The Structure of SharePoint * Creating a Site * What does a site template come with? * Defining SharePoint Apps * Customizing Lists and Libraries * Creating/Managing Lists and Libraries through SharePoint Designer * Explaining Views on Lists and Libraries * Creating Views in Lists and Libraries * Modifying Navigation * Turning Site Features On/Off * Reorganizing a Site using Site Content and Structure feature * Lab 1: Creating a Structured Company Portal * Lab 2: Creating a List Using SharePoint Designer (Optional) CREATING CONSISTENCY ACROSS SITES * Defining Site Columns * Defining Content Types * Implementing a Taxonomy * Using Templates to Promote Consistency * Lab 1: Creating Site Columns and Content Types * Lab 2: Implementing a Taxonomy * Lab 3: Configuring the Content Organizer SHAREPOINT PERMISSIONS * Explaining Permissions and Security in SharePoint * Creating SharePoint Groups * Managing Permissions within SharePoint * Sharing versus Traditional Security * Sharing as different permission levels * Lab 1: Managing Permissions in SharePoint WORKING WITH PAGES AND WEB PARTS * Changing the Appearance of the Portal * Editing a Page * wiki * web part * Working with Web Parts and App Parts * App Parts * Content Search Web Part * Relevant Documents * Content query * Table of Contents * Pictures * Web Part Connections * Filter web parts * Web parts with Targeting Audience * Lab 1: Adding and Configuring Web Parts * Lab 2: Connecting Web Parts * Lab 3: Applying Themes to Your Company Portal DOCUMENT AND RECORDS MANAGEMENT * Basic Content Approval * Versioning * Check In/Out * Holds * Retention Policy * Document ID * Content Organizer * Compliance Policy Center Site Template * EDiscovery * Records Center * Lab 1: Working with Advanced Document Management Features * Lab 2: Leveraging Records Management to Preserve Data WORKFLOW * Alerts * Out of the Box Workflow * Activating Workflow Features * Approval Workflow * Creating a Workflow in SharePoint Designer * Lab 1: Creating an Approval Workflow from SharePoint * Lab 2: Creating a Custom Workflow in SharePoint Designer (Optional) OFFICE INTEGRATION * Outlook * Calendar * Contacts * Excel * Word * PowerPoint * OneDrive for Business * OneNote * Access * Lab 1: Importing and Exporting Excel Data with SharePoint * Lab 2: Linking Outlook and SharePoint CREATING PUBLISHING SITES * Why use a publishing site? * Publishing Pages * Enabling Web Content Management * Managing the Structure of Web Content * Navigating a Site Using Managed Metadata * Lab 1: Creating a Rich Publishing Sit * Lab 2: Configuring a Publishing Approval Process * Lab 3: Implementing a Managed Navigation Site BRIDGING THE SOCIAL GAP * My Sites * Configuring Social Features in SharePoint * Posts, Tags and Mentions * Creating a Community Site * Lab 1: Designing a Social Experience in SharePoint 2016 * Lab 2: Creating a Community Site FINDING INFORMATION USING SEARCH * Exploring the Search Features in SharePoint * Configuring Search Settings * Search Analytics * Search Visibility * Lab 1: Configuring an Advanced Search Center * PLANNING A COMPANY PORTAL USING SHAREPOINT * Defining SharePoint Governance * Working with Information Architecture * Implementing Site Hierarchies * Discussing the Execution of Governance SITE COLLECTION ADMINISTRATOR SETTINGS * Exploring Settings for Site Collection Administrators * Exploring Settings for Site Administrators * Site Closure Policies ADDITIONAL COURSE DETAILS: Nexus Humans 55234 SharePoint 2016 Site Collections and Site Owner Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55234 SharePoint 2016 Site Collections and Site Owner Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55234 SharePoint 2016 Site Collections and Site Owner Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot * Lab : Creating and running queries * Lab : Configuring SSRS * Lab : Analyzing the real-time state of a device by using CMPivot PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections * Lab : Configuring boundaries and resource discovery * Lab: Configuring user and device collections DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations * Lab : Deploying the Microsoft System Center Configuration Manager client software * Lab: Configuring and monitoring client status * Lab : Managing client settings MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Lab : Configuring software metering * Lab : Configuring and managing Asset Intelligence DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Lab : Managing application supersedence and removal * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Lab : Using Configuration Manager to deploy Windows Store apps MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates * Lab : Configuring the site for software updates * Lab : Deploying and managing software updates IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies * Lab : Implementing Microsoft System Center Endpoint Protection * Lab : Implementing advanced threat policies MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access * Lab : Managing compliance settings MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service * Lab : Preparing the site for operating -system deployment * Lab : Deploying operating -system images for bare-metal installations MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance * Backing up and recovering a Configuration Manager site * Lab : Configuring role-based administration * Lab : Configuring Remote Tools * Lab : Maintaining a Configuration Manager site ADDITIONAL COURSE DETAILS: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is experienced web developers who are new to User Experience (UX) and Responsive Design principles. These professionals typically have a solid understanding of front-end development technologies such as HTML, CSS, and JavaScript but seek to expand their skillset to create more user-centric, adaptable, and accessible web experiences. Roles that would benefit from this course include: Front-end Web Developers Full-stack Developers Web Designers Team Leads and Project Managers Freelance Web Developers Overview Working in a hands-on learning environment led by our expert UX coach, you'll learn to: Understand and apply UX principles and user-centered design processes: Participants will learn to identify the needs and preferences of users, create user personas, and apply UX best practices to develop intuitive, user-friendly web experiences. Design and implement responsive web layouts: Participants will gain the skills to create fluid grid layouts, use flexible images, and apply media queries to design web pages that adapt seamlessly across various devices and screen sizes. Optimize web performance for responsive designs: Participants will learn techniques to improve website performance, including image optimization, responsive images, and minification and concatenation of assets, ensuring a fast and smooth user experience across devices. Implement accessible web designs: Participants will understand the importance of accessibility in web design and learn to apply WCAG principles and accessible design patterns to create websites that are usable by a wide range of users, including those with disabilities. Collaborate effectively with designers, developers, and stakeholders: Participants will gain insights into design collaboration and handoff processes, enhancing their ability to communicate design decisions, provide and receive feedback, and work efficiently with team members and clients. In today's fast-paced digital world, user-centric and adaptable websites are no longer a luxury ? they're a necessity. By embracing UX and responsive design, you'll unlock the potential to elevate your websites, boosting user satisfaction and engagement. This, in turn, leads to higher conversion rates and a stronger online presence for your clients or organization, as well as better collaboration within your team, bridging the gap between designers, developers, and stakeholders.UX Design & Responsive Design for Experienced Web Developers is a three day, engaging hands-on workshop designed to equip you with the latest skills and best practices in User Experience (UX) and Responsive Web Design required to create seamless, user-friendly websites that adapt effortlessly across devices. This course will immerse you in the latest skills, best practices, and hands-on activities, empowering you to create exceptional, accessible websites that excel across devices and captivate users. Throughout the program you?ll explore the fundamentals of UX and responsive design, including user-centered design processes, mobile-first and desktop-first approaches, and design techniques for various devices and screen sizes. You'll gain practical experience creating responsive layouts, optimizing performance, and implementing accessible web designs, all while leveraging popular frameworks and design tools. You'll also gain valuable insights into performance optimization, accessibility, and collaboration strategies, ensuring you have the complete toolkit to excel in your field.By the end of this workshop, you?ll have gained a solid understanding of UX and responsive design principles, as well as hands-on experience in applying these concepts to real-world projects. You?ll be able to create more user-friendly, responsive, and accessible websites, and collaborate more effectively with your design and development teams. INTRODUCTION TO UX AND RESPONSIVE DESIGN: UNDERSTANDING USER EXPERIENCE * What is UX? * Importance of UX in web development * UX principles and best practices * User-centered design process RESPONSIVE WEB DESIGN BASICS * What is Responsive Web Design? * Importance of Responsive Design in modern web development * Fluid grid layout, flexible images, and media queries * Hands-on Activity: Creating a Responsive Layout * Designing a simple responsive layout using HTML, CSS, and media queries * Breakdown and explanation of the code * Testing responsiveness across different devices MOBILE-FIRST VS. DESKTOP-FIRST APPROACHES * Pros and cons of each approach * Deciding which approach to use DESIGNING FOR DIFFERENT DEVICES AND SCREEN SIZES * Common breakpoints and device considerations * Accessibility and usability across devices * Typography, color, and other design elements in responsive design * Hands-on Activity: Designing for Different Devices * Modifying the previously created responsive layout to optimize for various devices * Discussion and feedback on designs ADVANCED UX AND RESPONSIVE DESIGN TECHNIQUES: UX RESEARCH AND TESTING * Importance of UX research * Usability testing and user feedback * A/B testing and heatmaps NAVIGATION AND INFORMATION ARCHITECTURE * Designing effective and user-friendly navigation * Organizing content and information * Common navigation patterns in responsive design * Hands-on Activity: Designing Navigation for Responsive Websites * Adding navigation elements to the previously created responsive layout * Testing navigation on different devices and screen sizes * Discussion and feedback on navigation designs RESPONSIVE WEB DESIGN FRAMEWORKS AND TOOLS * Overview of popular frameworks (Bootstrap, Foundation, etc.) * Pros and cons of using frameworks * Introduction to design tools (Sketch, Figma, Adobe XD) * Hands-on Activity: Exploring Frameworks and Tools * Experimenting with a chosen framework or design tool * Redesigning the responsive layout using the selected framework/tool * Sharing experiences and discussing the benefits and drawbacks UX AND RESPONSIVE DESIGN BEST PRACTICES: DESIGN PATTERNS AND UI COMPONENTS * Common design patterns in responsive web design * Designing reusable UI components * Consistency and usability in UI components PERFORMANCE OPTIMIZATION * Importance of performance in responsive design * Image optimization and responsive images * Minification and concatenation of assets * Hands-on Activity: Optimizing Performance (1.5 hours) * Applying performance optimization techniques to the responsive layout * Testing the improvements in performance * Sharing results and discussing best practices ACCESSIBILITY IN UX AND RESPONSIVE DESIGN * Importance of accessibility in web design * Accessibility principles (WCAG) * Accessible design patterns and techniques * Hands-on Activity: Evaluating and Improving Accessibility Assessing the accessibility of the responsive layout * Implementing accessibility improvements * Testing and discussing the results * DESIGN COLLABORATION AND HANDOFF * Collaborating with designers, developers, and stakeholders * Effective communication and documentation * Design handoff tools and techniques * Hands-on Activity: Simulating Design Handoff * Participants will work in pairs to simulate a design handoff * Reviewing, discussing, and providing feedback on each other's responsive layouts * Sharing experiences and lessons learned

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Administering Collaboration Environments (CLACE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. DEFINE COLLABORATION TECHNOLOGY AND BENEFITS * Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments * Describe On-Premise Collaboration Deployments * Describe Cisco's Collaboration Endpoints * Describe Cisco Collaboration On-Premise Edge Solutions * Describe Cisco's Collaboration On-Premise Conferencing Solutions * Describe Cisco Cloud Services ADMINISTERING INITIAL PARAMETERS FOR CISCO UNIFIED COMMUNICATIONS MANAGER * Understand the On-Premise Collaboration Deployment Models * Describe The Cisco Unified CM Cluster Services * Define Network requirements for Collaboration * Define Network Services for Collaboration Navigate Cisco Unified CM Discovery * 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery * 2: Configure the Cisco UCM Core Systems Settings EXPLORING ENDPOINTS AND THE REGISTRATION PROCESS * Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint * Describe Power Over Ethernet * Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings * Discovery 4: Deploy an IP Phone Through Auto and Manual Registration * Discovery 5: Administer Endpoints in Cisco Unified Communications Manager MANAGING USERS IN CISCO UNIFIED COMMUNICATIONS MANAGER * Analyze Cisco UCM Users Types and Settings * Describe Methods for Authenticating Cisco UCM Users * Discovery 6: Create Local User Accounts * Discovery 7: Adding Users in Cisco Unified Communications Manager DESCRIBING A BASIC DIAL PLAN * Describe the Concepts of a Dial Plan and Call Routing * Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns * Discovery 8: Create a Basic Dial Plan DESCRIBING CLASS OF SERVICE * Explore the Concepts of Class of Control * Discovery 9: Explore Partitions and Calling Search Spaces * Discovery 10: Explore Private Line Automatic Ringdown (PLAR) ENABLING ENDPOINTS AND FEATURES * Configure a Cisco Jabber Endpoint in Cisco UCM * Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility * Discovery 12: Implement Mobility IMPLEMENTING MEDIA RESOURCES IN CISCO UNIFIED COMMUNICATIONS MANAGER * Media Resource Overview * Media Resource Selection and Access Control Audio and Video Conference * Bridge Devices Audio and Video Conference * Bridge Integration Options * Discovery 13: Configuring Media Resources REPORTING AND MAINTENANCE * Explore the Troubleshooting Process * Describe Reporting and Maintenance Tools * Describe the Cisco Real-Time Monitoring Tool * Discovery 14: Use Reporting and maintenance Tools DESCRIBING CISCO INSTANT MESSAGING AND PRESENCE * Describe Cisco IM and Presence Features and Architecture Clustering * Describe Cisco IM and Presence Components and Communication Flows ENABLING JABBER * Cisco Jabber Deployment Modes * Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows CONFIGURE UNITY CONNECTION INTEGRATION * Overview of Cisco Unity Connection * Integration SIP Integration Typical Integration * Mistakes Integration Considerations * Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM * Discovery 17: Configure Voicemail Users CONFIGURING CISCO UNITY CONNECTION CALL HANDLERS * Call handler Overview System * Call Handler Caller Input Operator * Call Handler Goodbye * Call Handler Directory Handler * Interview Handler TROUBLESHOOTING CISCO UNITY CONNECTION * Overview of Cisco Unity Connection * Troubleshooting Options Integration * Troubleshooting Tools Cisco Real-Time Monitoring Tool * Discovery 18: Troubleshoot Cisco Unity Connection ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering Collaboration Environments (CLACE)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA'S SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS) * The motivations behind STIGs * Requirements that the various software development roles must meet * Implementing STIG requirements and guidelines WHY HUNT BUGS? * The Language of CyberSecurity * The Changing Cybersecurity Landscape * AppSec Dissection of SolarWinds * The Human Perimeter * Interpreting the 2021 Verizon Data Breach Investigation Report * First Axiom in Web Application Security Analysis * First Axiom in Addressing ALL Security Concerns * Lab: Case Study in Failure SAFE AND APPROPRIATE BUG HUNTING/HACKING * Working Ethically * Respecting Privacy * Bug/Defect Notification * Bug Bounty Programs * Bug Hunting Mistakes to Avoid PRINCIPLES OF INFORMATION SECURITY * Secuity Is a Lifecycle Issue * Minimize Attack Surface Area * Layers of Defense: Tenacious D * Compartmentalize * Consider All Application States * Do NOT Trust the Untrusted IDENTIFICATION AND AUTHENTICATION FAILURES * Applicable STIGs * Quality and Protection of Authentication Data * Proper hashing of passwords * Handling Passwords on Server Side * Session Management * HttpOnly and Security Headers * Lab: STIG Walk-Throughs INJECTION * Applicable STIGs * Injection Flaws * SQL Injection Attacks Evolve * Drill Down on Stored Procedures * Other Forms of Server-Side Injection * Minimizing Injection Flaws * Client-side Injection: XSS * Persistent, Reflective, and DOM-Based XSS * Best Practices for Untrusted Data * Lab: STIG Walk-Throughs APPLICATIONS: WHAT NEXT? * Common Vulnerabilities and Exposures * CWE/SANS Top 25 Most Dangerous SW Errors * Strength Training: Project Teams/Developers * Strength Training: IT Organizations CRYPTOGRAPHIC FAILURES * Applicable STIGs * Identifying Protection Needs * Evolving Privacy Considerations * Options for Protecting Data * Transport/Message Level Security * Weak Cryptographic Processing * Keys and Key Management * Threats of Quantum Computing * Steal Now, Crack Later Threat * Lab: STIG Walk-Throughs APPLICATION SECURITY AND DEVELOPMENT CHECKLISTS * Checklist Overview, Conventions, and Best Practices * Leveraging Common AppSec Practices and Control * Actionable Application Security * Additional Tools for the Toolbox * Strength Training: Project Teams/Developers * Strength Training: IT Organizations * Lab: Recent Incidents SDL OVERVIEW * Attack Phases: Offensive Actions and Defensive Controls * Secure Software Development Processes * Shifting Left * Actionable Items Moving Forward * Lab: Design Study Review ASSET ANALYSIS * Asset Analysis Process * Types of Application-Related Assets * Adding Risk Escalators * Discovery and Recon DESIGN REVIEW * Asset Inventory and Design * Assets, Dataflows, and Trust Boundaries * Risk Escalators in Designs * Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Cloud Director: Install, Configure, Manage [v10.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Customers, cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment. Overview By the end of the course, you should be able to meet the following objectives: * Deploy VMware Cloud Director * Manage VMware Cloud Director to meet the service provider needs * Create and manage VMware Cloud Director organizations and vApps to fulfill business needs * Create and manage VMware Cloud Director catalogs * Transfer virtual machine workloads from VMware vSphere into and out of VMware Cloud Director * Configure networking for organizations and vApps with the help of VMware NSX-T Data Center * Managing resources from the VMWare Cloud Director console and using VMware vRealize Operations * Manager * Enabling VM and Named Disk Encryption * Creating VM sizing and placement policies * Understand vApps and VM operations and actions In this five-day course, you focus on installing, configuring, and managing VMware Cloud Director 10.3. You learn about workload provisioning, the creation of organizations, virtual data centers (VDCs), catalog services that include predefined virtual machines, and on-demand VMware NSX-T Data Center networks.This course also covers interfacing VMware Cloud Director with other systems and the integration and use of VMware vRealize Orchestrator for VMware Cloud Director. You learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines (VMs). This course also discusses how to monitor various VMware Cloud Director objects using VMware vRealize Operations. COURSE INTRODUCTION * Introductions and course logistics * Course objectives SOFTWARE-DEFINED DATA CENTER AND VMWARE VALIDATED DESIGN * Define Software Defined Datacenter (SDDC) * Discuss VMware offerings for Cloud-Based Services * Discuss the deployment options for VMware Cloud Director * Discuss VMware Validated Design * Recognize the design considerations when creating a cloud environment on the SDDC using VMWare Cloud Foundation VCLOUD DIRECTOR DEPLOYMENT AND CONFIGURATION * Discuss the deployment options for VMware Cloud Director * Explain the two-stage deployment of VMware Cloud Director cells * Discuss failover mechanisms (automatic and manual) with VMware Cloud Director cells * Define switchover, promote, and fencing options of the VMware Cloud Director appliance * Understand the VMware Cloud Director appliance enhancements VMWARE CLOUD DIRECTOR PROVIDER CONFIGURATION * Describe how the compute resources are provided to VMware Cloud Director * Describe how storage is provided to VMware Cloud Director * Configure and manage storage for Virtual Datacenters (VDCs) * Briefly discuss network pools, external networks, and Tier-0 Gateways * Showcase VMware Cloud Director integration with vCenter Server and NSX-T Data Center * Describe VMware Cloud Director organizations * Understand organization policies * Explain how to access an organization using various portals * Understand organization VDC * Discuss what is Linked Clone and Fast Provisioning * Understand the use cases of Allocation Models VMWARE CLOUD DIRECTOR USER, ROLES AND QUOTA MANAGEMENT * Discuss user-bundle * Describe role-based access * Explain custom roles and rights * Describe and configure LDAP integration with Active Directory * Discuss OIDC authentication methods * Describe SAML identity provider VMWARE CLOUD DIRECTOR VIRTUAL MACHINES AND VAPPS * Understand standalone VMs * Discuss the VM managing operations * Explain VM properties * Discuss deployment methods of vApps * Discuss the vApp managing operations * Discuss the vApp lease policies * Understand the vApps and VM actions * Explain vApp and VM badges VMWARE CLOUD DIRECTOR CONTENT LIBRARIES * Explain the purpose of catalogs and how to create a catalog organization * Define catalog management and sharing catalogs inside and between organizations * Explain medias in VMware Cloud Director and its usage * Discuss vApp templates * Understand vApp template operations * Describe the purpose and usage of Open Virtualization Format (OVF) * Discuss organization VDC templates VMWARE CLOUD DIRECTOR NETWORKING * Discuss organization VDC networks * List the types of organization VDC networks * Describe the edge gateway services * Explore the services offered by the edge gateway * Discuss sub-allocation IP pool and its use cases * Discuss DHCP, NAT, load balancer, and firewall services on the edge gateway * Discuss SNAT, DNAT, NO SNAT, and NO DNAT use cases * Discuss vApp networks * List the various types of vApp networks * Discuss routed, isolated, and direct vApp networks * Managing billing and reports of vCloud Director objects using Tenant vApp VMWARE CLOUD DIRECTOR STORAGE AND COMPUTE * Describe named disks and shared named disks * Demonstrate how to attach and detach a named disk and a shared named disk * Describe methods of sharing the named disk * Discuss the implications of deleting VMs that have an attached named disk * Discuss how VMware Cloud Director VMs and disks are encrypted * Explain the storage policy capabilities * Demonstrate how VM sizing and placement policies are published * Discuss vCenter server and VMware Cloud Director IOPS storage policies usage * Discuss how to enable and use the storage IOPS limitation in VMware Cloud Director * Describe the storage policy supported entities EXTENSIBILITY AND UI ADDITIONAL FEATURES * Explain custom advisories, global search, guided tours, data exporter, keyboard shortcuts, and quick * search * Understand vcd-cli supported commands * Discuss various vcd-cli tools VMWARE CLOUD DIRECTOR RESOURCE MONITORING * Identify log locations for VMware Cloud Director * Manage vSphere and cloud resources from VMware Cloud Director * Understand monitoring of objects from VMware Cloud Director portals * Briefly introduce vRealize Operations Manager * Integrate VMware Cloud Director with vRealize Operations Manager * Configure VMware Cloud Director Management Pack * Understand dashboard, metrics, alerts, alert definition, and reports ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud Director: Install, Configure, Manage [v10.3] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud Director: Install, Configure, Manage [v10.3] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud Director: Install, Configure, Manage [v10.3]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level Java programming course, designed for experienced developers who wish to get up and running with Java, or who need to reinforce sound Java coding practices, immediately. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand not only the fundamentals of the Java language, but also its importance, uses, strengths and weaknesses Understand the basics of the Java language and how it relates to OO programming and the Object Model Learn to use Java exception handling features Work with the Modular system (Project Jigsaw) Understand and use classes, inheritance and polymorphism Understand and use collections, generics, autoboxing, and enumerations Process large amount of data using Lambda expressions and the Stream API Abstract, static and private methods in interfaces Take advantage of the Java tooling that is available with the programming environment being used in the class Specific Java 11 features covered: Using the Local Variable Type in Lambda expressions; Updates made to the String AP Time Permitting: Quick look ahead - Java 12, Java 13, Java 14 and Beyond If you're an experienced OO developer (coming from a C# or C++ background, etc.) who needs to transition to programming in Java, this fast-paced, hands-on course will get you there quickly. Fast Track to Java Programming for OO Experienced Developers is a four-day, lab-intensive class where you'll quickly be immersed in working with the latest Java 11 programming techniques, using best practices for writing solid, robust (and well-written!) modern object-oriented applications. In addition to learning excellent, current coding skills in Java, you'll explore the new improved features for better performance and new capabilities for addressing rapid application development that Java 11 brings to the table. This course includes several key aspects that were introduced in Java 9, Java 10, and Java 11 including the Java Modular System, Local Variable Type Inference, and several API updates. This course also includes a Quick Look at what?s next in Java ? Java 12, Java 13, Java 14 and beyond. THE JAVA PLATFORM * Java Platforms * Lifecycle of a Java Program * Responsibilities of JVM * Documentation and Code Reuse USING THE JDK * Setting Up Environment * Locating Class Files * Compiling Package Classes * Source and Class Files * Java Applications THE ECLIPSE PARADIGM * Workbench and Workspace * Views * Editors * Perspectives * Projects WRITING A SIMPLE CLASS * Classes in Java * Class Modifiers and Types * Class Instance Variables * Primitives vs. Object References * Creating Objects ADDING METHODS TO THE CLASS * Passing Parameters into Methods * Returning a Value from a Method * Overloaded Methods * Constructors * Optimizing Constructor Usage LANGUAGE STATEMENTS * Operators * Comparison and Logical Operators * Looping * Continue and Break Statements * The switch Statement * The for-each() Loop USING STRINGS * Create an instance of the String class * Test if two strings are equal * Get the length of a string Parse a string for its token components * Perform a case-insensitive equality test * Build up a string using StringBuffer * Contrast String, StringBuffer, and StringBuilder SPECIALIZING IN A SUBCLASS * Extending a Class * Casting * The Object Class * Default Constructor * Implicit Constructor Chaining FIELDS AND VARIABLES * Instance vs. Local Variables: * Usage Differences * Data Types * Default Values * Block Scoping Rules * Final and Static Fields * Static Methods USING ARRAYS * Arrays * Accessing the Array * Multidimensional Arrays * Copying Arrays * Variable Arguments LOCAL-VARIABLE TYPE INFERENCE * Type inference * Infering Types of Local Variables * The var Reserved Type name * Benefits of Using var * Backward Compatibility JAVA PACKAGES AND VISIBILITY * Class Location of Packages * The Package Keyword * Importing Classes * Executing Programs * Visibility in the Modular System * Java Naming Conventions INHERITANCE AND POLYMORPHISM * Polymorphism: The Subclasses * Upcasting vs. Downcasting * Calling Superclass Methods from Subclass * The final Keyword INTERFACES AND ABSTRACT CLASSES * Separating Capability from Implementation * Abstract Classes * Implementing an Interface * Abstract Classes vs. Interfaces INTRODUCTION TO EXCEPTION HANDLING * Exception Architecture * Throwing Exceptions * Checked vs. Unchecked Exceptions EXCEPTIONS * Handling Multiple Exceptions * Automatic Closure of Resources * Creating Your Own Exceptions UTILITY CLASSES * Wrapper Classes * Autoboxing/Unboxing * Enumeration Syntax * Using Static imports INTRODUCTION TO GENERICS * Generics and Subtyping * Bounded Wildcards * Generic Methods * Legacy Calls to Generics * When Generics Should Be Used LAMBDA EXPRESSIONS AND FUNCTIONAL INTERFACE * Lambda Expression Syntax * Functional Interfaces * Type Inference in Java 8 * Method references COLLECTIONS * Characterizing Collections * Collection Interface Hierarchy * The Set, List and Queue Interfaces * Map Interfaces USING COLLECTIONS * Collection Sorting * Comparators * Using the Right Collection * Lambda expressions in Collections STREAMS * Processing Collections of data * The Stream interface * Reduction and Parallelism * Filtering collection data * Sorting Collection data * Map collection data * Find elements in Stream * Numeric Streams * Create infinite Streams * Sources for using Streams COLLECTORS * Creating Collections from a Stream * Group elements in the Stream * Multi-level grouping of elements * Partitioning Streams INTRODUCTION TO THE MODULE SYSTEM * Introduce Project Jigsaw * Classpath and Encapsulation * The JDK internal APIs * Java 9 Platform modules * Defining application modules * Define module dependencies * Implicit dependencies * Implied Readability * Exporting packages JAVA DATE/TIME * The Date and Calendar classes * Introduce the new Date/Time API * LocalDate, LocalDateTime, etc. * Formatting Dates * Working with time zones * Manipulate date/time values JAVA 12 AND BEYOND * Provide an overview of changes since Java 11 * Introduce Preview Features * Records (Java 14) * Switch Expressions (Java 12, Java 13, Java 14) * Text Blocks (Java 13, Java 14) * Helpful NullPointerExceptions (Java 14) * Pattern Matching for instanceof (Java 14) ADDITIONAL COURSE DETAILS: Nexus Humans Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11)
Delivered on-request, onlineDelivered Online
Price on Enquiry