• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2559 Designer courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Oracle 12c PL/SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. SELECTION & SETUP OF THE DATABASE INTERFACE * Considering Available Tools * Selecting the Appropriate Tool * Oracle Net Database Connections * Oracle PAAS Database Connections * Setup SQL Developer * Setup SQL*Plus * Setup Jdeveloper ABOUT BIND & SUBSTITUTION VARIABLES * Using SQL Developer * Using SQL*Plus CHOOSING A DATABASE PROGRAMMING LANGUAGE * What is Database Programming? * PL?SQL Performance Advantages * Integration wth Other Languages PL/SQL LANGUAGE FUNDAMENTALS * PL/SQL Program Structure * LANGUAGE SYNTAX RULES * EMBEDDING SQL * WRITING READABLE CODE * GENERATING DATABASE OUTPUT * SQL*PLUS INPUT OF A PROGRAM BLOCK DECLARE SECTION * About the Declare Section * DECLARE PRIMITIVE TYPES * DECLARATION OPTIONS * NOT NULL * CONSTANT * DATA DICTIONARY INTEGRATION * %TYPE * DECLARE SIMPLE USER---DEFINED TYPES * TYPE... TABLE * TYPE... RECORD * EXTENDED USER---DEFINED TYPES BEGIN SECTION * About the Begin Section * Manipulating Program Data * Logic Control & Branching * GOTO * LOOP * IF-THEN-ELSE * CASE EXCEPTION SECTION * ABOUT THE EXCEPTION SECTION * ISOLATING THE SPECIFIC EXCEPTION * PRAGMA EXCEPTION_INIT * SQLCODE &SQLERRM Example * SQL%ROWCOUNT &SELECT...INTO BEYOND THE BASICS: EXPLICIT CURSORS * ABOUT EXPLICIT CURSORS * EXTENDED CURSOR TECHNIQUES * FOR UPDATE OF Clause * WHERE CURRENT OF Clause * Using FOR?LOOP Cursors BEYOND THE BASICS: NESTED BLOCKS BEYOND THE BASICS: DECLARED SUBPROGRAMS * USING DECLARED SUBPROGRAMS * DECLARED PROCEDURE * DECLARED FUNCTION INTRODUCING DATABSE-RESIDENT PROGRAM UNITS * ABOUT DATABASE---RESIDENT PROGRAMS * PHYSICAL STORAGE & EXECUTION * TYPES OF STORED PROGRAM UNITS * STORED PROGRAM UNIT ADVANTAGES * MODULAR DESIGN PRINCIPLES CREATING STORED PROCEDURES & FUNCTIONS * STORED PROCEDURES & FUNCTIONS * CREATE PROCEDURE / CREATE FUNCTION * CREATING PROCEDURES & FUNCTIONS * RAISE_SALARY() Procedure * SALARY_VALID() Function * THE PARAMETER SPECIFICATION * DEFAULT Clause * SYSTEM & OBJECT PRIVILEGES * USING THE DEVELOPMENT TOOLS EXECUTING STORED PROCEDURES & FUNCTIONS * CALLING PROCEDURES & FUNCTIONS * UNIT TESTING WITH EXECUTE * ANONYMOUS BLOCK UNIT TESTING * SPECIFYING A PARAMETER NOTATION * SQL WORKSHEET UNIT TESTING * CALLING FUNCTIONS FROM SQL MAINTAINING STORED PROGRAM UNITS * RECOMPILING PROGRAMS * Mass Recompilation Using UTL_RECOMP() * DROPPING PROCEDURES & FUNCTIONS * DROP PROCEDURE / FUNCTION * DATA DICTIONARY METADATA * Using USER_OBJECTS * Using USER_SOURCE * Using USER_ERRORS * Using USER_OBJECT_SIZE * Using USER_DEPENDENCIES MANAGING DEPENDENCIES * DEPENDENCY INTERNALS * TRACKING DEPENDENCIES * THE DEPENDENCY TRACKING UTILITY * SQL DEVELOPER DEPENDENCY INFO * DEPENDENCY STRATEGY CHECKLISTS CREATING & MAINTAINING PACKAGES * ABOUT PACKAGES * CREATING PACKAGES * MAINTAINING PACKAGES * PERFORMANCE CONSIDERATIONS ADVANCED PACKAGE CAPABILITIES * DEFINER & INVOKER RIGHTS * WHITE LITS & ACCESSIBLE BY * PERSISTENT GLOBAL OBJECTS * DEFINING INITIALIZATION LOGIC * OBJECT ORIENTATION SUPPORT ADVANCED CURSOR TECHNIQUES * USING CUSROS VARIABLES * USING SYS_REFCURSOR * USING CURSOR EXPRESSIONS USING SYSTEM-SUPPLIED PACKAGE * DBMS_OUTPUT() * UTL_FILE() * FOPEN() EXAMPLE DATABASE TRIGGER CONCEPTS * ABOUT DATABASE TRIGGERS * DML EVENT TRIGGER SUB---TYPES * DATABASE TRIGGER SCENARIO * TRIGGER EXECUTION MECHANISMS * TRIGGERS WITHIN SQL WORKSHEET CREATING DATABASE TRIGGERS * STATEMENT-LEVEL TRIGGERS * Using RAISE_APPLICATION_ERROR() * ROW---LEVEL TRIGGERS * EXAMPLES OF TRIGGERS * EMPLOYEE_SALARY_CHECK Example * EMPLOYEE_JOURNAL Example * BUDGET_EVENT Example * INSTEAD OF TRIGGERS * TRIGGERS WITHIN AN APPLICATION MAINTAINING DATABASE TRIGGERS * CALL SYNTAX * TRIGGER MAINTENANCE TASKS * SHOW ERRORS TRIGGER * DROP TRIGGER * ALTER TRIGGER * MULTIPLE TRIGGERS FOR A TABLE * HANDLING MUTATING TABLE ISSUES IMPLEMENTING SYSTEM EVENT TRIGGERS * WHAT ARE SYSTEM EVENT TRIGGERS? * DEFININGTHE SCOPE * AVAILABLE SYSTEM EVENTS * SYSTEM EVENT ATTRIBUTES ADDITIONAL COURSE DETAILS: Nexus Humans Oracle 12c PL/SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c PL/SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c PL/SQL Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Understanding Cisco Data Center Foundations (DCFNDU) v1.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data center administrators Data center engineers Systems engineers Server administrators Network managers Cisco integrators and partners Data center designers Technical solutions architects Network architects Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco FEX connectivity Describe Ethernet port channels and vPCs Introduce switch virtualization, machine virtualization, and describe network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe NPV and NPIV Describe data center Ethernet enhancements that provide a lossless fabric Describe FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.1 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several CCNP and other professional-level data center courses and exams. DESCRIBING THE DATA CENTER NETWORK ARCHITECTURES * Cisco Data Center Architecture Overview * Three-Tier Network: Core, Aggregation, and Access * Spine-and-Leaf Network * Two-Tier Storage Network DESCRIBING THE CISCO NEXUS FAMILY AND CISCO NX-OS SOFTWARE * Cisco Nexus Data Center Product Overview * Cisco NX-OS Software Architecture * Cisco NX-OS Software CLI Tools * Cisco NX-OS Virtual Routing and Forwarding DESCRIBING LAYER 3 FIRST-HOP REDUNDANCY * Default Gateway Redundancy * Hot Standby Router Protocol * Virtual Router Redundancy Protocol * Gateway Load Balancing Protocol DESCRIBING CISCO FEX * Server Deployment Models * Cisco FEX Technology * Cisco FEX Traffic Forwarding * Cisco Adapter FEX DESCRIBING PORT CHANNELS AND VPCS * Ethernet Port Channels * Virtual Port Channels * Supported vPC Topologies DESCRIBING SWITCH VIRTUALIZATION * Cisco Nexus Switch Basic Components * Virtual Routing and Forwarding * Cisco Nexus 7000 VDCs * VDC Types * VDC Resource Allocation * VDC Management DESCRIBING MACHINE VIRTUALIZATION * Virtual Machines * Hypervisor * VM Manager DESCRIBING NETWORK VIRTUALIZATION * Overlay Network Protocols * VXLAN Overlay * VXLAN BGP EVPN Control Plane * VXLAN Data Plane * Cisco Nexus 1000VE Series Virtual Switch * VMware vSphere Virtual Switches INTRODUCING BASIC DATA CENTER STORAGE CONCEPTS * Storage Connectivity Options in the Data Center * Fibre Channel Storage Networking * VSAN Configuration and Verification DESCRIBING FIBRE CHANNEL COMMUNICATION BETWEEN THE INITIATOR SERVER AND THE TARGET STORAGE * Fibre Channel Layered Model * FLOGI Process * Fibre Channel Flow Control DESCRIBING FIBRE CHANNEL ZONE TYPES AND THEIR USES * Fibre Channel Zoning * Zoning Configuration * Zoning Management DESCRIBING CISCO NPV MODE AND NPIV * Cisco NPV Mode * NPIV Mode DESCRIBING DATA CENTER ETHERNET ENHANCEMENTS * IEEE Data Center Bridging * Priority Flow Control * Enhanced Transmission Selection * DCBX Protocol * Congestion Notification DESCRIBING FCOE * Cisco Unified Fabric * FCoE Architecture * FCoE Initialization Protocol * FCoE Adapters DESCRIBING CISCO UCS COMPONENTS * Physical Cisco UCS Components * Cisco Fabric Interconnect Product Overview * Cisco IOM Product Overview * Cisco UCS Mini * Cisco IMC Supervisor * Cisco Intersight DESCRIBING CISCO UCS MANAGER * Cisco UCS Manager Overview * Identity and Resource Pools for Hardware Abstraction * Service Profiles and Service Profile Templates * Cisco UCS Central Overview * Cisco HyperFlex Overview USING APIS * Common Programmability Protocols and Methods * How to Choose Models and Processes DESCRIBING CISCO ACI * Cisco ACI Overview * Multitier Applications in Cisco ACI * Cisco ACI Features * VXLAN in Cisco ACI * Unicast Traffic in Cisco ACI * Multicast Traffic in Cisco ACI * Cisco ACI Programmability * Common Programming Tools and Orchestration Options DESCRIBING CLOUD COMPUTING * Cloud Computing Overview * Cloud Deployment Models * Cloud Computing Services LAB OUTLINE * Explore the Cisco NX-OS CLI * Explore Topology Discovery * Configure HSRP * Configure vPCs * Configure VRF * Explore the VDC Elements * Install ESXi and vCenter * Configure VSANs * Validate FLOGI and FCNS * Configure Zoning * Configure Unified Ports on a Cisco Nexus Switch and Implement FCoE * Explore the Cisco UCS Server Environment * Configure a Cisco UCS Service Profile * Configure Cisco NX-OS with APIs * Explore the Cisco UCS Manager XML API Management Information Tree * Explore Cisco ACI

Understanding Cisco Data Center Foundations (DCFNDU) v1.1
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). DESCRIBING THE CISCO EMAIL SECURITY APPLIANCE * Cisco Email Security Appliance Overview * Technology Use Case * Cisco Email Security Appliance Data Sheet * SMTP Overview * Email Pipeline Overview * Installation Scenarios * Initial Cisco Email Security Appliance Configuration * Centralizing Services on a Cisco ADMINISTERING THE CISCO EMAIL SECURITY APPLIANCE * Distributing Administrative Tasks * System Administration Managing and Monitoring Using the Command Line Interface (CLI) * Other Tasks in the GUI * Advanced Network Configuration * Using Email Security Monitor * Tracking Messages * Logging CONTROLLING SENDER AND RECIPIENT DOMAINS * Public and Private Listeners * Configuring the Gateway to Receive Email * Host Access Table Overview * Recipient Access Table Overview * Configuring Routing and Delivery Features CONTROLLING SPAM WITH TALOS SENDERBASE AND ANTI-SPAM * SenderBase Overview * Anti-Spam * Managing Graymail * Protecting Against Malicious or Undesirable URLs * File Reputation Filtering and File Analysis * Bounce Verification USING ANTI-VIRUS AND OUTBREAK FILTERS * Anti-Virus Scanning Overview * Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering * Configuring the Appliance to Scan for Viruses * Outbreak Filters * How the Outbreak Filters Feature Works Managing Outbreak Filters USING MAIL POLICIES * Email Security Manager Overview * Mail Policies Overview * Handling Incoming and Outgoing Messages Differently * Matching Users to a Mail Policy Message Splintering * Configuring Mail Policies USING CONTENT FILTERS * Content Filters Overview * Content Filter Conditions * Content Filter Actions * Filter Messages Based on Content * Text Resources Overview * Using and Testing the Content Dictionaries Filter Rules * Understanding Text Resources * Text Resource Management * Using Text Resources USING MESSAGE FILTERS TO ENFORCE EMAIL POLICIES * Message Filters Overview * Components of a Message Filter * Message Filter Processing * Message Filter Rules * Message Filter Actions * Attachment Scanning * Examples of Attachment Scanning Message Filters * Using the CLI to Manage Message Filters * Message Filter Examples * Configuring Scan Behavior PREVENTING DATA LOSS * Overview of the Data Loss Prevention (DLP) Scanning Process * Setting Up Data Loss Prevention * Policies for Data Loss Prevention * Message Actions * Updating the DLP Engine and Content Matching Classifiers USING LDAP * Overview of LDAP * Working with LDAP * Using LDAP Queries * Authenticating End-Users of the Spam Quarantine * Configuring External LDAP Authentication for Users * Testing Servers and Queries * Using LDAP for Directory Harvest Attack Prevention * Spam Quarantine Alias Consolidation Queries * Validating Recipients Using an SMTP Server SMTP SESSION AUTHENTICATION * Configuring AsyncOS for SMTP Authentication * Authenticating SMTP Sessions Using Client Certificates * Checking the Validity of a Client Certificate * Authenticating User Using LDAP Directory * Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate * Establishing a TLS Connection from the Appliance * Updating a List of Revoked Certificates EMAIL AUTHENTICATION * Email Authentication Overview * Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing * Verifying Incoming Messages Using DKIM * Overview of Sender Policy Framework (SPF) and SIDF Veri?cation * Domain-based Message Authentication Reporting and Conformance (DMARC) Verification * Forged Email Detection EMAIL ENCRYPTION * Overview of Cisco Email Encryption * Encrypting Messages * Determining Which Messages to Encrypt * Inserting Encryption Headers into Messages * Encrypting Communication with Other Message Transfer Agents (MTAs) * Working with Certificates * Managing Lists of Certificate Authorities * Enabling TLS on a Listener?s Host Access Table (HAT) * Enabling TLS and Certi?cate Verification on Delivery * Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services USING SYSTEM QUARANTINES AND DELIVERY METHODS * Describing Quarantines * Spam Quarantine * Setting Up the Centralized Spam Quarantine * Using Safelists and Blocklists to Control Email Delivery Based on Sender * Configuring Spam Management Features for End Users * Managing Messages in the Spam Quarantine * Policy, Virus, and Outbreak Quarantines * Managing Policy, Virus, and Outbreak Quarantines * Working with Messages in Policy, Virus, or Outbreak Quarantines * Delivery Methods CENTRALIZED MANAGEMENT USING CLUSTERS * Overview of Centralized Management Using Clusters * Cluster Organization * Creating and Joining a Cluster * Managing Clusters * Cluster Communication * Loading a Configuration in Clustered Appliances * Best Practices TESTING AND TROUBLESHOOTING * Debugging Mail Flow Using Test Messages: Trace * Using the Listener to Test the Appliance * Troubleshooting the Network * Troubleshooting the Listener * Troubleshooting Email Delivery * Troubleshooting Performance * Web Interface Appearance and Rendering Issues * Responding to Alerts * Troubleshooting Hardware Issues * Working with Technical Support REFERENCES * Model Specifications for Large Enterprises * Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces * Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE TELCO CLOUD AUTOMATION INSTALLATION * Describe day zero operations for VMware Telco Cloud Automation * Describe the VMware Telco Cloud Automation architecture * List the steps to perform VMware Telco Cloud Automation deployment * List the steps to perform VMware Telco Cloud Automation control plane integration * Describe VMware Telco Cloud Automation control plane scaling * Describe the requirements for other applications such as vRealize Orchestrator and Harbor * Describe where, when, and how to use VMware Telco Cloud Automation tagging DAY 1 OPERATIONS: INFRASTRUCTURE AUTOMATION * Describe infrastructure automation * List the use cases of infrastructure automation * List the benefits of infrastructure automation * Describe the infrastructure requirements of infrastructure automation * Describe the infrastructure automation domains * List the steps to deploy an infrastructure using infrastructure automation DAY 1 OPERATIONS: INFRASTRUCTURE SETTINGS * Describe the VMware Telco Cloud Automation infrastructure options * Describe VMware Telco Cloud Automation infrastructure requirements * Outline the role of virtual infrastructure and VMware Telco Cloud Automation * Identify the benefits of public and private infrastructures * List the steps to integrate a VM-based virtual infrastructure * List the steps to integrate a container-based virtual infrastructure * Describe private infrastructure requirements DAY 1 OPERATIONS: CONTAINERS AS A SERVICE * Define containers as a service (CaaS) * List the challenges of CNF deployment without automation * Describe the Kubernetes and Tanzu Kubernetes Grid architectures * List steps to create a Kubernetes cluster template * Describe the process for deploying node pools and groups * List the steps to support anti-affinity of workload cluster nodes * Describe cluster monitoring * List CaaS scale options DAY 1 OPERATIONS: PARTNER INTEGRATION * Describe partner integration and the types of partners * Describe Harbor and the various Harbor platforms * List the steps to interface with a Harbor platform * Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) * Explain how to add an S-VNFM * Define S-VNFM use cases * List the benefits and challenges of using Airgap DAY 1 OPERATIONS: NETWORK FUNCTIONS AD NETWORK SERVICES * Describe the roles of network services and network functions * List the types of descriptors * Describe the role of TOSCA * Describe the role of onboarding * List the steps to onboard network functions and network services * Examine the results of the onboarding process * List the steps to instantiate network functions and network services * Examine the results of the instantiation process DAY 2 OPERATIONS: AUTHORIZATION MODEL * Explain the resources that can be accessed in vSphere * Define the role of a vCenter Server system in credential management * Define the role of Keycloak in credential management * Describe the procedures to create, delete, and modify rules using vCenter Server * Explain how to control and verify access to vSphere resources * List the roles in VMware Telco Cloud Automation * Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation * List all the permissions and filters that can be implemented in VMware Telco Cloud Automation DAY 2 OPERATIONS: LIFE CYCLE MANAGEMENT * Explain the life cycle stages in VMware Telco Cloud Automation control plane * Explain the life cycle stages in VMware Telco Cloud Automation * Define an upgrade schedule * Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane * Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation * Describe network function and network service life cycle management events * Execute network function and network service healing * Perform network function and network service termination DAY 2 OPERATIONS: TROUBLESHOOTING * List the components of the VMware Telco Cloud Automation dashboard * Explain the features of fault management in VMware Telco Cloud Automation * Explain the features of performance management in VMware Telco Cloud Automation * Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of CCLI for troubleshooting * Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation * Describe how to use vRealize Operations DAY TWO OPERATIONS: API MANAGEMENT * Define the VMware Telco Cloud Automation API * Explain the API architecture * Describe VMware Telco Cloud Automation API use cases * Describe how to request security tokens for implementation * Explain how to implement commands through external systems using APIs DAY TWO OPERATIONS: CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY * Describe continuous integration and continuous delivery (CICD) * List the benefits and challenges of CICD * Describe how VMware Telco Cloud Automation can be used in a CICD environment * Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE TELCO CLOUD AUTOMATION INSTALLATION * Describe day-zero operations for VMware Telco Cloud Automation * Describe the VMware Telco Cloud Automation architecture * List the steps to perform VMware Telco Cloud Automation deployment * List the steps to perform VMware Telco Cloud Automation control plane integration * Describe VMware Telco Cloud Automation control plane scaling * Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor * Describe where, when, and how to use VMware Telco Cloud Automation tagging DAY ONE OPERATIONS: INFRASTRUCTURE SETTINGS * Describe the VMware Telco Cloud Automation infrastructure options * Describe VMware Telco Cloud Automation infrastructure requirements * Outline the role of virtual infrastructure and TCA * Identify the benefits of public versus private infrastructure * List the steps to integrate a VM-based virtual infrastructure * List the steps to integrate a container-based virtual infrastructure * Describe private infrastructure requirements DAY ONE OPERATIONS: CONTAINERS AS A SERVICE * Define Containers as a Service (CaaS) * List the challenges of CNF deployment without automation * Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures * Describe supporting technologies like Cluster API * List steps to create a Kubernetes cluster template * Describe the process for deploying node pools and groups * Describe cluster monitoring * List CaaS scale options DAY ONE OPERATIONS: PARTNER INTEGRATION * Describe partner integration and the types of partners * Describe Harbor and the various Harbor platforms * List the steps to interface with a Harbor platform * Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) * Explain how to add an S-VNFM * Define S-VNFM use cases DAY ONE OPERATIONS: ZERO TOUCH PROVISIONING AND INFRASTRUCTURE DEPLOYMENT * Describe zero-touch provisioning * List the use cases of zero-touch provisioning * List the benefits of zero-touch provisioning * Describe the infrastructure requirements of zero-touch provisioning * Describe the zero-touch provisioning domains * List the steps to deploy an infrastructure using zero-touch provisioning DAY ONE OPERATIONS: NETWORK FUNCTIONS AD NETWORK SERVICES * Describe the roles of network services and network functions * List the types of descriptors * Describe the role of TOSCA * Describe the role of onboarding * List the steps to onboard network functions and network services * Examine the results of the onboarding process * List the steps to instantiate network functions and network services * Examine the results of the instantiation process DAY TWO OPERATIONS: AUTHORIZATION MODEL * Explain the resources that can be accessed in vSphere * Define the role of a VMware vCenter Server© system in credential management * Describe the procedures to create, delete, and modify rules using vCenter Server * Explain how to control and verify access to vSphere resources * List roles in VMware Telco Cloud Automation * Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation * List all the permissions and filters that can be implemented in VMware Telco Cloud Automation * Summarize the role-based access control model of VMware Telco Cloud Automation DAY TWO OPERATIONS: PLATFORM LIFE CYCLE MANAGEMENT * Explain the life cycle stages in VMware Telco Cloud Automation control plane * Explain the life cycle stages in VMware Telco Cloud Automation * Define an upgrade schedule * Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation * control plane * Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation * Describe network function and network service life cycle management events * Execute network function and network service healing * Set up Network Function and Network Service monitoring * Perform Network Function and Network Service termination DAY TWO OPERATIONS: TROUBLESHOOTING * List the components of the VMware Telco Cloud Automation dashboard * Explain the features of fault management in VMware Telco Cloud Automation * Explain the features of performance management in VMware Telco Cloud Automation * Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs * Troubleshoot using tcf_manager, app.log, and web.log * Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation * Usage of VMware vRealize© Operations? DAY TWO OPERATIONS: API MANAGEMENT * Define the VMware Telco Cloud Automation API * Explain the API architecture * Describe VMware Telco Cloud Automation API use cases * Explain how to configure an external REST API * Describe how to request security tokens for implementation * Explain how to implement commands through external systems using APIs DAY TWO OPERATIONS: CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY * Describe continuous integration and continuous delivery (CICD) * List the benefits and challenges of CICD * Describe how VMware Telco Cloud Automation can be used in a CICD environment * Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives DAY 0 OPERATIONS: VMWARE TELCO CLOUD INFRASTRUCTURE INSTALLATION * Describe the challenges of the telco cloud * Describe the key functions of the telco cloud * List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure * Describe the VMware Telco Cloud Infrastructure architecture * Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture * List the VMware Telco Cloud Infrastructure deployment options * Describe the VMware Cloud Director architecture * List the key VMware components that are part of VMware Cloud Director * Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure DAY 0 OPERATIONS: ETSI NFV REQUIREMENTS FOR CLOUD PLATFORMS * Compare physical and virtual infrastructures * List the benefits and challenges of physical infrastructure * Describe the types of virtual infrastructure * Describe the advantages and components of the NFV infrastructure (NFVI) * Explain the role of network virtualization in the NFVI * List the requirements of NFVI for VMware Cloud Director * Describe the networking options of VMware Cloud Director * Describe the key networking use cases * Describe requirements of VMware Telco Cloud Automation? for networking * Describe the storage options of VMware Cloud Director * Describe the key storage use cases DAY 1 OPERATIONS: VIRTUALIZED INFRASTRUCTURE MANAGER (VIM) CONFIGURATION * Explain basic concepts related to VMware Cloud Director * Describe the components of the VMware Cloud Director architecture * Describe the basic configuration of the VMware Cloud Director architecture * Describe virtual data centers or VDCs * Explain the role of organization VDCs * Describe the relationship between provider VDCs and organization VDCs * Describe resources in VMware Cloud Director * List the key resource organization * Create resource pools * Describe how vSAN integrates with VMware Cloud Director DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR PROVIDERS * Describe how compute resources are provided to VMware Cloud Director * Describe how storage resources are provided to VMware Cloud Director * Describe provider VDC requirements and best practices * List the requirements of creating VDCs * Describe the VNF on-boarding process * Create provider VDCs DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR ORGANIZATIONS * Describe VMware Cloud Director organizations * Create VMware Cloud Director organizations * Navigate through the VMware Cloud Director HTML5 provider portal * Describe the VMware Cloud Director organization VDC * Navigate through the tenant portal * List use cases for a VMware Cloud Director organization VDC * List the organization VDC allocation models * Describe the types of resources that can be allocated * Describe how resources are allocated for an organization * Examine the function and requirements of network pools * Describe the network types available in VMware Cloud Director (external, organization, and vApp) * Create and manage organization VDC networks * Describe catalogs * Manage an organization?s catalog * Populate, share, and publish catalogs * Describe vApps * Manage access to vApps and catalogs * Modify the configuration of vApps and their virtual machines (VMs) * Manage organization VDC networking * Create affinity and anti-affinity rules DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR SECURITY * Describe role-based access * Create custom security roles * Describe the directory services in VMware Cloud Director * Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director * Explain the use of VMware Cloud Director with SSO DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR NETWORKING * List networking options in VMware Cloud Director * Describe key networking use cases in VMware Cloud Director * Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director * Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director * Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall * Describe an overview of VMware NSX-T? Data Center * Explain the architecture of NSX-T Data Center * Describe VMware Cloud Director supported features of NSX-T Data Center * Describe the benefits and challenges of multisite networking * List the requirements for multisite networking * Describe the benefits and challenges of networking between VDCs * List the requirements for networking between VDCs * Configure cross-VDC networking DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR RESOURCE MANAGEMENT AND MONITORING * Identify the key resources that need to be managed with VMware Cloud Director * List monitoring options with VMware Cloud Director * Explain the resource management and monitoring architecture in VMware Cloud Director * Monitor objects from the VMware Cloud Director portal * Identify features of VMware vRealize© Operations Manager? * Integrate VMware Cloud Director with vRealize Operations Manager * Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? * Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director * Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director * Integrate VMware Cloud Director with the Tenant App * Configure the Tenant App for VMware Cloud Director * Monitor objects with the Tenant App * List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager * List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? * List the steps to review historical virtual machine metrics in VMware Cloud Director * Examine VMware Cloud Director logs DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR TROUBLESHOOTING * Identify the features of the VMware Telco Cloud Automation dashboards * List the components of the VMware Telco Cloud Automation dashboards * Explain the features of fault management in VMware Telco Cloud Director * Describe the use of fault management in VMware Cloud Director * Describe the use of performance management in VMware Cloud Director * Describe the use of logs in VMware Cloud Director * Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. EXPLORING ORACLE DATABASE ARCHITECTURE * Introducing Oracle Database * Relation Database Models * Oracle SQL and PL/SQL * Oracle Database Server Architecture * Connecting to Oracle Databases * Oracle Database Tools * Oracle-Supplied User Accounts * Querying the Oracle Data Dictionary MANAGING DATABASE INSTANCES * Initialization Parameter Files * Starting Up Oracle Databases * Shutting Down Oracle Databases * Opening and Closing PDBs * Working with the Automatic Diagnostic Repository (ADR) * Querying Dynamic Performance Views CREATING PDBS * Methods and Tools to Create PDBs * Creating PDBs from Seed with SQL*Plus * Cloning PDBs with SQL*Plus * Unplugging and Pluggin In PDBs with SQL*Plus * Dropping PDBs with SQL*Plus CONFIGURING THE ORACLE NETWORK ENVIRONMENT * Oracle Net Services * How Listeners Work * Configuring Listeners for Dynamic Service Registration * Configuring Listeners for Static Service Registration * Configuring Local Naming for Connections * Testing Oracle Net Connectivity with tnsping * Configuring Communication Between Databases * Dedicated Versus Shared Server Configurations ADMINISTERING USER SECURITY * Creating Users * Granting Privileges * Creating and Granting Roles * Revoking Privileges and Roles * Creating and Assigning Profiles * Authenticating Users * Assigning Quotas to Users * Applying the Principal of Least Privilege CREATING AND MANAGING TABLESPACES * How Table Data is Stored * Creating Tablespaces in SQL*Plus * Altering and Dropping Tablespaces in SQL*Plus * Viewing Tablespace Information in SQL*Plus * Implementing Oracle Managed Files * Moving and Renaming Online Data Files in SQL*Plus MANAGING STORAGE SPACE * Oracle Database Space Management Features * Block Space Management * Row Chaining and Migration * Free Space Management Within Segments * Types of Segments * Allocating Extents * Understanding Deferred Segment Creation * Space-Saving Features MANAGING UNDO DATA * Undo Data: Overview * Transactions and Undo Data * Storing Undo Information * Comparing Undo Data and Redo Data * Managing Undo * Local Undo Mode Versus Shared Undo Mode * Configuring Undo Retention * Categories of Undo MOVING DATA * Moving Data: General Architecture * Oracle Data Pump: Overview * Oracle Data Pump: Benefits * Data Pump Export and Import Clients * Data Pump Utility: Interfaces and Modes * Data Pump Import: Transformations * SQL*Loader Overview * Loading Methods BACKUP AND RECOVERY CONCEPTS * DBA Responsibilities * Categories of Failure * Understanding Instance Recovery * Understanding Types of Backups * Comparing Complete and Incomplete Recovery * Oracle Data Protection Solutions * Flashback Technology MONITORING AND TUNING DATABASE PERFORMANCE * Managing Performance Activities * Performance Planning Considerations * Database Maintenance * Automatic Workload Repository (AWR) * Automatic Database Diagnostic Monitor * Performance Monitoring * Performance Tuning Methodology * Database Server Statistics and Metrics SQL TUNING * SQL Tuning Process * Oracle Optimizer * Optimizer Statistics * SQL Plan Directives * Adaptive Execution Plans * SQL Tuning Advisor * SQL Access Advisor * SQL Performance Analyzer ORACLE DATABASE RESOURCE MANAGER * Oracle Database Resource Manager: Overview * Resource Manager Elements * Using Resource Manager to Allocate Resources * Creating a Simple Resource Plan * Creating a Complex Resource Plan * Using the Active Session Pool Feature * Limiting CPU Utilization at the Database Level * Limiting CPU Utilization at the Server Level ENTERPRISE MANAGER CLOUD CONTROL * Controlling the Enterprise Manager Cloud Control Framework * Starting the Enterprise Manager Cloud Control Framework * Stopping the Enterprise Manager Cloud Control Framework INTRODUCTION TO ORACLE DATABASE CLOUD SERVICE * Oracle Cloud: Overview * Database Cloud Service Offerings * DBCS Architecture * Features and Tooling * Additional Database Configuration Options CREATING DBCS DATABASE DEPLOYMENTS * Automated Database Provisioning * Creating a Database Deployment * How SSH Key Pairs are Used * Creating an SSH Key Pair * Storage Used for Database Files MANAGING DBCS DATABASE DEPLOYMENTS * Cloud Tooling * Accessing Tools and Features from the DBCS Console * Managing the Compute Node Associated With a Database Deployment * Managing Network Access to DBCS * Enabling Access to a Compute Node Port * Scaling a Database Deployment BACKING UP AND RESTORING DBCS DATABASE DEPLOYMENTS * Backing Up and Recovering Databases on DBCS * Backup Destination Choices * Backup Configuration * Creating an On-Demand Backup * Customizing the Backup Configuration * Performing Recovery by Using the Console * Performing Recovery by Using the dbaascli Utility PATCHING DBCS DATABASE DEPLOYMENTS * Patching DBCS * Using the DBCS Console to Manage Patches * Using the dbaascli Utility to Manage Patches CREATING MASTER ENCRYPTION KEYS FOR PDBS * CDB and PDB Master Encryption Keys * Determining Whether You Need to Create and Activate and Encryption Key for a PDB * Creating and Activating an Encryption Key TABLESPACE ENCRYPTION BY DEFAULT * Tablespace Encryption by Default in DBCS * Transparent Data Encryption (TDE) Overview * Components of TDE * Using TDE * Defining the Keystore Location * Controlling Tablespace Encryption by Default * Managing the Software Keystore and Master Encryption Key * Managing the Keystore in CDBs and PDBs ADDITIONAL COURSE DETAILS: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) DESCRIBING HIGH AVAILABILITY ON LAYER 2 * Overview of Layer 2 High-Availability Mechanisms * Virtual Port Channels * Cisco Fabric Path * Virtual Port Channel+ DESIGNING LAYER 3 CONNECTIVITY * First Hop Redundancy Protocols * Improve Routing Protocol Performance and Security * Enhance Layer 3 Scalability and Robustness DESIGNING DATA CENTER TOPOLOGIES * Data Center Traffic Flows * Cabling Challenges * Access Layer * Aggregation Layer * Core Layer * Spine-and-Leaf Topology * Redundancy Options DESIGNING DATA CENTER INTERCONNECTS WITH CISCO OTV * Cisco OTV Overview * Cisco OTV Control and Data Planes * Failure Isolation * Cisco OTV Features * Optimize Cisco OTV * Evaluate Cisco OTV DESCRIBING LOCATOR/ID SEPARATION PROTOCOL * Locator/ID Separation Protocol * Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility * LISP Extended Subnet Mode (ESM) Multihop Mobility * LISP VPN Virtualization DESCRIBING VXLAN OVERLAY NETWORKS * Describe VXLAN Benefits over VLAN * Layer 2 and Layer 3 VXLAN Overlay * Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview * VXLAN Data Plane DESCRIBING HARDWARE AND DEVICE VIRTUALIZATION * Hardware-Based High Availability * Device Virtualization * Cisco UCS Hardware Virtualization * Server Virtualization * SAN Virtualization * N-Port ID Virtualization DESCRIBING CISCO FEX OPTIONS * Cisco Adapter FEX * Access Layer with Cisco FEX * Cisco FEX Topologies * Virtualization-Aware Networking * Single Root I/O Virtualization * Cisco FEX Evaluation DESCRIBING BASIC DATA CENTER SECURITY * Threat Mitigation * Attack and Countermeasure Examples * Secure the Management Plane * Protect the Control Plane * RBAC and Authentication, Authorization, and Accounting (AAA) DESCRIBING ADVANCED DATA CENTER SECURITY * Cisco TrustSec in Cisco Secure Enclaves Architecture * Cisco TrustSec Operation * Firewalling * Positioning the Firewall Within Data Center Networks * Cisco Firepower© Portfolio * Firewall Virtualization * Design for Threat Mitigation DESCRIBING MANAGEMENT AND ORCHESTRATION * Network and License Management * Cisco UCS Manager * Cisco UCS Director * Cisco Intersight * Cisco DCNM Overview DESCRIBING STORAGE AND RAID OPTIONS * Position DAS in Storage Technologies * Network-Attached Storage * Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) * Evaluate Storage Technologies DESCRIBING FIBRE CHANNEL CONCEPTS * Fibre Channel Connections, Layers, and Addresses * Fibre Channel Communication * Virtualization in Fibre Channel SAN DESCRIBING FIBRE CHANNEL TOPOLOGIES * SAN Parameterization * SAN Design Options * Choosing a Fibre Channel Design Solution DESCRIBING FCOE * FCoE Protocol Characteristics * FCoE Communication * Data Center Bridging * FCoE Initialization Protocol * FCoE Design Options DESCRIBING STORAGE SECURITY * Common SAN Security Features * Zones * SAN Security Enhancements * Cryptography in SAN DESCRIBING SAN MANAGEMENT AND ORCHESTRATION * Cisco DCNM for SAN * Cisco DCNM Analytics and Streaming Telemetry * Cisco UCS Director in the SAN * Cisco UCS Director Workflows DESCRIBING CISCO UCS SERVERS AND USE CASES * Cisco UCS C-Series Servers * Fabric Interconnects and Blade Chassis * Cisco UCS B-Series Server Adapter Cards * Stateless Computing * Cisco UCS Mini DESCRIBING FABRIC INTERCONNECT CONNECTIVITY * Use of Fabric Interconnect Interfaces * VLANs and VSANs in a Cisco UCS Domain * Southbound Connections * Northbound Connections * Disjoint Layer 2 Networks * Fabric Interconnect High Availability and Redundancy DESCRIBING HYPERCONVERGED AND INTEGRATED SYSTEMS * Hyperconverged and Integrated Systems Overview * Cisco HyperFlex? Solution * Cisco HyperFlex Scalability and Robustness * Cisco HyperFlex Clusters * Cluster Capacity and Multiple Clusters on One Cisco UCS Domain * External Storage and Graphical Processing Units on Cisco HyperFlex * Cisco HyperFlex Positioning DESCRIBING CISCO UCS MANAGER SYSTEMWIDE PARAMETERS * Cisco UCS Setup and Management * Cisco UCS Traffic Management DESCRIBING CISCO UCS RBAC * Roles and Privileges * Organizations in Cisco UCS Manager * Locales and Effective Rights * Authentication, Authorization, and Accounting * Two-Factor Authentication DESCRIBING POOLS FOR SERVICE PROFILES * Global and Local Pools * Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools * World Wide Name (WWN) Pools * Server and iSCSI Initiator IP Pools DESCRIBING POLICIES FOR SERVICE PROFILES * Global vs. Local Policies * Storage and Basic Input/Output System (BIOS) Policies * Boot and Scrub Policies * Intelligent Platform Management Interface (IPMI) and Maintenance Policies DESCRIBING NETWORK-SPECIFIC ADAPTERS AND POLICIES * LAN Connectivity Controls * SAN Connectivity Controls * Virtual Access Layer * Connectivity Enhancements DESCRIBING TEMPLATES IN CISCO UCS MANAGER * Cisco UCS Templates * Service Profile Templates * Network Templates DESIGNING DATA CENTER AUTOMATION * Model-Driven Programmability * Cisco NX-API Overview * Programmability Using Python * Cisco Ansible Module * Use the Puppet Agent ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle 12c SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. RELATIONAL DATABASES & DATA MODELS * About Data Models * About the Relational Model * The Electronics Data Model * About the Relational DBMS SELECTION & SETUP OF THE DATABASE INTERFACE * Considering Available Tools * Selecting the Appropriate Tool * Oracle Net Database Connections * Oracle PAAS Database Connections * Setup SQL Developer * Setup SQL*Plus * Setup Jdeveloper USING THE DATABASE INTERFACE * About Bind & Substitution Variables * Using SQL Developer * Using SQL*Plus INTRODUCTION TO THE SQL LANGUAGE * About the SQL Language * Characteristics of SQL * Introducing SQL Using Select * SQL Rules THE SELECT STATEMENT * The Select Statement * Distinct/Unique Keyword * Using Alias Names RESTRICTING RESULTS WITH THE WHERE CLAUSE * About Logical Operators * Equality Operator * Boolean Operators * REGEXP_LIKE() * In Operator SORTING DATA WITH THE ORDER BY CLAUSE * About the Order by Clause * Multiple Column Sorts * Specify the Sort Sequence * About Null Values within Sorts * Using Column Aliases PSEUDO COLUMNS, FUNCTIONS & TOP-N QUERIES * Rowid Pseudo Column * ORA_ROWSCN PSEUDO Column * ROWNUM Pseudo Column * About the Built-In Functions * SYSDATE * User & UID * SESSIONTIMEZONE Function * Using the Dual Table * Row Limiting & Top-N Queries * FETCH First x Rows Only Clause * OFFSET x Rows Clause * FETCH?PERCENT Clause * The WITH TIES Option JOINING TABLES * About Joins * Inner Joins * Reflexive Join * Non-Key Join * Outer Join USING THE SET OPERATORS * About the Set Operators * SQL Set Operator Examples * UNION Example * INTERECT Example * MINUS Example * UNION All SUMMARY FUNCTIONS USING SUB-QUERIES * Finding Data with Sub-Queries * Standard Sub-Queries * Correlated Sub-Queries * The EXISTS Operator AGGREGATING DATA WITHIN GROUPS * About Summary Groups * Find Groups within the Tables * Select Data From the Base Tables * Select Groups from the Results USE DDL TO CREATE & MANAGE TABLES * Create Table Statement * Column Data Types * Not Null * Default * Describe * Alter Table Statement * Drop Table Statement * Table DDL Using SQL Developer * Alter User Statement * Alter Session Statement * NLS_Language * NLS_Date USE DML TO MANIPULATE DATA * The Insert Statement * The Delete Statement * The Update Statement * About Transactions * Transaction Rollback * Transaction Commit * Transaction Savepoint * The Set Transaction Statement * Set Transaction Read Only Statement Rules UNDERSTANDING THE DATA MODELS * The Company Data Model * The Electronics Data Model ABOUT THE SQL-99 STANDARD * SQL-92 & SQL-99 * Cross Joins * Natural Joins * Inner Joins * Implicit Inner Join * Outer Joins * Anti Joins * Named Sub-Queries * ENHANCING GROUPS WITH ROLLUP & CUBE * Using Rollup * The Grouping() Function * Using Cube SQL FUNCTIONS: CHARACTER HANDLING * What are the SQL Functions? * String Formatting Functions * UPPER(), LOWER() Example * INITCAP() Example * Character Codes Functions * CHR((), ASCII() Examples * PAD & TRIM Functions * RPAD() Example * RTRIM() Example * TRIM() Example * String Manipulation Functions * DECODE () Example * SUBSTR() Example * INSTR() Example * TRANSLATE() Example * REPLACE() Example * String Comparison Functions * LEAST() Example * Phonetic Search Function * SOUNDEX() Example SQL FUNCTIONS: NUMERIC HANDLING * About the Numeric Data Functions * GREATEST() Example * ABS() Example * ROUND() Example * TRUNC() Example * SIGN() Example * TO_NUMBER() Example & Data ype Conversions * NULL VALUES FUNCTIONS * NVL() & NVL2() Function * NVL() Example (Character) * NVL() Example (Numeric Loss of Data) * NVL() Example (Numeric Output) * NVL2() Example * COALESCE() Function * NULLIF() Function SQL FUNCTIONS: DATE HANDLING * Date Formatting Functions * TO_CHAR() & TO_DATE() Format Patterns * TO_CHAR() Examples * TO_DATE() Examples * EXTRACT() Example * Date Arithmetic Functions * MONTHS_BETWEEN() Example * ADD_MONTHS() Example * LAST_DAY() Example * NEXT_DAY() Example * TRUNC(), ROUND() Dates Example * NEW_ TIME() Example * About V$TIMEZONE_NAMES * CAST() FUNCTION & TIME ZONES DATABASE OBJECTS: ABOUT DATABASE OBJECTS * About Database Objects * About Schemas * Making Object References DATABASE OBJECTS: RELATIONAL VIEWS * About Relations Views * The Create View Statement * Why Use Views? * Accessing Views with DML * Maintaining View Definitions * Alter View * Drop View * DDL Using SQL Developer * DATABASE OBJECTS: INDEXES * About Indexes * Create & Drop Index Statements * Indexes & Performance * Data Dictionary Storage DATABASE OBJECTS: CREATING OTHER OBJECTS * About Sequences * Referencing NEXTVAL * Referencing CURRVAL * Within the DEFAULT Clause * Alter Sequence & Drop Sequence * ALTER SEQUENCE * DROP SEQUENCE * About Identity Columns * CREATE TABLE?GENERATED AS IDENTITY * ALTER TABLE?GENERATED AS IDENTITY * Start With Limit Value * ALTER TABLE...DROP IDENTITY * About Synonyms * CREATE & DROP SYNONYM Statements * CREATE SYNONYM * DROP SYNONYM * Public Vs Private Synonyms * CREATE SCHEMA AUTHORIZATION DATABASE OBJECTS: OBJECT MANAGEMENT USING DDL * The RENAME Statement * TABLESPACE Placement * CREATE TABLE?TABLESPACE * The Comment Statement * The TRUNCATE TABLE Statement DATABASE OBJECTS: SECURITY * About Object Security * Grant Object Privileges * Revoke Object Privileges * Object Privileges & SQL Developer DATA INTEGRITY USING CONSTRAINTS * About Constraints * NOT NULL Constraint * NOT NULL Example * CHECK Constraint * UNIQUE Constraint * PRIMARY KEY Constraint * REFERENCES Constraint * ON DELETE CASCADE Example * ON DELETE SET NULL Example * Constraints on Existing Tables * Constraints & SQL Developer MANAGING CONSTRAINT DEFINITIONS * RENAMING & DROPPING Constraints * ENABLING & DISABLING Constraints * DEFERRED Constraint Enforcement * SET CONSTRAINTS * Handling Constraint Exceptions * Constraints with Views * DATA Dictionary Storage THE DATA DICTIONARY STRUCTURE * More About the Data Dictionary * OBJECT-SPECIFIC Dictionary Views * USER_UPDATABLE_COLUMNS * The Dictionary Structure * METADATA & SQL Developer ADDITIONAL COURSE DETAILS: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c SQL Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Designer"

Show all 664