• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10054 Professional Skills Course (PSC) courses delivered Online

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CARBON BLACK CLOUD INTEGRATIONS * Describe the integration capabilities with VMware Carbon Black Cloud * Determine integration use cases for VMware Carbon Black Cloud * Identify required components for integrating VMware Carbon Black Cloud * Differentiate VMware Carbon Black Cloud integration vendors VMWARE CARBON BLACK CLOUD SYSLOG INTEGRATION * Describe the function of the Syslog Connector * Generate API and SIEM keys from the Cloud console * Validate a successful Syslog integration * Describe how to automate the Syslog Connector * Troubleshoot problems with the Syslog integration USING POSTMAN * Explain the concept and purpose of an API * Interpret common REST API Status codes * Recognize the difference between platform and product APIs * Using the Postman Client to initiate API calls * Create a custom access level and respective API key * Create a valid API request USING THE VMWARE CARBON BLACK CLOUD PYTHON SDK * Install the VMware Carbon Black Cloud Python SDK * Describe the different authentication methods * Evaluate the best authentication method for a given task AUTOMATING OPERATIONS * Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API * Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API SENSOR INSTALLATION TROUBLESHOOTING * Describe sensor install log collection process * Identify sensor install log parameters * Create a detailed sensor install log * Locate sensor install logs on an endpoint * Interpret sensor install success from an install log * Determine likely cause for install failure using sensor logs * Propose resolution steps for a given sensor install failure VMWARE CARBON BLACK CLOUD CONSOLE TROUBLESHOOTING * Identify sensor bypass status reasons * Simplify console data exports using search * Describe differences in Audit Log detail levels * Locate built-in browser tools * Gather console diagnostics logs from a browser * Review console diagnostics logs SENSOR OPERATIONS TROUBLESHOOTING * Identify available types of diagnostic logs * Gather appropriate diagnostic logs for a given issue * Identify steps for resolving software interoperability problems * Identify steps for resolving resource problems * Identify steps for resolving network problems ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators Network professionals who have experience working with VMware NSX Advanced Load Balancer (Avi) and are responsible for troubleshooting and operating Application Delivery Controllers solutions Overview By the end of the course, you should be able to meet the following objectives: Become familiar with NSX Advanced Load Balancer (Avi) troubleshooting tools and steps to solve the problems. Establish and apply a structured troubleshooting approach and methodology Understand built-in mechanisms available for NSX Advanced Load Balancer (Avi) monitoring Identify, analyze, and troubleshoot problems related to the NSX Advanced Load Balancer infrastructure, including control and data plane components Identify, analyze, and troubleshoot problems related to application components such as Virtual Services, Pools, and related components This 3-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competence in operating and troubleshooting the VMware NSX© Advanced Load Balancer? (Avi) solutions. In this course, you are introduced to several operational, management, and troubleshooting tools. You will be presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO NSX ADVANCED LOAD BALANCER * Introduce NSX Advanced Load Balancer * Discuss NSX Advanced Load Balancer use cases and benefits * Explain NSX Advanced Load Balancer architecture and components * Explain the management, control, data, and consumption planes and functions EVENTS AND ALERTS * Describe NSX Advanced Load Balancer Events * Describe and configure NSX Advanced Load Balancer Alerts * Describe NSX Advanced Load Balancer monitoring capabilities leveraging SNMP, Syslog, and email INTRODUCTION TO NSX ADVANCED LOAD BALANCER TROUBLESHOOTING * Explain NSX Advanced Load Balancer troubleshooting concepts * Describe and leverage Virtual Service Traffic Logs * Describe and leverage Virtual Service Security Insights * Understand and utilize Health Score concepts * Explain and leverage application metrics and analytics * Explain and leverage packet capture and CLI utilities for application troubleshooting * Leverage UI, CLI, and useful log files to perform control plane troubleshooting INFRASTRUCTURE TROUBLESHOOTING * Describe and perform general VMware Cloud Connector troubleshooting * Describe and analyze VMware Cloud Connector state * Leverage case studies to troubleshoot VMware Cloud Connector * Describe and troubleshoot NSX-T Cloud Connector integration * Leverage case studies to troubleshoot NSX-T Cloud Connector * Describe and troubleshoot Linux Server Cloud Connector integration * Describe and troubleshoot OpenStack Cloud Connector integration * Leverage case studies to troubleshoot OpenStack Cloud Connector * Describe and troubleshoot AWS and Azure Cloud Connector integrations TROUBLESHOOTING NSX ADVANCED LOAD BALANCER SERVICE ENGINES AND ADVANCED TROUBLESHOOTING * Explain general Service Engine infrastructure * Explain and leverage analytics, health score, and metrics for Service Engine troubleshooting * Explain and leverage Events and Alerts for Service Engine troubleshooting * Leverage CLI for accessing Service Engine * Analyze Service Engine logs offline with Tech Support utility and collecting core dumps * Leverage CLI and useful log files for Service Engine Data Plane troubleshooting * Leverage CLI to capture packets for advanced datapath analysis MONITORING NSX ADVANCED LOAD BALANCER * Explain and configure SNMP-based monitoring * Explain and configure REST API-based monitoring * Describe and leverage 3rd-party integration with monitoring tools like Splunk * Leverage 3rd-party REST API monitoring extensions like Prometheus * Describe and leverage VMware integrations like VMware vRealize© Network Insight? for monitoring ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Mastering JEE Web Development (TT5100)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory- level Java programming course, designed for experienced developers who wish to get up and running with JEE, or who need to reinforce sound Java for Web / JEE coding practices. Attendees should have a working knowledge of developing basic Java software applications. Overview Students who attend Mastering JEE Web Application Development will leave the course armed with the required skills to design and build scalable, secure, maintainable web applications - leveraging our extensive experience in the delivery of scalable enterprise applications with complex web interfaces based on JEE technologies. Throughout this training, you will be confronted with common web application design problems and given the tools you will need to solve them, such as JEE design patterns. You will also be exposed to a range of JEE and web technologies such as Servlets, JSPs, JSF, JNDI, CDI and advice on when and how to use them. Students will also learn about the capabilities of servlets, their advantages, servlet architecture, and session management. Developers will also learn about managing resources, deployment, and application models, how to use custom tags, and how to build robust and capable web applications using servlets and other components. The course begins with a discussion of web application architecture. A major part of the course is spent on the various web components that are used to implement dynamic web applications. Students will learn not only specific topics and APIs but also how to fit the pieces together into a complete application. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn to: Design and build web applications from both business and technical requirements Build web interfaces with JSF, JSPs and Servlets, using the latest technologies in JEE. Write maintainable web applications that separate HTML and Java Understand the design and development of web applications using Servlets, JSPs, web fragments, and JSF Work JEE's version of dependency injection (CDI) Make Servlets cooperate and share data Store and process session information Deal with concurrency issues Access databases with JPA Work with annotations included in JEE Work with WebSockets as well as asynchronous servlets Use Java Bean validation in a web application Properly handle various types of exceptions This course is for experienced Java developers who are new to JEE and need to get up and running with essential dynamic web development skills. You will gain core JEE knowledge and skills that can be used as the foundation for developing production-quality web applications to a basic level. DEVELOPING JAVA EE APPLICATIONS * Enterprise Development * Java EE Core Components JEE DYNAMIC WEB APPLICATIONS * Introduction to Servlets * Form processing using Servlets * Java Server Pages * Implementing MVC in JEE * Session Management JEE SERVLET FILTERS AND LISTENERS * Servlet Filters EXPRESSION LANGUAGE 3.0 (EL) * Overview of EL * The EL language CUSTOM TAGS * Introduction to Custom Tags * The Java Standard Tag Library CONTEXTS AND DEPENDENCY INJECTION (CDI) * Introduction to CDI * Using CDI * CDI and Java EE USING RESOURCES * JEE DataSources * Overview of JPA JAVA API FOR WEBSOCKET * Introduction to WebSocket * Implementing WebSocket Endpoint * Extending WebSockets JAVA BEAN VALIDATION (JSR 349) * Introduction to Bean Validation * Bean Validation MANAGING WEB APPLICATIONS * Web Fragments * Error Handling * Asynchronous Servlets * Web Security INTRODUCTION TO JAVA SERVER FACES * Introduction to JSF * JSF Components FACELETS * Facelets * Facelets Templating and Resources ADDITIONAL COURSE DETAILS: Nexus Humans Mastering JEE Web Development (TT5100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering JEE Web Development (TT5100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Mastering JEE Web Development (TT5100)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Writing Analytical Queries for Business Intelligence

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview Identify independent and dependent variables and measurement levels in their own analytical work scenarios. Identify variables of interest in relational database tables. Choose a data aggregation level and data set design appropriate for the intended analysis and tool. Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. Create stored procedures, views, and functions to modularize data retrieval code. This three-day instructor-led course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. Specifically, this course presents TSQL within the context of data analysis in other words, making meaning from the data rather than transaction-oriented data-tier application development. The course starts with a brief discussion of levels of measurement and quantitative research methodogy, and integrates these concepts into each TSQL topic presented. The goal is to provide a consistent, direct, and purposeful learning path from RDBMS data retrieval through analytical tools such as SQL Server Reporting Services, PowerBI, Excel, R, SAS, and SPSS. MODULE 1: INTRODUCTION TO TSQL FOR BUSINESS INTELLIGENCE * Two Approaches to SQL Programming * TSQL Data Retrieval in an Analytics / Business Intelligence Environment * The Database Engine * SQL Server Management Studio and the CarDeal Sample Database * Identifying Variables in Tables * SQL is a Declarative Language * Introduction to the SELECT Query MODULE 2: TURNING TABLE COLUMNS INTO VARIABLES FOR ANALYSIS: SELECT LIST EXPRESSIONS, WHERE, AND ORDER BY * Turning Columns into Variables for Analysis * Column Expressions, Data Types, and Built-in Functions * Column aliases * Data type conversions * Built-in Scalar Functions * Table Aliases * The WHERE clause * ORDER BY MODULE 3: COMBINING COLUMNS FROM MULTIPLE TABLES INTO A SINGLE DATASET: THE JOIN OPERATORS * Primary Keys, Foreign Keys, and Joins * Understanding Joins, Part 1: CROSSJOIN and the Full Cartesian Product * Understanding Joins, Part 2: The INNERJOIN * Understanding Joins, Part 3: The OUTERJOINS * Understanding Joins, Part 4: Joining more than two tables * Understanding Joins, Part 5: Combining INNER and OUTERJOINs * Combining JOIN Operations with WHERE and ORDER BY MODULE 4: CREATING AN APPROPRIATE AGGREGATION LEVEL USING GROUP BY * Identifying required aggregation level and granularity * Aggregate Functions * GROUP BY * HAVING * Order of operations in SELECT queries MODULE 5: SUBQUERIES, DERIVED TABLES AND COMMON TABLE EXPRESSIONS * Non-correlated and correlated subqueries * Derived tables * Common table expressions * MODULE 6: ENCAPSULATING DATA RETRIEVAL LOGIC * Views * Table-valued functions * Stored procedures * Creating objects for read-access users * Creating database accounts for analytical client tools MODULE 7: GETTING YOUR DATASET TO THE CLIENT * Connecting to SQL Server and Submitting Queries from Client Tools * Connecting and running SELECT queries from: * Excel * PowerBI * RStudio * Exporting datasets to files using * Results pane from SSMS * The bcp utility * The Import/Export Wizard ADDITIONAL COURSE DETAILS: Nexus Humans Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Writing Analytical Queries for Business Intelligence
Delivered on-request, onlineDelivered Online
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. MODULE 1: SETTING UP THE BIG-IP SYSTEM * Introducing the BIG-IP System * Initially Setting Up the BIG-IP System * Archiving the BIG-IP Configuration * Leveraging F5 Support Resources and Tools MODULE 2: CONFIGURING WEB APPLICATION ACCESS * Review of BIG-IP LTM * Introduction to the Access Policy * Web Access Application Configuration Overview * Web Application Access Configuration in Detail MODULE 3: EXPLORING THE ACCESS POLICY * Navigating the Access Policy MODULE 4: MANAGING BIG-IP APM * BIG-IP APM Sessions and Access Licenses * Session Variables and sessiondump * Session Cookies * Access Policy General Purpose Agents List MODULE 5: USING AUTHENTICATION * Introduction to Access Policy Authentication * Active Directory AAA Server * RADIUS * One-Time Password * Local User Database MODULE 6: UNDERSTANDING ASSIGNMENT AGENTS * List of Assignment Agents MODULE 7: CONFIGURING PORTAL ACCESS * Introduction to Portal Access * Portal Access Configuration Overview * Portal Access Configuration * Portal Access in Action MODULE 8: CONFIGURING NETWORK ACCESS * Concurrent User Licensing * VPN Concepts * Network Access Configuration Overview * Network Access Configuration * Network Access in Action MODULE 9: DEPLOYING MACROS * Access Policy Macros * Configuring Macros * An Access Policy is a Flowchart * Access Policy Logon Agents * Configuring Logon Agents MODULE 10: EXPLORING CLIENT-SIDE CHECKS * Client-Side Endpoint Security MODULE 11: EXPLORING SERVER-SIDE CHECKS * Server-Side Endpoint Security Agents List * Server-Side and Client-Side Checks Differences MODULE 12: USING AUTHORIZATION * Active Directory Query * Active Directory Nested Groups * Configuration in Detail MODULE 13: CONFIGURING APP TUNNELS * Application Access * Remote Desktop * Network Access Optimized Tunnels * Landing Page Bookmarks MODULE 14: DEPLOYING ACCESS CONTROL LISTS * Introduction to Access Control Lists * Configuration Overview * Dynamic ACLs * Portal Access ACLs MODULE 15: SIGNING ON WITH SSO * Remote Desktop Single Sign-On * Portal Access Single Sign-On MODULE 16: USING IRULES * iRules Introduction * Basic TCL Syntax * iRules and Advanced Access Policy Rules MODULE 17: CUSTOMIZING BIG-IP APM * Customization Overview * BIG-IP Edge Client * Advanced Edit Mode Customization * Landing Page Sections MODULE 18: DEPLOYING SAML * SAML Conceptual Overview * SAML Configuration Overview MODULE 19: EXPLORING WEBTOPS AND WIZARDS * Webtops * Wizards MODULE 20: USING BIG-IP EDGE CLIENT * BIG-IP Edge Client for Windows Installation * BIG-IP Edge Client in Action MODULE 21: CONFIGURATION PROJECT * Configuration Project ADDITIONAL COURSE DETAILS: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Carbon Black Cloud: Plan and Deploy

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload™ Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VMWARE CARBON BLACK CLOUD * Describe the VMware Carbon Black Cloud platform * Describe VMware Carbon Black Cloud operating systems requirements * Identify interesting files according to VMware Carbon Black Cloud * Identify events collected * Describe data flows MANAGING VMWARE CARBON BLACK CLOUD ROLES AND USERS * Describe the use of roles in VMware Carbon Black Cloud * Describe RBAC capabilities * Create and edit a custom role * Manage new console users * Recognize the impact of a user role on a console user * Describe authentication mechanisms VMWARE CARBON BLACK CLOUD SENSORS * Describe the VMware Carbon Black Cloud sensor resource usage * List the supported operating systems for VMware Carbon Black Cloud sensors * Explain sensor usage in VMware Carbon Black Cloud PREPARING FOR DEPLOYMENT * Identify configuration settings for endpoints in sensor policy settings * Organize sensors using sensor groups to assign the desired policy based on specific criteria * Compare VDI sensor settings as compared to traditional endpoint sensor settings * Determine requirements for the initial deployment of sensors * Evaluate the policy impact on sensors * Identify best practices for deploying sensors INSTALLING SENSORS * Describe how to send an installation request * Recognize the features and limitations of an installation code and company code * Recognize the process for successfully completing an attended installation * Recognize the differences between attended and unattended sensor installation methods * Identify the correct deployment strategy for a given scenario * Generate logs with unattended installations * Generate sensor logs * Check network connectivity for sensor installation DEPLOYING WORKLOADS * Recognize the deployment process for VMware Carbon Black Cloud Workload * Identify eligible workloads in a vSphere environment * Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload MANAGING SENSORS * Describe VMware Carbon Black Cloud sensor deployment * Explain the differences in sensor status * Describe sensor update capabilities * Explain sensor actions * Manage vSphere workloads POST-DEPLOYMENT VALIDATION * Describe the process of a sensor background scan * Recognize a properly registered sensor installation * Identify sensor status in RepCLI ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud: Plan and Deploy
Delivered on-request, onlineDelivered Online
Price on Enquiry

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 2

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who wish to use Microsoft Word to create and modify complex documents and use tools that allow them to customize those documents. Overview In this course, you will learn fundamental Word skills. You will: Organize content using tables and charts. Customize formats using styles and themes. Insert content using Quick Parts. Use templates to automate document formatting. Control the flow of a document. Simplify and manage long documents. Use mail merge to create letters, envelopes, and labels. After you master the basics of using Microsoft© Word such as creating, editing, and saving documents; navigating through a document; and printing, you're ready to move on to tackling the more advanced features. These features enable you to create complex and professional documents with a consistent look and feel. They also enable you to automate tedious tasks such as preparing a letter to send to every customer of your organization.Creating professional-looking documents can help you give your organization a competitive edge. Implementing time-saving features such as document templates and automated mailings helps your organization reduce expenses. Mastering these techniques will make you a valued employee in your organization.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will alsoenable you to access and effectively utilize many web-based resources provided with your Microsoft 365 subscription. This includes brief coverage of key skills for using Word for theWeb and OneDrive©. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for the Microsoft Word (Microsoft 365 Apps and Office 2019): Exam MO-100 and Microsoft Word Expert (Microsoft 365 Apps and Office 2019): Exam MO-101 certification exams. LESSON 1: ORGANIZING CONTENT USING TABLES AND CHARTS * Topic A: Sort Table Data * Topic B: Control Cell Layout * Topic C: Perform Calculations in a Table * Topic D: Create a Chart * Topic E: Add an Excel Table to a Word Document LESSON 2: CUSTOMIZING FORMATS USING STYLES AND THEMES * Topic A: Create and Modify Text Styles * Topic B: Create Custom List or Table Styles * Topic C: Apply Document Themes LESSON 3: INSERTING CONTENT USING QUICK PARTS * Topic A: Insert Building Blocks * Topic B: Create and Modify Building Blocks * Topic C: Insert Fields Using Quick Parts LESSON 4: USING TEMPLATES TO AUTOMATE DOCUMENT FORMATTING * Topic A: Create a Document Using a Template * Topic B: Create and Modify a Template * Topic C: Manage Templates with the Template Organizer LESSON 5: CONTROLLING THE FLOW OF A DOCUMENT * Topic A: Control Paragraph Flow * Topic B: Insert Section Breaks * Topic C: Insert Columns * Topic D: Link Text Boxes to Control Text Flow LESSON 6: MANAGING LONG DOCUMENTS * Topic A: Insert Blank and Cover Pages * Topic B: Insert an Index * Topic C: Insert a Table of Contents * Topic D: Insert an Ancillary Table * Topic E: Manage Outlines * Topic F: Create a Master Document LESSON 7: USING MAIL MERGE TO CREATE LETTERS, ENVELOPES, AND LABELS * Topic A: Use Mail Merge * Topic B: Merge Data for Envelopes and Label ADDITIONAL COURSE DETAILS: Nexus Humans Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Business Analysis - Requirements Engineering

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. COURSE INTRODUCTION * Let?s Get to Know Each Other * Course Overview * Course Learning Objectives * Course Structure * Course Agenda * Introduction to Business Analysis * Structure and Benefits of Business Analysis Foundation * Exam Details * Business Analysis Certification Scheme WHAT IS BUSINESS ANALYSIS? * Intent and Context * Origins of business analysis * The development of business analysis * The scope of business analysis work * Taking a holistic approach * The role and responsibilities of the business analyst THE COMPETENCIES OF A BUSINESS ANALYST * Personal qualities * Business knowledge * Professional techniques * The development of competencies STRATEGY ANALYSIS * The context for strategy * The definition of strategy * Strategy development * External environmental analysis * Internal environmental analysis * SWOT analysis * Executing strategy BUSINESS ANALYSIS PROCESS MODEL * An approach to problem solving * Stages of the business analysis process model * Objectives of the process model stages * Procedures for each process model stage * Techniques used within each process model stage INVESTIGATION TECHNIQUES * Interviews * Observation * Workshops * Scenarios * Prototyping * Quantitative approaches * Documenting the current situation STAKEHOLDER ANALYSIS AND MANAGEMENT * Stakeholder categories and identification * Analysing stakeholders * Stakeholder management strategies * Managing stakeholders * Understanding stakeholder perspectives * Business activity models MODELLING BUSINESS PROCESSES * Organizational context * An altrnative view of an organization * The organizational view of business processes * Value propositions * Process models * Analysing the as-is process model * Improving business processes (to-be business process) DEFINING THE SOLUTION * Gab analysis * Introduction to Business Architecture * Definition to Business Architecture * Business Architecture techniques BUSINESS AND FINANCIAL CASE * The business case in the project lifecycle * Identifying options * Assessing project feasibility * Structure of a business case * Investment appraisal ESTABLISHING THE REQUIREMENTS * A framework for requirements engineering * Actors in requirements engineering * Requirements elicitation * Requirements analysis * Requirements validation DOCUMENTING AND MANAGING THE REQUIREMENTS * The requirements document * The requirements catalogue * Managing requirements MODELLING THE REQUIREMENTS * Modelling system functions * Modelling system data DELIVERING THE REQUIREMENTS * Delivering the solution * Context * Lifecycles DELIVERING THE BUSINESS SOLUTION * BA role in the business change lifecycle * Design stage * Implementation stage * Realization stage ADDITIONAL COURSE DETAILS: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Requirements Engineering
Delivered on-request, onlineDelivered Online
Price on Enquiry

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? INTRODUCTION * Course objectives * Understanding of business analysis * Knowledge areas of BABOK© Guide OVERVIEW OF USE CASES * Describe the purpose and value of a use case approach * Use case terminology * Introducing a use case approach NEEDS ASSESSMENT * Purpose of Needs Assessment * Needs Assessment and use cases * Defining and understanding the strategic goals and objectives * Understanding the business process * Identifying actors * Identifying business information * Analyzing locations and operations * Drawing the business use case diagram * Building the business architecture * Defining solution options DEFINING SYSTEM SCOPE * Product scope/project scope * System actors versus business actors * Analyzing the business process model * Analyzing business use cases * Identifying candidate use cases * Identifying scenarios * Diagramming use cases * Draw a use case diagram * Create a use case catalog EVALUATING, PRIORITIZING, AND PACKAGING USE CASES * Iterative nature of this work * Evaluating use cases * Use case priority * Use case risk * Use case complexity * Use case dependencies * Evaluate and Prioritize use cases * Dividing work up between releases * Packaging * A process for how to perform packaging WRITING THE MAIN SUCCESS SCENARIO * Use case descriptions * Primary and secondary goals * Assumptions * Pre-conditions * Triggers * Post-conditions * Scenario example * Main success scenario * Conditional execution * Use cases and requirements * Best practices for writing a use case description WRITING THE OTHER SCENARIOS * Scenarios and flows * Alternate scenarios and flows * Alternate vs. basic flow * Guidelines for alternate flows * Exception flows * Failed post conditions * Write alternate and exception flows PROCESS MODELING TO DESCRIBE USE CASE FLOWS * UML© Activity Diagram Notation * Sequencing activities * Developing an activity diagram * Facilitated sessions * Draw a UML© Activity Diagram USING ADVANCED DIAGRAMMING TECHNIQUES * Commonality * Dependency Relationships * Identify relationships * Comparing the different relationships DEVELOPING A REQUIREMENTS SPECIFICATION * Requirements and use cases * Detailed requirements * Common approaches to specifications * Non-functional requirements * Write non-functional requirements * User interface requirements * UI data descriptions * Business rules * Decision tables and inference rules * How to document simple calculations * Reporting requirements * Data requirements * Data accessibility requirements * Traceability COURSE SUMMARY * Wrap-up * Finding more information ADDITIONAL COURSE DETAILS: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered on-request, onlineDelivered Online
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE CONFIGURATION BACKUP * Locate, migrate or restore backup configuration ADDITIONAL COURSE DETAILS: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered on-request, onlineDelivered Online
Price on Enquiry