• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10048 Professional Skills Course (PSC) courses delivered Online

Network Automation with Python and Ansible

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. DAY 1 ? CRITICAL PYTHON CATCHUP & REVIEW * Overview of Python and Ansible * Python white space rules & best practices * Printing and more Printing * Date types and Variables * Packing and Unpacking Variables * f Strings * Conditional expressions * Relational and Boolean operators * Lists, Tuples, Dictionaries * Indexing and slicing * Built-in functions * Iterating with Loops (for and while) * Working with files * Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) * Using Python to access REST interfaces * Working with JSON * Python, Ansible and Paramiko * Using Paramiko to SSH with keys and passwords * RESTful API review * API keys * Paramiko Review * Using Paramiko to SFTP with keys and passwords DAY 02 ? PYTHON AND NETWORK AUTOMATION * Introduction to Netmiko (automating routers and switches) * Using Netmiko to send commands to / from network devices * Working with YAML * Converting JSON to YAML with Python * Ansible keywords * YAML and JSON for data exchange * Ansible and YAML * Ansible Playbook components * Tying together Python and Ansible ? Using Python within Ansible * Ansible Network Modules * What is new in Ansible (most current updates / release notes) * Network Agnostic modules * Writing network playbooks * Reviewing the construction of network playbooks * Writing Ansible playbooks that respond to network failures DAY 03 ? BLENDING PYTHON AND ANSIBLE SKILLSETS * Review how to use Python within Ansible * Calling Python scripts with Ansible * Jinja2 Templating Engine for Python (and Ansible) * Using Templates in Ansible playbooks * Jinja2 filters, looping, and other useful tricks for automating with Ansible * Playbook tagging for selective runs * When to use Python and when to use Ansible * ?Big Picture? options for using Python & Ansible within your Network Ansible Roles DAY 04 ? CUSTOMIZING ANSIBLE WITH PYTHON * Review ? Running Scripts with Ansible * Prompting for Ansible user input * Ansible Galaxy & Getting at Roles * Writing a custom Ansible Module with Python * Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. * Case Study: Automate your Enterprise Network * When to use Python and when to use Ansible * Writing your own Ansible modules in Python * ?Big Picture? options for using Python & Ansible within your Network * Overview ? NETCONF / YANG and what they mean for Python and Ansible * Molecule ? Testing your roles ADDITIONAL COURSE DETAILS: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Automation with Python and Ansible
Delivered on-request, onlineDelivered Online
Price on Enquiry

Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who are currently using desktop or web-based data management tools such as Microsoft Excel or SQL Server reporting services to perform numerical or general data analysis. They are responsible for connecting to cloud-based data sources, as well as shaping and combining data for the purpose of analysis. They are also looking for alternative ways to analyze business data, visualize insights, and share those insights with peers across the enterprise. This includes capturing and reporting on data to peers, executives, and clients. This course is also designed for professionals who want to pursue the Microsoft Power BI Data Analyst (Exam PL-300) certification. Overview In this course, you will analyze data with Microsoft Power BI. You will: Analyze data with self-service BI. Connect to data sources. Perform data cleaning, profiling, and shaping. Visualize data with Power BI. Enhance data analysis by adding and customizing visual elements. Model data with calculations. Create interactive visualizations. Use advanced analysis techniques. Enhance reports and dashboards. Publish and share reports and dashboards. Extend Power BI beyond the desktop. As technology progresses and becomes more interwoven with our businesses and lives, more data is collected about business and personal activities. This era of 'big data' is a direct result of the popularity and growth of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantages. Creating data-backed visualizations is key for data scientists, or any professional, to explore, analyze, and report insights and trends from data. Microsoft© Power BI© software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and it enables users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, enabling users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action. ANALYZING DATA WITH SELF-SERVICE BI * Topic A: Data Analysis and Visualization for Business Intelligence * Topic B: Self-Service BI with Microsoft Power BI CONNECTING TO DATA SOURCES * Topic A: Create Data Connections * Topic B: Configure and Manage Data Relationships * Topic C: Save Files in Power BI PERFORMING DATA CLEANING, PROFILING, AND SHAPING * Topic A: Clean, Transform, and Load Data with the Query Editor * Topic B: Profile Data with the Query Editor * Topic C: Shape Data with the Query Editor * Topic D: Combine and Manage Data Rows VISUALIZING DATA WITH POWER BI * Topic A: Create Visualizations in Power BI * Topic B: Chart Data in Power BI ENHANCING DATA ANALYSIS * Topic A: Customize Visuals and Pages * Topic B: Incorporate Tooltips MODELING DATA WITH CALCULATIONS * Topic A: Create Calculations with Data Analysis Expressions (DAX) * Topic B: Create Calculated Measures and Conditional Columns CREATING INTERACTIVE VISUALIZATIONS * Topic A: Create and Manage Data Hierarchies * Topic B: Filter and Slice Reports * Topic C: Create Dashboards USING ADVANCED ANALYSIS TECHNIQUES * Topic A: Create Calculated Tables, Variables, and Parameters * Topic B: Enhance Visuals with Statistical Analysis * Topic C: Perform Advanced Analysis ENHANCING REPORTS AND DASHBOARDS * Topic A: Enhance Reports * Topic B: Enhance Dashboards PUBLISHING AND SHARING REPORTS AND DASHBOARDS * Topic A: Publish Reports * Topic B: Create and Manage Workspaces * Topic C: Share Reports and Dashboards EXTENDING POWER BI BEYOND THE DESKTOP * Topic A: Use Power BI Mobile * Topic B: Extend Access with the Power BI API ADDITIONAL COURSE DETAILS: Nexus Humans Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Power BI: Data Analysis Professional (Second Edition) (v1.3)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Aruba Mobility Fundamentals, Rev. 20.11

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the OS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Master with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and ArubaOS to install and build a complete, secure controller network with multiple SSIDs. This course provides the underlying material required to prepare candidates for the Aruba Certified Mobility Associate (ACMA) certification exam. WLAN FUNDAMENTALS * Describes the fundamentals of 802.11, RF frequencies and channels * Explain RF Patterns and coverage including SNR * Roaming Standards and QOS requirements MOBILE FIRST ARCHITECTURE * An introduction to Aruba Products including controller types and modes * OS 8.X Architecture and features * License types and distribution MOBILITY MASTER MOBILITY CONTROLLER CONFIGURATION * Understanding Groups and Subgroups * Different methods to join MC with MM * Understanding Hierarchical Configuration SECURE WLAN CONFIGURATION * Identifying WLAN requirements such as SSID name, encryption, authentication * Explain AP groups structure and profiles * Configuration of WLAN using the Mobility Master GUI AP PROVISIONING * Describes the communication between AP and Mobility controller * Explain the AP booting sequence and requirements * Explores the APs controller discovery mechanisms * Explains how to secure AP to controller communication using CPSec * Describes AP provisioning and operations WLAN SECURITY * Describes the 802.11 discovery, authentication and association * Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth * Describes the authentication server communication * Explains symmetric vs asymmetric Keys, encryption methods * WIPS is described along with rogue discovery and protection FIREWALL ROLES AND POLICIES * An introduction into Firewall Roles and policies * Explains Aruba?s Identity based Firewall * Configuration of Policies and Rules including aliases * Explains how to assign Roles to users DYNAMIC RF MANAGEMENT * Explain how ARM calibrates the network selecting channels and power settings * Explores OS 8.X Airmatch to calibrate the network * How Client Match and ClientInsight match steers clients to better APs GUEST ACCESS * Introduces Aruba?s solutions for Guest Access and the Captive portal process * Configuration of secure guest access using the internal Captive portal * The configuration of Captive portal using Clearpass and its benefits * Creating a guest provisioning account * Troubleshooting guest access NETWORK MONITORING AND TROUBLESHOOTING * Using the MM dashboard to monitor and diagnose client, WLAN and AP issues * Traffic analysis using APPrf with filtering capabilities * A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues ADDITIONAL COURSE DETAILS: Nexus Humans Aruba Mobility Fundamentals, Rev. 20.11 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba Mobility Fundamentals, Rev. 20.11 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba Mobility Fundamentals, Rev. 20.11
Delivered on-request, onlineDelivered Online
Price on Enquiry

Microsoft Teams for the Remote Business User

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. OVERVIEW * What is Microsoft Teams? * How to Access Microsoft Teams * Etiquette for using teams * Integration and Storage Capabilities * Interface PERMISSIONS, ACCESS & RESTRICTIONS * Owner, Member & Guest * Team restrictions * Channel restrictions * Call Restrictions TEAM MANAGEMENT (POWER USERS) * Create a Team * Access administrator settings * Add/delete members to a Team * Add/delete a guest user * Create and manage Channels * Create and manage Private channels * Customize Channel tabs * Creating Tags TEAM MANAGEMENT (END USERS) * Getting your Channel email address * Integration with Outlook * Leave a Team or Channel COMMUNICATION AND COLLABORATION * Team Conversations * Using the New Conversation panel * Replying to a conversation * Using the interactive options * Deleting and editing a conversation * Turn off notifications for a conversation * Using Mentions and Tags * Saving messages * Accessing your saved messages * Accessing recent chats * Create a new Chat for one-2-one * Create a new chat for group chats * Read Receipts * Pop out Chats SEARCHING AND ACTIVITY * Use the search tool to find * Specific messages * Files * People * Accessing your Activity * Accessing your Feed * Filtering your feed and activity SHARING FILES * Uploading files * Viewing files * Attaching files to a conversation * Sharing a link to a file * Edit and Collaborate on files * Create files * Open files in Teams * Online * Desktop * SharePoint * Add a file to a tab * Share file outside your organization CUSTOMIZING YOUR SETTINGS * Filter Teams * Hide channels * Channel notifications * Channel analytics * Changing your Status * Setting your status message * Controlling the general user settings * Controlling your privacy settings * Controlling your personal notification settings * Controlling your device settings (headphones and microphone) * Controlling your call settings * Setting your Voicemail message * Controlling your app permissions MEETINGS AND CALLS * Accessing your calendar * Calendar views * Create a Teams meeting * Meeting options * Meeting requests and RSVP options * Join a Teams meeting * Copy join information * Create a meeting from Outlook * Using the Meet Now option * Sharing your screen * Changing your background image * Adding more people to a meeting * Meetings menu * Download meeting attendees * End meetings for everyone (Organizer only) * Accessing your Contacts * Accessing your Voicemail * Accessing your call history ADDITIONAL COURSE DETAILS: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Teams for the Remote Business User
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSAN: Plan and Deploy [v7]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced VMware vSphere administrators Overview By the end of the course, you should be able to meet the following objectives: Explain the key features and use cases for vSAN Detail the underlying vSAN architecture and components Describe the different vSAN deployment options Detail vSAN cluster requirements and considerations Apply recommended vSAN design considerations and capacity sizing practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Explain Maintenance Mode use and its impacts on vSAN Apply best practices for vSAN network configurations Manually configure a vSAN cluster using VMware vSphere Client™ Explain and configure vSAN fault domains Understand and apply vSAN storage policies Define encryption in the vSAN cluster Describe the architecture and use cases for stretched clusters Describe the architecture and use cases for two-node clusters Understand the steps involved in creating the vSAN iSCSI target services This two-day, hands-on training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VSAN * Describe vSAN architecture * Identify vSAN objects and components * Describe the advantages of object-based storage * Describe the difference between All-Flash and Hybrid vSAN architecture * Explain the key features and use cases for vSAN * Discuss the vSAN integration and compatibility with other VMware technologies PLANNING A VSAN CLUSTER * Identify requirements and planning considerations for vSAN clusters * Apply vSAN cluster planning and deployment best practices * Determine and plan for storage consumption by data growth and failure tolerance * Design vSAN hosts for operational needs * Identify vSAN networking features and requirements * Describe ways of controlling traffic in a vSAN environment * Recognize best practices for vSAN network configurations DEPLOYING A VSAN CLUSTER * Deploy and configure a vSAN cluster using the Cluster Quickstart wizard * Manually configure a vSAN cluster using vSphere Client * Explain and configure vSAN fault domains * Using VMware vSphere© High Availability with vSAN * Understand vSAN cluster maintenance capabilities * Describe the difference between implicit and explicit fault domains * Create explicit fault domains VSAN STORAGE POLICIES * Describe a vSAN object * Describe how objects are split into components * Explain the purpose of witness components * Explain how vSAN stores large objects * View object and component placement on the vSAN datastore * Explain how storage policies work with vSAN * Define and create a virtual machine storage policy * Apply and modify virtual machine storage policies * Change virtual machine storage policies dynamically * Identify virtual machine storage policy compliance status * INTRODUCTION TO ADVANCED VSAN CONFIGURATIONS * Define and configure compression and deduplication in the vSAN cluster * Define and configure encryption in the vSAN cluster * Understand the remote vSAN datastore topology * Identify the operations involved in managing the remote vSAN datastore * Understand the steps involved in creating the vSAN iSCSI target service VSAN STRETCHED AND TWO-NODE CLUSTERS * Describe the architecture and use cases for stretched clusters * Detail the deployment and replacement of a vSAN witness node * Describe the architecture and uses case for two-node clusters * Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster * Explain storage policies for vSAN stretched cluster ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Plan and Deploy [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Plan and Deploy [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Plan and Deploy [v7]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. INTRODUCING THE CLOUD AND CLOUD SECURITY * Describe the Evolution of Cloud Computing * Explain the Cloud Service Models * Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model * Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model * Explore the Security Responsibilities Within the SaaS Service Model * Describe Cloud Deployment Models * Describe Cloud Security Basics IMPLEMENTING THE CISCO SECURITY SOLUTION FOR SAAS ACCESS CONTROL * Explore Security Challenges for Customers Using SaaS * Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall * Describe Cloud Access Security Broker (CASB) * Describe Cisco CloudLock as the CASB * Describe OAuth and OAuth Attacks DEPLOYING CISCO CLOUD-BASED SECURITY SOLUTIONS FOR ENDPOINTS AND CONTENT SECURITY * Describe Cisco Cloud Security Solutions for Endpoints * Describe AMP for Endpoints Architecture * Describe Cisco Umbrella * Describe Cisco Cloud Email Security * Design Comprehensive Endpoint Security INTRODUCING CISCO SECURITY SOLUTIONS FOR CLOUD PROTECTION AND VISIBILITY * Describe Network Function Virtualization (NFV) * Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) * Describe Cisco NGFWv/Cisco Firepower Management Center Virtual * Describe Cisco ASAv * Describe Cisco Services Router 1000V * Describe Cisco Stealthwatch Cloud * Describe Cisco Tetration Cloud Zero-Trust Model DESCRIBING THE NETWORK AS THE SENSOR AND ENFORCER * Describe Cisco Stealthwatch Enterprise * Describe Cisco ISE Functions and Personas * Describe Cisco TrustSec * Describe Cisco Stealthwatch and Cisco ISE Integration * Describe Cisco Encrypted Traffic Analytics (ETA) IMPLEMENTING CISCO SECURITY SOLUTIONS IN AWS * Explain AWS Security Offerings * Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) * Discover Cisco Security Solutions in AWS * Explain Cisco Stealthwatch Cloud in AWS DESCRIBING CLOUD SECURITY MANAGEMENT * Describe Cloud Management and APIs * Explain API Protection * Illustrate an API Example: Integrate to ISE Using pxGrid * Identify SecDevOps Best Practices * Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator * Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? * Describe Cisco Application Centric Infrastructure (ACI) * Describe AWS Reporting Tools ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? CONFIGURATION BACKUP * Locate, migrate or restore backup configuration ADDITIONAL COURSE DETAILS: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

iOS App Development Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Developers and architects who will be developing applications for iOS devices. In this course you'll be shown a complete introduction to iPhone and iPad development, emphasizing the newest technologies and best practices for iOS. INTRODUCTION & SETUP * Start Here * Joining the Apple iOS Developer Program * Installing Xcode and the iOS SDK * A Guided Tour of Xcode * An Introduction to Xcode Playgrounds SWIFT PROGRAMMING LANGUAGE * Swift Data Types, Constants, and Variables * Swift Operators and Expressions * Swift Flow Control * The Swift Switch Statement * An Overview of Swift Functions * The Basics of Object Oriented Programming in Swift * An Introduction to Swift Subclassing and Extensions * Working with Array and Dictionary Collections in Swift * Understanding Error Handling in Swift VIEWS, LAYOUTS, & STORYBOARDS * iOS Application and Development Architecture * Creating an Interactive iOS App * Understanding Views, Windows and the View Hierarchy * An Introduction to Auto Layout in iOS * Working with iOS Auto Layout Constraints in Interface Builder * Implementing iOS Auto Layout Constraints in Code * Implementing Cross-Hierarchy Auto Layout Constraints in iOS * Understanding the iOS Auto Layout Visual Format Language * Using Trait Variations to Design Adaptive User Interfaces * Using Storyboards in Xcode * An Overview of iOS Table Views * Using Xcode Storyboards to Build Dynamic TableViews * Implementing TableView Navigation * Working with the iOS Stack View Class * A Guide to Multitasking in iOS * Implementing a Page based iOS Application using UIPageViewController DATA STORAGE WITH FILES, ICLOUD, & DATABASES * Working with Directories in Swift on iOS * Working with Files in Swift on iOS * Preparing an iOS App to use iCloud Storage * Managing Files using the iOS UIDocument Class * Using iCloud Storage in an iOS Application * Synchronizing iOS Key-Value Data using iCloud * iOS Database Implementation using SQLite * Working with iOS Databases using Core Data * CloudKit Data Storage on iOS TOUCH, TAPS, & GESTURES * An Overview of iOS Multitouch, Taps and Gestures * An Example iOS Touch, Multitouch and Tap Application * Detecting iOS Touch Screen Gesture Motions * Identifying Gestures using iOS Gesture Recognizers * iOS 3D Touch * Implementing TouchID Authentication in iOS Apps ADVANCED VIEW OPTIONS * Drawing iOS 2D Graphics with Core Graphics * Interface Builder Live Views and iOS Embedded Frameworks * Using Core Graphics and Core Image * iOS Animation using UIViewPropertyAnimator * iOS UIKit Dynamics * iOS Sprite Kit Programming * iOS Multitasking, Background Transfer Service and Fetching * iOS Application State Preservation and Restoration * Integrating Maps into iOS Applications * Getting Location Information using the iOS Core Location Framework EXTENSIONS * An Introduction to Extensions in iOS * An iOS Today Extension Widget Tutorial * Creating an iOS Photo Editing Extension * Creating an iOS Action Extension * Receiving Data from an iOS Action Extension * Building iOS Message Apps * Using Event Kit to Create Date and Location Based Reminders MULTIMEDIA AND SOCIAL MEDIA * Accessing the iOS Camera and Photo Library * iOS Video Playback using AVPlayer and AVPlayerViewController * An iOS Multitasking Picture in Picture Tutorial * Playing Audio on iOS using AVAudioPlayer * Recording Audio on iOS with AVAudioRecorder * iOS Speech Recognition * Introduction to SiriKit * Integrating Twitter and Facebook into iOS Applications THE APP STORE * Making Store Purchases with SKStoreProductViewController Class * Building In-App Purchasing into iOS Applications * Configuring and Creating App Store Hosted Content for iOS In-App Purchases * Preparing and Submitting an iOS Application to the App Store * ADDITIONAL COURSE DETAILS: Nexus Humans iOS App Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iOS App Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

iOS App Development Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. COURSE OUTLINE * COURSE INTRODUCTION JUNOS OPERATING SYSTEM FUNDAMENTALS * The Junos OS * Traffic Processing * Overview of Junos Devices USER INTERFACE OPTIONS: THE JUNOS CLI * User Interface Options * The Junos CLI: CLI Basics * The Junos CLI: Operational Mode * The Junos CLI: Configuration Mode USER INTERFACE OPTIONS: THE J-WEB INTERFACE * User Interface Options * The Junos CLI: CLI Basics * The Junos CLI: Operational Mode * The Junos CLI: Configuration Mode INITIAL CONFIGURATION * Factory-Default Configuration * Initial Configuration * Interface Configuration SECONDARY SYSTEM CONFIGURATION * User Configuration and Authentication * System Logging and Tracing * Network Time Protocol * Archiving Configurations * SNMP OPERATIONAL MONITORING AND MAINTENANCE * Monitoring Platform and Interface Operation * Network Utilities * Maintaining the Junos OS * Password Recovery * System Clean-Up INTERFACE CONFIGURATION EXAMPLES * Review of the Interface Configuration Hierarchy * Interface Configuration Examples * Using Configuration Groups ROUTING FUNDAMENTALS * Routing Concepts: Overview of Routing * Routing Concepts: The Routing Table * Routing Concepts: Routing Instances * Static Routing * Dynamic Routing ROUTING POLICY * Routing Policy Overview * Case Study: Routing Policy FIREWALL FILTERS * Firewall Filters Overview * Case Study: Firewall Filters * Unicast Reverse-Path-Forwarding Checks CLASS OF SERVICE * CoS Overview * Traffic Classification * Traffic Queueing * Traffic Scheduling * Case Study: CoS JTAC PROCEDURES * Opening a Support Case * Customer Support Tools * Transferring Files to JTAC JUNIPER SECURITY CONCEPTS * Security Challenges * Juniper Networks? Security Focus * A IPv6 Fundamentals * IPv6 Addressing * Protocols and Services * Configuration ADDITIONAL COURSE DETAILS: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. COURSE INTRODUCTION AND DFSMS OVERVIEW * Specify the storage administration functions that can be automatically performed by the system * Identify the types of data set services that need to be established by negotiating service level agreements * Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines * ACTIVATING SMS * Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS * Create SMS control data sets * Code SYS1.PARMLIB operands necessary to bring up SMS * Create a minimal configuration * Activate a configuration * WRITING ACS ROUTINES * Identify the purpose of the ACS routines * Develop an understanding of the statements * Differentiate between literals and masks * Describe the read variables available in the ACS routines MANAGING TEMPORARY DATA SETS * Create/alter storage classes and storage groups * Identify steps to install and use the starter set * Write ACS routines to handle temporary data sets * Activate a system to manage temporary data sets * Code commands to change volume/group SMS status * Issue operator commands to display current status * EXPLOITING DFSMS * Describe the purpose of the data class * Identify the features that the data class can exploit * Create data sets using the space parameter * Define Virtual Storage Access Method (VSAM) and volume attributes for data class * Identify special data sets and their exploitation through the data class * MANAGING PERMANENT DATA SETS * Create/alter data classes, storage classes, management classes, and storage groups * Translate current (DFSMShsm) service level agreements to management class parameters * Identify alternatives and concerns for standard naming conventions * Establish the controls for automatic backup of data sets * Establish the controls for automatic volume dump * Write ACS routines to manage permanent data * Create a configuration that manages permanent data sets * Create a new managed data set * Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records USING NAVIQUEST * Create test cases using Naviquest * Perform storage administration tasks in batch * Create online DFSMS reports * Create model commands using Naviquest * Use the COPYFILT macro DEVICE PREPARATION AND DATA MOVEMENT * Initialize volumes as system-managed * Move data into/out from system-managed control * Convert volumes to/from system-managed * Move data to utilize new hardware capabilities CONTROLLING DFSMS * Code commands to change SMS volume/group status * Issue commands to save configurations and use alternate Active Control Data Set (ACDS) * Issue command to use alternate Communication Data Set (COMMDS) * Issue VARY SMS commands * Communicate with the security administrator about storage management requirements ADDITIONAL CONSIDERATIONS * Establish a plan for implementing SMS * Locate sources of implementation planning checklists * Identify the tools available to document the current system * Identify multiple site considerations for recovery and exploitation ADDITIONAL COURSE DETAILS: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered on-request, onlineDelivered Online
Price on Enquiry