• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1001 Python courses

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. WHAT IS ROBOTIC PROCESS AUTOMATION? * Scope and techniques of automation * Robotic process automation * About UiPath * The future of automation RECORD AND PLAY * UiPath stack * Downloading and installing UiPath Studio * Learning UiPath Studio * Task recorder * Step-by-step examples using the recorder SEQUENCE, FLOWCHART, AND CONTROL FLOW * Sequencing the workflow Activities * Control flow, various types of loops, and decision making * Step-by-step example using Sequence and Flowchart * Step-by-step example using Sequence and Control flow DATA MANIPULATION * Variables and scope * Collections * Arguments ? Purpose and use * Data table usage with examples * Clipboard management * File operation with step-by-step example * CSV/Excel to data table and vice versa (with a step-by-step example) TAKING CONTROL OF THE CONTROLS * Finding and attaching windows * Finding the control * Techniques for waiting for a control Act on controls ? mouse and keyboard activities * Working with UiExplorer * Handling events * Revisit recorder * Screen Scraping * When to use OCR * Types of OCR available * How to use OCR * Avoiding typical failure points TAME THAT APPLICATION WITH PLUGINS AND EXTENSIONS * Terminal plugin * SAP automation * Java plugin * Citrix automation * Mail plugin * PDF plugin * Web integration * Excel and Word plugins * Credential management Extensions ? Java, Chrome, Firefox, and Silverlight HANDLING USER EVENTS AND ASSISTANT BOTS * What are assistant bots? * Monitoring system event triggers * Monitoring image and element triggers * Launching an assistant bot on a keyboard event EXCEPTION HANDLING, DEBUGGING, AND LOGGING * Exception handling * Common exceptions and ways to handle them * Logging and taking screenshots * Debugging techniques * Collecting crash dumps * Error reporting MANAGING AND MAINTAINING THE CODE * Project organization * Nesting workflows * Reusability of workflows * Commenting techniques * State Machine * When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file * Integrating a TFS server DEPLOYING AND MAINTAINING THE BOT * Publishing using publish utility * Overview of Orchestration Server * Using Orchestration Server to control bots * Using Orchestration Server to deploy bots * License management * Publishing and managing updates

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)
Delivered on-request, onlineDelivered Online
Price on Enquiry

ChatGPT and Prompt Engineering With Advanced Data Analysis

By Packt

Explore ChatGPT, a cutting-edge world of AI content creation, with our comprehensive course. This meticulously curated program unravels the technology behind ChatGPT to practical applications in machine learning, social media, data analysis, and image generation. This course unveils new facets of AI to navigate this evolving landscape with prowess.

ChatGPT and Prompt Engineering With Advanced Data Analysis
Delivered Online On Demand
£41.99

SC-300: Microsoft Identity and Access Administrator

By Packt

Learn all about Microsoft identity and Azure security the right way with tons of lab exercises. A course that aims to prepare students for the prestigious SC-300: Microsoft Identity and Access administrator exam. The course adheres to the new curriculum and objectives.

SC-300: Microsoft Identity and Access Administrator
Delivered Online On Demand
£41.99

Modern JavaScript from The Beginning [Second Edition]

By Packt

This second-edition JavaScript course covers fundamental concepts, including variables, data types, functions, and control flow, as well as advanced topics such as object-oriented programming, modules, and testing. With practical projects and clear explanations, learners can gain a solid understanding of the language and develop their skills.

Modern JavaScript from The Beginning [Second Edition]
Delivered Online On Demand
£125.99

Cisco CCNA 200-301: The Complete Guide to Getting Certified

By Packt

In this practical course, you will learn to develop a complete understanding of all the concepts and topics you need to master in order to achieve the most sought-after networking certification today. With its easy-to-understand, structured approach, this course will enable you to master Cisco networking to the CCNA level, and beyond, in no time.

Cisco CCNA 200-301: The Complete Guide to Getting Certified
Delivered Online On Demand
£14.99

Learn to Code with Ruby

By Packt

Unlock the power of coding with our all-inclusive Ruby course. Whether you're starting from scratch or elevating your programming skills, this course is tailored for a seamless learning curve in Ruby 3.2.

Learn to Code with Ruby
Delivered Online On Demand
£67.99

IT For Recruiters

By Apex Learning

OVERVIEW This comprehensive course on IT For Recruiters will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT For Recruiters comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this IT For Recruiters. It is available to all students, of all academic backgrounds. REQUIREMENTS Our IT For Recruiters is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 8 sections • 60 lectures • 05:10:00 total length •Introduction: 00:02:00 •What is hardware and software: 00:04:00 •Server: 00:08:00 •Project Life cycle: 00:06:00 •Software Development Life Cycle: 00:08:00 •Methodologies: 00:09:00 •CMS: 00:04:00 •API: 00:04:00 •CI/CD: 00:04:00 •Stacks: 00:03:00 •Native and Hybrid Native Apps: 00:02:00 •CTO: 00:13:00 •IT Architect: 00:08:00 •Product Owner: 00:12:00 •Project Manager: 00:13:00 •Product Manager: 00:06:00 •PO vs PM vs Product Manager: 00:07:00 •PO vs Product Manager: 00:04:00 •Business Analyst: 00:09:00 •Business Intelligence Specialist: 00:06:00 •Data Engineer: 00:05:00 •Data Scientist: 00:07:00 •Data Engineer vs Data Scientist: 00:07:00 •Agile Coach: 00:14:00 •Scrum Master: 00:08:00 •Agile Coach vs Scrum Master: 00:01:00 •Frontend Developer: 00:06:00 •Backend Developer: 00:06:00 •Fullstack Developer: 00:04:00 •Frontend vs Backend vs Fullstack Developer: 00:02:00 •iOS Developer: 00:03:00 •Android Developer: 00:04:00 •UX Designer: 00:10:00 •UI Designer: 00:08:00 •UX vs UI Designer: 00:04:00 •QA Engineer_Tester: 00:09:00 •SysAdmin: 00:07:00 •DevOps: 00:05:00 •SEO: 00:10:00 •Programming languages and frameworks. Intro: 00:01:00 •Programming languages and frameworks: 00:08:00 •Java: 00:03:00 •JavaScript: 00:02:00 •Python: 00:01:00 •C: 00:02:00 •C++: 00:03:00 •C#: 00:02:00 •HTML: 00:02:00 •PHP: 00:02:00 •SWIFT: 00:02:00 •Objective-C: 00:01:00 •Ruby: 00:02:00 •SQL: 00:02:00 •Go (Golang): 00:01:00 •Database: 00:05:00 •Types of Databases: 00:07:00 •The day of an IT Recruiter: 00:05:00 •Key principles: 00:03:00 •Sourcing Tipps: 00:03:00 •Good Bye Video: 00:01:00

IT For Recruiters
Delivered Online On Demand
£12

CompTIA Security+

5.0(2)

By Studyhub UK

Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.  The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. LEARNING OUTCOMES 1. Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. 2. Acquire proficiency in various cryptographic methods and their importance in securing data. 3. Gain insights into effective identity and account management to enhance system security. 4. Learn to utilize essential security tools for safeguarding individual and network systems. 5. Master the skills to implement and manage security measures for both wired and wireless networks. WHY BUY THIS COMPTIA SECURITY+? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. CERTIFICATION After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? * Individuals aiming to start a career in cybersecurity. * IT professionals seeking to deepen their knowledge in network security. * System administrators wanting to enhance their security skills. * Students interested in acquiring a foundational understanding of cybersecurity principles. * Professionals aiming to achieve the CompTIA Security+ certification for career advancement. PREREQUISITES This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH * Cybersecurity Analyst: £30,000 - £60,000 annually * Information Security Manager: £40,000 - £75,000 annually * Network Security Engineer: £35,000 - £65,000 annually * Security Consultant: £35,000 - £70,000 annually * Systems Administrator (with security specialization): £25,000 - £50,000 annually * IT Security Coordinator: £28,000 - £55,000 annually COURSE CURRICULUM Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00

CompTIA Security+
Delivered Online On Demand
£10.99

Welding Training

4.8(8)

By Skill Up

With the rise of machine learning applications in recent years, demand for python programmers continues to grow correspondingly.

Welding Training
Delivered Online On Demand
£25

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) DESCRIBING HIGH AVAILABILITY ON LAYER 2 * Overview of Layer 2 High-Availability Mechanisms * Virtual Port Channels * Cisco Fabric Path * Virtual Port Channel+ DESIGNING LAYER 3 CONNECTIVITY * First Hop Redundancy Protocols * Improve Routing Protocol Performance and Security * Enhance Layer 3 Scalability and Robustness DESIGNING DATA CENTER TOPOLOGIES * Data Center Traffic Flows * Cabling Challenges * Access Layer * Aggregation Layer * Core Layer * Spine-and-Leaf Topology * Redundancy Options DESIGNING DATA CENTER INTERCONNECTS WITH CISCO OTV * Cisco OTV Overview * Cisco OTV Control and Data Planes * Failure Isolation * Cisco OTV Features * Optimize Cisco OTV * Evaluate Cisco OTV DESCRIBING LOCATOR/ID SEPARATION PROTOCOL * Locator/ID Separation Protocol * Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility * LISP Extended Subnet Mode (ESM) Multihop Mobility * LISP VPN Virtualization DESCRIBING VXLAN OVERLAY NETWORKS * Describe VXLAN Benefits over VLAN * Layer 2 and Layer 3 VXLAN Overlay * Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview * VXLAN Data Plane DESCRIBING HARDWARE AND DEVICE VIRTUALIZATION * Hardware-Based High Availability * Device Virtualization * Cisco UCS Hardware Virtualization * Server Virtualization * SAN Virtualization * N-Port ID Virtualization DESCRIBING CISCO FEX OPTIONS * Cisco Adapter FEX * Access Layer with Cisco FEX * Cisco FEX Topologies * Virtualization-Aware Networking * Single Root I/O Virtualization * Cisco FEX Evaluation DESCRIBING BASIC DATA CENTER SECURITY * Threat Mitigation * Attack and Countermeasure Examples * Secure the Management Plane * Protect the Control Plane * RBAC and Authentication, Authorization, and Accounting (AAA) DESCRIBING ADVANCED DATA CENTER SECURITY * Cisco TrustSec in Cisco Secure Enclaves Architecture * Cisco TrustSec Operation * Firewalling * Positioning the Firewall Within Data Center Networks * Cisco Firepower© Portfolio * Firewall Virtualization * Design for Threat Mitigation DESCRIBING MANAGEMENT AND ORCHESTRATION * Network and License Management * Cisco UCS Manager * Cisco UCS Director * Cisco Intersight * Cisco DCNM Overview DESCRIBING STORAGE AND RAID OPTIONS * Position DAS in Storage Technologies * Network-Attached Storage * Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) * Evaluate Storage Technologies DESCRIBING FIBRE CHANNEL CONCEPTS * Fibre Channel Connections, Layers, and Addresses * Fibre Channel Communication * Virtualization in Fibre Channel SAN DESCRIBING FIBRE CHANNEL TOPOLOGIES * SAN Parameterization * SAN Design Options * Choosing a Fibre Channel Design Solution DESCRIBING FCOE * FCoE Protocol Characteristics * FCoE Communication * Data Center Bridging * FCoE Initialization Protocol * FCoE Design Options DESCRIBING STORAGE SECURITY * Common SAN Security Features * Zones * SAN Security Enhancements * Cryptography in SAN DESCRIBING SAN MANAGEMENT AND ORCHESTRATION * Cisco DCNM for SAN * Cisco DCNM Analytics and Streaming Telemetry * Cisco UCS Director in the SAN * Cisco UCS Director Workflows DESCRIBING CISCO UCS SERVERS AND USE CASES * Cisco UCS C-Series Servers * Fabric Interconnects and Blade Chassis * Cisco UCS B-Series Server Adapter Cards * Stateless Computing * Cisco UCS Mini DESCRIBING FABRIC INTERCONNECT CONNECTIVITY * Use of Fabric Interconnect Interfaces * VLANs and VSANs in a Cisco UCS Domain * Southbound Connections * Northbound Connections * Disjoint Layer 2 Networks * Fabric Interconnect High Availability and Redundancy DESCRIBING HYPERCONVERGED AND INTEGRATED SYSTEMS * Hyperconverged and Integrated Systems Overview * Cisco HyperFlex? Solution * Cisco HyperFlex Scalability and Robustness * Cisco HyperFlex Clusters * Cluster Capacity and Multiple Clusters on One Cisco UCS Domain * External Storage and Graphical Processing Units on Cisco HyperFlex * Cisco HyperFlex Positioning DESCRIBING CISCO UCS MANAGER SYSTEMWIDE PARAMETERS * Cisco UCS Setup and Management * Cisco UCS Traffic Management DESCRIBING CISCO UCS RBAC * Roles and Privileges * Organizations in Cisco UCS Manager * Locales and Effective Rights * Authentication, Authorization, and Accounting * Two-Factor Authentication DESCRIBING POOLS FOR SERVICE PROFILES * Global and Local Pools * Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools * World Wide Name (WWN) Pools * Server and iSCSI Initiator IP Pools DESCRIBING POLICIES FOR SERVICE PROFILES * Global vs. Local Policies * Storage and Basic Input/Output System (BIOS) Policies * Boot and Scrub Policies * Intelligent Platform Management Interface (IPMI) and Maintenance Policies DESCRIBING NETWORK-SPECIFIC ADAPTERS AND POLICIES * LAN Connectivity Controls * SAN Connectivity Controls * Virtual Access Layer * Connectivity Enhancements DESCRIBING TEMPLATES IN CISCO UCS MANAGER * Cisco UCS Templates * Service Profile Templates * Network Templates DESIGNING DATA CENTER AUTOMATION * Model-Driven Programmability * Cisco NX-API Overview * Programmability Using Python * Cisco Ansible Module * Use the Puppet Agent ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered on-request, onlineDelivered Online
Price on Enquiry