Category Archives: Other Courses

Dell Boomi Training

Spiritsofts offers best Dell Boomi Training with most experienced real time professionals. Our Instructors are working in Dell Boomi and related technologies for more years in MNC’s. We aware of industry needs and we are offering Online  Dell Boomi Training Course  in more practical way. Our team of Dell Boomi trainers offers Dell Bomi Classroom Training, Dell Boomi Online Training and Dell Boomi Corporate Training services.

Dell Boomi Training Curriculum
Boomi Basic

  • Course Overview and Expectations
  • AtomSphere Overview
  • Activity Introduction
  • FTP and Disk Connectors
  • Atom Overview
  • Document Properties
  • Setting Static and Dynamic Parameters
  • XML Profile Design
  • Mapping
  • Boomi Suggest
  • Setting Defaults
  • Using Functions
  • Branching

Cloud

  • Salesforce Read Connector
  • Salesforce Query Operation
  • Database Write Connector
  • Database Write Operation
  • Mapping
  • Adding additional Salesforce Fields
  • Creating a User Defined Function
  • Using Decision Steps
  • Mail Connectors
  • Message Step
  • Format output to Email
  • SQL Command

Administration

  • Process Backup
  • Process Automation
  • Revision History
  • Atom Management
  • Process Deployment
  • Connection Licensing
  • Process Execution & Reporting Overview
  • Document Handling
  • User Alerts Overview
  • Forced Exception Configuration
  • Custom Error Messaging
  • Configuring Email Alerts
  • Execution Log and Notification Customization
  • User Management Customization
  • Document Tracking & Searching
  • Process Deactivation & Atom Detachment
  • Wrap Up

Vmware Training

Vmware Training Course curriculum

Overview of Vmware vSphere 6

Overview

Components

Packaging and Versions

Cloud Computing

Installing Vmware ESXi 6

Requirements

ESX server

Download

Install

Initial Configuration

Installing vSphere Client

Using vSphere Client

Terminology

vSphere Client

VM Guest Remote Control

vSphere Client Hotkeys

Search Virtual Infrastructure

Sorting and Filtering

Exporting Data

Running Reports

Creating and Modifying Virtual Guest Machine

Three ways to Create VM

BIOS

Datastore Browser

Secure Copy Protocol

Using SSH

Creating a New VM

Installing and Configuring Vmware Tools

Installing vCenter

Configuring Virtual Infrastructure

Planning

Adding Datacenters, Folders, and Hosts

Configuring vSphere Licensing

Server clock and NTP

vCenter Server Settings and Plugins

System Logs, Sessions and Status

Monitoring Host Health and Hardware Status

Using vSphere Web Client

Overview

Installing the Server for Web Client

Authorizing the Web Client Server

Using the vSphere 5 Web Client

Tasks, Events, and Alarms

Understanding Tasks and Events

SNMP and SMTP

Alarms

Virtual Storage and Terminologies

Virtual Disks and VMFS

Data Transfers

Storage Technologies

Storage Area Network

Fiber Channel SAN

iSCSI Storage

Datastore

Storage Options

VMFS Specs

vSphere Storage Appliance (VSA)

Overview

Cluster Design Options

VSA SAN Maintenance Mode

Installation

Creating iSCSI SAN with OpenFiler

Download

Install

Configure

Connecting vSphere to the OpenFiler iSCSI SAN

Administering Vmware ESXi Server Security

Basics

Default Roles

Adding, Modifying and Removing Users and Groups

Windows AD Users and Groups

Defining and Applying Roles and Permissions

vSheild

Securing Guest VMs

Vmware vSphere Virtual Networking

Vitual Networking

Network Adapters

Virtual Standard Switches (vSS)

vSS Functionality

Similarities between pSwitch and vSS

Differences between pSwitch and vSS

Types of Switches

Virtual Switch Ports

VLAN

MAC Address Changes

Vmware vSphere Distributed Virtual Switch (dvswitch)

vSphere Distributed Switch

Private VLANs, pVLANs

Networking Policies

Configuration

Moving Virtual Machines with vMotion

Moving Virtual Storage with svMotion

Requirement

svMotion and Thin Provisioning

Using svMotion

Migrating VMs with Snapshots

Performance Optimization with DRS

Intro

Requirements

Creating DRS enables Cluster

DRS/HS Cluster Settings

Resource Pools

Implementing High Availability with Vmware HA

VMHA Master/Slave

Requirement

Best Practice

Vmware Fault Tolerance (FT)

Intro

Requirement

Constraints

Enabling VMware FT

Testing failover with a Virtual Machine

Upgrading Vmware vSphere 4 to vSphere 5

Steps

Update Manager Upgrade

ESXi Upgrade

VM Upgrade

Vmware vSphere CLI

Vmware vSphere Auto Deploy

Storage DRS

Intro

Datastore Clusters

SDRS

SDRS Load Balancing

Policy driven Storage

vSphere vRAM pooled Pricing and Licensing

Network IO Control

Storage IO Control

ESXi Firewall

Data Protection

vCOps

SRM

MicroStrategy Training

MicroStrategy Training brings to you the report performance using VLDB settings and creating a DB instance and user groups. The MicroStrategy platform supports interactive dashboards, scorecards, highly formatted reports, ad hoc query, thresholds and alerts, and automated report distribution

Micro Strategy  Online Training Curriculum

Getting started with Business Systems

Why Business Intelligence? Different Roles and Responsibilities in a business and their Reporting needs. Introduction to BI Architecture / Lifecycle Stages.

  • Defining BI and its Importance
  • Architecture of Data Flow
  • Stack description in BI
  • Describing Reporting needs in business through a model
  • Queries from Business Owner
  • Understanding the requirement of BI system
  • Difference between OLTP and OLAP
  • Example of BI Query
  • Delivering information through BI platform
  • BI platform in BI technology stack
  • Information delivery in BI
  • BI becoming the Market Leader
  • Introducing Dimension hierarchy
  • Product dimension hierarchy
  • Implementation of MD model
  • MOPAL vs. ROLAP
  • Analysis techniques in OLAP
  • Understanding Report type through List Matrix

Microstrategy10 Components Overview

  • Microstrategy Desktop
  • Microstrategy Architect
  • Microstrategy report services
  • Advanced Microstrategy desktop
  • Microstrategy Intelligence server
  • Microstrategy Narrowcast server
  • Microstrategy Administration
  • Introduction to Microstrategy webserver

Microstrategy 10 Desktop

  • Introduction to Microstrategy Business Intelligence
  • Introduction to Microstrategy Desktop & Architecture
  • Configuration Objects
  • Public Objects
  • Schema Objects
  • Creating and saving reports in desktop
  • Report Manipulating in desktop

Data Manipulations + Style Manipulation

  • Creating and saving basic report filters
  • Creating, formatting and saving basic metrics
  • Microstrategy OLAP services in desktop
  • Report Objects
  • View filters
  • Derived Metrics
  • Creating and saving basic prompts & searches

Microstrategy 10 Architect

  • Introduction to Microstrategy Architect
  • The logical data model
  • The physical warehouse schema
  • Advance Data modeling and schema design
  • Many to many relationships
  • Role attributes
  • Introduction to project creation in Microstrategy architect
  • Creating microstrategy facts
  • Creating microstrategy attributes
  • Creating microstrategy hierarchies
  • Project configuration workshop
  • Project optimization and maintenance
  • Maintaining your project overtime aggregate tables
  • Partitioning & partition mappings transformation

Microstrategy report services

  • Introduction to enterprise reporting
  • Document basics
  • Document design concepts
  • Useful design techniques
  • Microstrategy office overview

Advanced Microstrategy desktop

  • Introduction to advance reporting
  • Advanced metrics
  • Advanced filters
  • Consolidations and custom groups
  • Advanced prompts & OLAP services
  • Drill maps
  • Report data options

Microstrategy Intelligence server

  • Introduction to Microstrategy administration
  • Administration and query flow
  • Connectivity
  • Startup and administration interface
  • Security
  • Microstrategy intelligence server administration
  • Caching and scheduling
  • Datamarts
  • Clustering

Microstrategy Narrow server

  • Narrow server overview
  • Microstrategy Administration
  • MSTR Installation
  • Object manager
  • Project duplication
  • Groups and user creation
  • Command manager

Introduction to Microstrategy web server

  • Expsure to mstr10
  • New concepts included in mstr10

Ethical Hacker Training

Spiritsofts offers best Ethical Hacker Training with most experienced real time professionals. Our Instructors are working in Ethical Hacker and related technologies for more years in MNC’s. We aware of industry needs and we are offering Certified Ethical Hacker Training Online in more practical way. Our team of Ethical Hacking trainers offers Ethical Hacker Classroom training, Ethical Hacker Online Training and Ethical Hacker Corporate Training services.

Ethical Hacker Training Curriculum

Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Physical Security
  • Incident Management
  • What is Vulnerability Assessment?
  • Penetration Testing
  • Information Security Laws and Standards

Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • SNMP Enumeration Tools
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer
  • Counter measures
  • Sniffing Detection
  • Sniffing Pen Testing

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools and Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Hacking Web Applications

SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Counter-measures
  • Penetration Testing

Cloud Computing

  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Cryptography

  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Workday Training

Workday Training Online Course Content

Workday Online Training is provided by a real time consultant. The experience acquired by our trainer on Workday, is promisingly helpful to the corporate trainee’s. Our instructors are experts in the implementation and support projects in Workday training. Spiritsofts always works on real time scenarios. It is extremely useful for the professionals to handle the projects easily in the IT industry.

Workday is a cloud, on demand financial and human capital management software. It provides similar services as SAP and Oracle.

Workday specializes in providing Human Capital Management, Financial Management and payroll in online domain.It is a major web based ERP software vendor.

Chapter 1Core Concepts and Navigation Basics of Workday Training

  • Core Concepts
  • Business Objects
  • Custom labels
  • Basic navigation

Chapter 2Organizations in workday

  • Organization types
  • Supervisory organizations
  • Reorganization
  • Setup of supervisory org structure
  • Managing supervisory organization
  • Creating subordinate organization
  • Dividing a supervisory organization
  • Additional org types
  • Organization hierarchies
  • Organization assignments on supervisory org
  • Organizational reports

Chapter 3Staffing Models

  • Types of staffing models
  • Configuring individual staffing model
  • Hiring restrictions
  • Position management
  • Headcount management
  • Job management
  • Differentiating between staffing models
  • Maintaining staffing models

Chapter 4Jobs & Positions

  • Job profiles
  • Job profiles and localization
  • Job profiles and compensation Grades
  • Management level hierarchy
  • Differentiating job profiles, job families, job family group
  • Creating job profile (Task)
  • Creating position and headcount groups
  • Managing filled and unfilled position and headcount groups
  • Creating positions (Task)
  • Edit position restrictions and Edit position
  • Close position vs managing a hiring freeze

Chapter 5Compensation

  • Compensation Overview
  • Compensation Components
  • Compensation Elements
  • Compensation Plans
  • Salary,
  • Hourly, Allowance,
  • One Time Payment, Merit, Bonus.
  • Compensation Grades, Grade Profiles and Steps
  • Compensation Package Compensation Eligibility Rules

Chapter 6Security Groups

  • Security groups
  • Security group types
  • Configurable security
  • Functional areas, securable items and security policies

Chapter 7Defining Business Processes

  • Business Processes Overview
  • Navigating to a Business Process Definition
  • Supervisory Organizations and Business Processes
  • Editing a Business Process
  • Condition Rules
  • Adding a Notification
  • Copying a Business Process

Chapter 8Transactions in Workday

  • Creating applicants
  • Hiring in supervisory organizations
  • Assigning user based security groups
  • Hire into position/job/headcount management
  • Staffing movement
  • Termination
  • Request delegation, rescind
  • Mover workers and inactivate supervisory organizations
  • Workday accounts Viewing personal data

Chapter 9Reports

  • Report Writer
  • Report Types
  • Standard report
  • Custom report
  • Custom report Types
  • Sharing Reports
  • Data sources
  • Business Object
  • How RW works

Chapter 10ILoads ( Concept)

  • iLoads
  • Data push.
  • Data extraction
  • Kinds of data load
  • Foundation
  • Master
  • Implementation suites
  • Implementation areas
  • Implementation tasks

SAS Clinical Training

SAS Clinical Training Online is provided by a real time consultant. The experience acquired by our trainer on SAS Clinical Trials, is promisingly helpful to the corporate trainee’s. Our instructors are experts in the implementation and support projects. Spiritsofts always works on real time scenarios. It is extremely useful for the professionals to handle the projects easily in the IT industry.

 

SAS Training for Clinical Trials (with Project)

 

Mode of Training:

Instructor Led online training.

 

SAS Clinical Training Course Content / Topics:

  • Introduction of SAS software.
  • Industries using SAS
  • Components of SAS System.
  • Architecture of SAS system.
  • Functionality of SAS System.
  • Introduction of SAS windows

 

Working in the SAS Environment

  • Functionality of SAS Windows.
  • Creating and managing SAS Libraries.
  • Overview of SAS Data states.
  • Types of Libraries.
  • Storing files temporarily and permanently.
  • Referencing SAS files.

 

Creation database from raw data

  • Steps to create a SAS dataset.
  • Creating SAS dataset using text file.
  • Creating SAS dataset using text file with delimiters.
  • Creating SAS dataset using structured text file.
  • Creating SAS dataset using unstructured text file.
  • Creating SAS dataset using Excel file.
  • Creating SAS dataset using Access file.
  • Creating SAS dataset using values inside the code.

 

Output delivery system

  • Concepts of output delivery system.
  • How ODS works and viewing output of ODS in different format.
  • HTML, RTF, PDF etc..

 

Combination the dataset

  • One-o-one reading
  • One to many
  • Many to many
  • Concatenation
  • Interleaving,
  • Match merge

 

Functions

  • Character function
  • Numerical function
  • Arithmetical function
  • Mathematical function
  • Date Function

 

Loops in SAS: Do Loops

 

      • Do Loop
      • Do While
      • Do Until

Array

    • Definition of array
    • Example of array

 

PROCEDURES

 

  • Procedure Format.
  • Procedure Contents.
  • Procedure Options.
  • Procedure Append.
  • Procedure Compare.
  • Procedure Transpose.
  • Procedure Print.
  • Procedure Import.
  • Procedure Export.
  • Procedure Datasets.
  • Procedure Tabulate.
  • Procedure Chart, Gchart, Gplot.
  • Procedure Report.

 

GRAPHS

  • Introduction to graphics.
  • Introduction to graphics.
  • Types of Graphics (with latest models)
  • Defining procedure Graphics.

 

Advance SAS Topic

 

ProcSql

  • Generate detail reports by working with a single table, joining tables, or using set operators in the SQL procedure.
  • Generate summary reports by working with a single table, joining tables, or using set operators in the SQL procedure.
  • Construct sub-queries and in-line views within an SQL procedure step.
  • Compare solving a problem using the SQL procedure versus using traditional SAS programming techniques.

 

Macro

  • Create and use user-defined and automatic macro variables within the SAS Macro Language.
  • Automate programs by defining and calling macros using the SAS Macro Language.

Understand the use of macro functions.

 

Introduction of SAS and Clinical research

  • SAS role in Clinical Research.
  • What is Clinical trial?
  • What is Protocol and role of Protocol in Clinical Research?
  • Which is playing main role in Clinical Research?

 

Clinical Trials Data Structures

  • Identify the classes of clinical trials data (demographic, lab, baseline, concomitant medication, etc.).
  • Identify key CDISC principals and terms.
  • Describe the structure and purpose of the CDISC SDTM data model.
  • Describe the structure and purpose of the CDISC ADaM data model.
  • Describe the contents and purpose of define.xml.

 

Transform Clinical Trials Data

  • Apply categorization and windowing techniques to clinical trials data.
  • Transpose SAS data sets.
  • Apply ‘observation carry forward’ techniques to clinical trials data (LOCF, BOCF, WOCF).
  • Calculate ‘change from baseline’ results.

 

Additional Support:

  • Clinical Project

 

ServiceNow Training

ServiceNow Training Course Details

Online Service Now Training Classes are conducted by Certified ServiceNow Working Professionals with 100 % Quality Assurance.

With an experienced Certified practitioner who will teach you the essentials you need to know to kick-start your career on ServiceNow hands-on. Our training make you more productive with your ServiceNow Training Online. We will provide access to our desktop screen and will be actively conducting hands-on labs with real-time projects.

ServiceNow Training Course Content

Introduction to ITIL

  • Introduction to ITSM
  • Incident Management
  • Problem Management and change management
  • Service Request Management
  • Configuration Management Database
  • SLA’s and OLA’s

Introduction to ServiceNow

  • Tool Introduction
  • Current Competitors
  • Releases
  • User Licenses
  • Using Wiki and Community

Basic Administration

  • Customizing Home Pages
  • Form Layouts and list layouts
  • Adding Users to Groups
  • Granting Roles to Users
  • Introducing Applications and Modules
  • Creation of tables and Modules
  • Creating tickets and raising Requests
  • Creating SLA’s
  • Performance Metrics

Advanced Administration

  • UI Policies, Notifications
  • Dictionary Entries and Overrides
  • Data Policies
  • List Control and Calculations
  • Exporting the Data from Service-Now
  • Update sets imports and Exports
  • Scheduling Jobs

Scripting

  • Business Rules
  • Client Scripts
  • UI Actions
  • Script Includes
  • Jelly Scripting

Reporting

  • Bar Charts
  • Pie Charts
  • List Reports
  • Pivot Tables
  • Using scripting in Reporting
  • Scheduling Reports
  • Making Gauges

Cloning and Upgrades

  • Need For cloning and ways to implement it
  • Upgrading the instance for new Release

Integrations

  • Web Services: Direct Web Services
  • Transform Map Web Services
  • Scripted Web Services
  • Email Integration: Inbound Actions
  • Event Registry
  • Creating and Triggering Events

Content Management

  • Introduction to CMS
  • Creating Sites
  • Creating Pages
  • Creating Blocks using Scripting
  • Login Rules

Configuration Management

  • Classes in CMDB
  • Mapping Configuration Item to Asset Records
  • Loading the CI’s into Service-Now
  • Relating Configuration items

Import Sets

  • Loading Data of different Formats
  • Using Data Sources
  • Using Transform Maps and Transform scripts

Service Catalog

  • Creating Catalog Items using Variables and Variable sets
  • Creating Record Producers
  • Design the flow using Workflow
  • Creating Execution Plans
  • Writing Catalog Client Scripts and Catalog UI Policies

Workflows

  • Creating Workflows on different tables
  • Approvals using workflows
  • Using Different Activities in workflows

MID Server Installation

  • Installing MID server on an instance
  • Testing the MID Server using another Logins
  • Importing Files by Using MID Server

Devops Training

Devops Training Course Content

Introduction to DevOps and its Necessities

The introductory module of DevOps training educates you over its necessities, transition, accountability and trust.

  • DevOps, DevOps Roles
  • DevOps Necessities
  • DevOps Problems & Solutions
  • Making a DevOps Transition
  • Identifying cultural impediments and overcoming it
  • Building Accountability and Trust
  • Understanding the Infrastructure layouts and its Challenges
  • Understand Scalability and Availability
  • Networking Concepts from an enterprise prospective
  • Annie’s Quizzes
  • LAB, Q & A and Quick Recap

Understand Common Infrastructure Servers

Understanding DevOps architecture, installation and configuration, to help you learn DevOps thoroughly.

  • Working of DNS Server at Internet Scale
  • DNS Configuration
  • DNS Installation
  • Understand the working of Geolocation
  • Understand Web Servers like Apache
  • Ngnix and their differences
  • Configure Apache and Nginx for the Enterprise
  • Understand HA and Setup HA Proxy for various Servers
  • Setup NFS and Openfiler for storage presentation

Implement Automated Installations and Deployments

This section of DevOps training focusses over topics like Git, RPM .

  • Installation of Linux Servers using PXE boot or kickstart method
  • Automatic system updates
  • Configure SVN or Git for version control
  • Configure Jenkins for Build and deployments
  • Building an RPM package
  • Installation and Configuration of Puppet for deployments

Understand Performance tuning aspects and basic Security for Infrastructure

Thoroughly learn DevOps by having a good understanding of its tuning aspects.

  • Operating system tuning concepts and its Concerns
  • Performance and Use Cases
  • Types of Disk Schedulers
  • Network tuning Parameters and their Influence
  • Bench marking servers like Apache Web Server
  • Implement Automated Installations and Deployments

Basics of Bash/Python Scripting

Topics like Crontab for automation, clustershell for deployments to help you learn Devops.

  • Basics of Bash Shell like file descriptors
    Environment
  • Understand the basic syntax of bash scripting
  • Understand loops, its conditions and return status
  • Understand and configure crontab for automating a task
  • Installation and Configuration of ClusterShell for deployments on large clusters
  • Basics of Python and its comparisons with bash scripting

Basics of Virtualization and it’s Concepts

This module of DevOps training provides detailed knowledge about virtualization.

  • What is Virtualization?
  • Types of Virtualization
  • Difference between Xen and KVM
  • Installation of virtual machines using Virtualbox
  • Vmware
  • KVM
  • Understand the various components of virtualization
  • Introduction to the Cloud virtualization

Monitoring And Logging

Understanding the techniques of system auditing by monitoring and logging in this module of DevOps training.

  • Understand Logging in Linux systems and its working for various services
  • Introduction to various logging tools
  • Understand System auditing
  • Install and Configure Nagios Monitoring for the Infrastructure
  • Writing custom plugins for Nagios

The Useful DevOps Tools & Commands

Some easy tricks demonstrated to remember disk commands and DevOps best Practices to help you learn DevOps.

  • Understand the Dev and Production environments in an organization
  • DevOps Best Practices
  • Understand Openssl and Openssh details
  • Understand rsync for backups
  • Understand Commands like: lsof, netstat
  • Understand Virtual Memory
  • Free, top, vmstat, iostat, uptime, find, screen and strace
  • Disk commands like – df, du, mkfs, tune2fs, fdisk and dd
  • Understand /etc/fstab, mount commands

Python Training

Python Training Course by Python Experts, Learn Python Programming Language Best Online Python Training Institute in Hyderabad USA Canada Singapore UK and Australia. Free Demo Live Classes Pay In Installments* Automation

 

Python Training Course Content

 

Introduction to Python 3

  • Origin and Goals of Python
  • Overview of Python Features
  • Getting and Installing Python
  • Accessing Python Documentation: Python Enhancement
  • Proposals (PEP)
  • Python’s Strengths
  • Using Python with Other Programming Languages

 

Language Fundamentals

  • Python’s Lexical Analyzer
  • Using Whitespace to Structure Programs
  • Identifiers and Keywords
  • Python’s Execution Model
  • Naming Objects and Binding
  • Python’s Data Model
  • Immutable and Mutable Objects
  • Values
  • Types
  • Creating and Using Variables

 

Expressions

  • Unary and Binary Arithmetic Operations
  • Comparison and Boolean Operations
  • Conditional Expressions
  • Lambda Expressions
  • Order of Operations and Operator Evaluation
  • Expression Lists
  • Assignment Operations

 

Using the String Object

  • Using ASCII and Unicode Strings
  • Manipulating Strings with String Methods
  • Using the format() Function to Format Strings
  • Using Escape Sequences
  • Working with Raw Strings

 

Arrays, Collections and Dictionaries

  • Sequenced Data Structures
  • Arrays
  • Collections
  • Dictionaries
  • Creating and Accessing Lists
  • Manipulating Lists
  • Creating and Accessing Tuples
  • Understanding the Differences Between Lists and Tuples
  • Using Dictionaries to Create Data Records
  • Manipulating Dictionaries Using Dictionary Methods
  • Creating Sets
  • Performing Set Operations
  • Union
  • Intersect
  • Difference
  • Differences Between Sets and Dictionaries
  • Using Generators to Return Iterators

 

Object Oriented Programming Concepts

  • The Object Oriented Programming Paradigm
  • Encapsulating Information
  • Classes vs. Instances of Objects
  • Built-in Class Attributes
  • Implementing Class Inheritance
  • Using Objects in Code

 

Data Management

  • Embedding SQLite Databases in Applications
  • Best Practices for Data Management
  • Storing Data in Local Databases
  • Discussing and Understanding the DB API
  • Understanding and Using Common SQL Statements
  • Connecting to a SQLite Database
  • Using Cursors to interact with Data from a Database
  • Implementing Error Handling with Database Connections

 

Using Python

  • Executing Python Programs from the Command Line
  • Python Command Line Options
  • Environment Variables that Influence Python
  • Creating Python GUI Applications
  • Standalone vs. Web-Enabled Interfaces
  • The Python Standard Library

 

Flow Control Constructs

  • if/elif/else Statements
  • Creating Loops with while and for
  • Understanding Iterators
  • Returning Values with return Statements
  • Loop Modification with break and continue
  • Returning Generator Iterators with the yield Statement
  • Retrieving Iterators with next()

 

Exception Handling

  • Types of Python Exceptions
  • Handling Exceptions with try/except/finally
  • Triggering Exceptions with raise
  • Defining New Exception Types
  • Implementing Exception Handling in Functions, Methods and Classes
  • Working with the Regular Expression Error Exception

 

Organizing Code

  • Defining Functions
  • Calling Functions
  • Creating Anonymous Functions
  • Altering Function Functionality with Decorator Functions
  • Creating Classes with the class Statement
  • Creating Objects as Class Instances
  • Using Preexisting Classes as the Basis of a New Class
  • Using Modules to Group Related Functions, Classes and Variables
  • Locating and Importing Modules
  • Using Packages to Group Modules Together

 

Working with Arguments

  • Passing Arguments to Functions by Reference and by Value
  • Defining Functions with Required Arguments
  • Defining Functions with Default Arguments
  • Defining Flexible Functions that Take Variable Length Arguments

 

Regular Expressions

  • Regular Expression Syntax
  • Using Regular Expressions in Python
  • Altering Regular Expression Processing with Regular Expression Modifiers
  • Using Regular Expression Operators
  • Scanning Through Strings Using the search() and match() Methods
  • Creating Reusable Patterns by Using the compile() Method

 

I/O Handling

  • Sending Output to STDOUT Using the print() Method
  • Reading Input with the input() Method
  • Creating File Objects with the open() Method
  • Controlling File Access Modes
  • Working with File Object Attributes
  • Closing File Objects with the close() Method
  • Reading and Writing to File Objects with read() and write()
  • Using File Processing Functions from the OS Module

PEGA PRPC Online Training

Pega Online Training Classes Experts Learn Pega 7.1/7.2 Training Online course Pega PRPC Certification Training  Material Our Institutes in Hyderabad Bangalore USA UK Canada ✓Job Support ✓Pay Installments*

Pega Online Training Course Content

Core topics of PEGA

1.    Introduction to PRPC

2.    Introduction to User Portals

3.    Introduction to Fields and Data Elements

4.    Introduction to UI and Form Design

5.    Introduction to Process Definition

6.    Working with ClassGroup/WorkPool

7.    Class Structure and RuleSets

8.    Creating a Data Model

  • Create a Property Using the New Rule Dialog
  • Change the Appearance of a property
  • Create properties Using the Define property Wizard
  • Create Embedded properties
  • Create a Data Table
  • Set Initial Values a Model Rule
  • Check-in/Check-out Functionality

9.    Process Definition

  • Create a  Sub-flow
  • Create a Tabbed Screen Flow
  • Call a Sub-flow from a Starter Flow

10.    Case Management

  • Stage based case management

11.    User Interface

  • Create a Section
  • Create a Section Containing Multiple Layouts
  • Adding a Section to a Flow Action

12.    Advanced UI

  • Conditionally Display a Layout Using a When Rule
  • Conditionally Display Property Fields
  • Create a Dynamic Select Control
  • Repeat layout( Row/Tree/Grid)

13.    Dynamic Layouts

14.    Decision Rules

15.    In depth explanation on Activities and its methods.

  • Obj- Methods
  • RDB- Methods
  • Validation Methods
  • Property- Methods
  • Page- Methods
  • Flow- Methods
  • Commit/Rollback
  • Exit-Activity & Activity-End
  • Call & Branch
  • Other Methods

Advanced Concepts

  • Assigning the work
  • To Work List
  • To Work Basket
  • To Skill Based Work Basket
  • To Current Operator

1.    Creating Work Group / Work basket

2.    Validation

  • Types of validations
  • Difference between Rule-Edit-Validation and Rule-Obj-Validation

3.    Declarative Rules

4.    Data Pages

5.    Advanced Activities

  • Create an Activity with a precondition and a Transition
  • Create an Activity to Populate a Dynamic Select
  • Create an Activity to Write Data Table

6.    SLA( Service Level Agreements)

  • Define an SLA
  • Assigning SLA to Assignment
  • Assigning SLA to Work-Object
  • Testing SLA

7.    Integration Connectors

8.    Connecting to External Data Base Using Connect-SQL

9.    How to Use Dynamic SQL When Connecting to External DB

10.    How to Send a Correspondence (E-mail)

  • Manual Correspondence
  • Automatic Correspondence

11.    Correspondence Fragment

12.    Configuring E-mail (Inbound/Outbound)

13.    Configuring Web Services (SOAP).

14.    Migration/Deployment (Import & Export)

15.    Working with Agents

  • Advanced Agents
  • Slandered Agents

16.    Debugging tools

  • ClipBoard
  • Tracer

17.    Documenting the Application