Toutes les formations Global Knowledge

Page 44 sur 103Voir tout le catalogue
Global Knowledge
Microsoft Windows 10 pour les utilisateursPar Global Knowledge
  • Découvrir et utiliser l’interface de Windows 10
  • Gérer les fichiers, les dossiers et l’espace de stockage
  • Découvrir certaines des applications intégrées à Windows 10
  • Personnaliser l’environnement
Global Knowledge
Junos Layer 2 VPNsPar Global Knowledge

After successfully completing this course, you should be able to:

  • Define the term virtual private network.
  • Describe the business drivers for MPLS VPNs.
  • Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
  • List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs.
  • Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
  • Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
  • Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning.
  • Monitor and troubleshoot a BGP Layer 2 VPN.
  • Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
  • Describe the Junos OS BGP Layer 2 VPN CoS support.
  • Describe the flow of control and data traffic for an LDP Layer 2 circuit.
  • Configure an LDP Layer 2 circuit.
  • Monitor and troubleshoot an LDP Layer 2 circuit.
  • Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs.
  • Configure a FEC 129 BGP autodiscovery Layer 2 VPN.
  • Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs.
  • Describe the difference between Layer 2 MPLS VPNs and VPLS.
  • Explain the purpose of the PE device, the CE device, and the P device.
  • Explain the provisioning of CE and PE routers.
  • Describe the signaling process of VPLS.
  • Describe the learning and forwarding process of VPLS.
  • Describe the potential loops in a VPLS environment.
  • Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS.
  • Troubleshoot VPLS.
  • Describe the purpose and features of Ethernet VPN.
  • Configure Ethernet VPN.
  • Monitor and troubleshoot Ethernet VPN.
  • Describe the Junos OS support for hierarchical VPN models.
  • Describe the Junos OS support for Carrier-of-Carriers VPN Option C.
  • Configure the interprovider VPN Option C.
  • Describe the Junos OS support for multisegment pseudowire for FEC 129.
  • Describe and configure circuit cross-connect (CCC).
Global Knowledge
Junos Layer 3 VPNsPar Global Knowledge

After successfully completing this course, you should be able to:

  • Describe the value of MPLS VPNs.
  • Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs.
  • Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
  • List the provider-provisioned MPLS VPN features supported by the Junos OS software.
  • Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN.
  • Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers.
  • Describe the propagation of VPN routing information within an AS.
  • List the BGP design constraints to enable Layer 3 VPNs within a provider network.
  • Explain the operation of the Layer 3 VPN data plane within a provider network.
  • Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets.
  • Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities.
  • List the steps necessary for proper operation of a PE-CE dynamic routing protocol.
  • List the troubleshooting and monitoring techniques for routing instances.
  • Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance.
  • Monitor the operation of a CE-PE dynamic routing protocol.
  • Explain the operation of a PE multi-access interface in a Layer 3 VPN and list commands to modify that behavior.
  • Describe ways to support communication between sites attached to a common PE router.
  • Provision and troubleshoot hub-and-spoke Layer 3 VPNs,
  • Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN.
  • Describe QoS mechanisms available in L3VPNs.
  • Configure L3VPN over GRE tunnels.
  • Describe the RFC 4364 VPN options.
  • Describe the carrier-of-carriers model.
  • Configure the carrier-of-carriers and "Option C" configuration.
  • Describe the flow of control and data traffic in a draft-rosen multicast VPN.
  • Describe the configuration steps for establishing a draft-rosen multicast VPN.
  • Monitor and verify the operation of draft-rosen multicast VPNs.
  • Describe the flow of control traffic and data traffic in a next-generation multicast VPN.
  • Describe the configuration steps for establishing a next-generation multicast VPN.
  • Describe the configuration steps for establishing a next-generation multicast VPN.
  • Monitor and verify the operation of next-generation multicast VPNs.
  • Describe the flow of control traffic and data traffic when using MPVNs for Internet multicast.
  • Describe the configuration steps for enabling internet multicast using MVPNs.
  • Monitor and verify the operation of MVPN internet multicast.
Global Knowledge
Communiquer avec clartéPar Global Knowledge
  • Développer des messages attrayants
  • Définir leurs propres besoins et adapter leur message pour s’assurer que la communication y répond
  • Définir les besoins personnels des interlocuteurs et adapter leur message pour s’assurer que la,communication répond à leurs besoins
  • Structurer les messages pour permettre aux autres personnes de s’engager dans la communication et de réagir adéquatement
  • Utiliser divers types de questions pour sonder les opinions et les points de vue des interlocuteurs
  • Utiliser des techniques de communications spécifiques pour démontrer leur compréhension et leur intérêt, et orienter la communication
  • Ecouter plus efficacement.
Global Knowledge
Déléguer et responsabiliserPar Global Knowledge
  • Maîtriser le processus de délégation
  • Comprendre l’influence du style de leadership sur la délégation
  • Savoir négocier le contrat de délégation
  • Adapter la délégation au profil de personnalité - types psychologiques de Jung
  • Adapter la délégation à la dynamique du groupe - cycle de Tuckman
Global Knowledge
Passage de Word, Excel, et Powerpoint 2003 à la version 2010 pour utilisateursPar Global Knowledge
Cette formation permet aux participants de découvrir les nouveautés et les améliorations d’Office 2010.
Global Knowledge
Animer et mobiliser son équipe commercialePar Global Knowledge

Identifier la vocation et votre rôle de manager animateur et mobilisateur
Savoir expliquer, présenter la stratégie et les objectifs de l’entreprise et y faire adhérer collectivement et individuellement
Utilisez efficacement une méthode pour développer l’esprit d’équipe, l’engagement individuel et donner envie de se surpasser
Acquérir une méthodologie de conduite de réunions mobilisatrices suscitant le changement
Passer du stade de « Super Expert » à « Manager Coach »

Global Knowledge
Blockchain on IBM ZPar Global Knowledge

After completing this course, you should be able to:

· Understanding what blockchain is and why it is important.

· Learn the fundamentals of blockchain and how this technology will revolutionize transactions and business networks.

· Discover the important difference between blockchain and blockchain for business and what makes blockchain an ideal solution for streamlining business networks.

· Understand how blockchain technology can solve business problem and how this technology adds value.

· Understand what blockchain is, how it works, and how it can enhance your business and the industry in which it operates.

· Apply blockchain to a business network.

· Explore blockchain and the Hyperledger Fabric Project.

· Understand the Linux Foundation Hyperledger and IBM’s value proposition.

· Discover the Hyperledger project —an open-source collaboration working to advance the development of cross-industry blockchain technologies.

· Learn about the Hyperledger Fabric and the instrumental role it plays in developing a blockchain for business.

· Implement and setup a blockchain network

· Build your first chaincode and develop smart contracts (chaincode)

· Create your own private blockchain network and add code for Smart Contracts using the chaincode interface from the Hyperledger Project’s Fabric.

· Learn the basics of developing applications with chaincode.

Global Knowledge
Developing Rule Solutions in IBM Operational Decision Manager V8.9Par Global Knowledge
  • Describe the benefits of implementing a decision management solution with Operational Decision Manager
  • Identify the key user roles that are involved in designing and developing a decision management solution, and the tasks that are associated with each role
  • Describe the development process of building a business rule application and the collaboration between business and development teams
  • Set up and customize the Business Object Model (BOM) and vocabulary for rule authoring
  • Implement the Execution Object Model (XOM) that enables rule execution
  • Orchestrate rule execution through ruleflows
  • Author rule artifacts to implement business policies
  • Debug business rule applications to ensure that the implemented business logic is error-free
  • Set up and customize testing and simulation for business users
  • Package and deploy decision services to test and production environments
  • Integrate decision services for managed execution within an enterprise environment
  • Monitor and audit execution of decision services
  • Work with Operational Decision Manager features that support decision governance
Global Knowledge
Implémentation de la sécurité AIX 7Par Global Knowledge

Cette formation aborde les sujets suivants :

  • Décrire les menaces de sécurité pour un ordinateur
  • Présenter les commandes AIX et les composants pour la sécurité système d'AIX
  • Configurer la fonctionnalité Role-Based Access Control (RBAC)
  • Implément le chiffrement des fichiers systèmes
  • Implément la fonctionnalité Trusted Execution
  • Centraliser la sécurité avec LDAP
  • Implémenter les options d'installation AIX avec Secure by Default et Trusted AIX
Nous utilisons les cookies afin de fournir les services et fonctionnalités proposés sur notre site et afin d’améliorer l’expérience de nos utilisateurs. En cliquant sur ”J’ai compris”, vous acceptez l’utilisation de ces cookies.