• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

96 Active Directory courses delivered Live Online

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jul 8th, 13:00 + 4 more
£2975

Supporting Microsoft Exchange

5.0(3)

By Systems & Network Training

MICROSOFT EXCHANGE TRAINING COURSE DESCRIPTION A hands on course focusing on the day to day running of Microsoft Exchange. The course is designed for those with a sound understanding of how Exchange forwards emails and concentrates on important issues such as monitoring, backups and restores. This course can be delivered on any version of Microsoft exchange and tailored as required. WHAT WILL YOU LEARN * Install MS Exchange * Create, configure and manage user mailboxes. * Configure and administer MS Exchange. * Backup and restore MS Exchange. MICROSOFT EXCHANGE TRAINING COURSE DETAILS * Who will benefit: Anyone working with MS Exchange. * Prerequisites: Total SMTP and email for engineers * Duration 3 days MICROSOFT EXCHANGE TRAINING COURSE CONTENTS * Review of mail basics Basic routing & Client/Server, Mail flow & protocols, Mail server technology. * Exchange features MAPI, Database, The Exchange organisation, Active Directory consideration. * Installing Understanding server roles, Planning for Exchange, Preparing Active Directory, Preparing the host server, Installing Exchange. * Introduction to Exchange management tools Exchange Management shell, Exchange Management console. * Administration Configuring SMTP domains, Send connectors, Receive connectors, Setting up & managing user mailboxes, Setting up resource mailboxes, Mail enabled groups, Address lists. * Troubleshooting Security & troubleshooting wizards, Windows platform tools, External/Internet tools.

Supporting Microsoft Exchange
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Using Windows PowerShell

5.0(3)

By Systems & Network Training

WINDOWS POWERSHELL TRAINING COURSE DESCRIPTION This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. WHAT WILL YOU LEARN * Work with Windows PowerShell pipeline. * Query system information by using WMI and CIM. * Work with variables, arrays, and hash tables. * Write advanced scripts in Windows PowerShell. * Administer remote computers. * Use advanced Windows PowerShell techniques. WINDOWS POWERSHELL TRAINING COURSE DETAILS * Who will benefit: IT professionals. * Prerequisites: Supporting Windows Server * Duration 5 days WINDOWS POWERSHELL TRAINING COURSE CONTENTS * Getting started with Windows PowerShell Overview and background of Windows PowerShell, Understanding command syntax, Finding commands. Hands on Configuring Windows PowerShell console & ISE application. Hands on Finding and running basic commands, Using the About files. * Cmdlets for administration Active Directory administration cmdlets, Network configuration cmdlets, Other server administration cmdlets. Hands on Windows Administration. Creating and managing Active Directory objects, Configuring network settings on Windows Server, Creating a web site. * Working with the Windows PowerShell pipeline Understanding the pipeline, Selecting, sorting, and measuring objects, Filtering objects out of the pipeline, enumerating objects in the pipeline, Sending pipeline data as output. Hands on Using the pipeline. Selecting, sorting, and displaying data. Hands on Filtering objects. Hands on Enumerating objects. Hands on Sending output to a file. Exporting user information to a file. * Understanding how the pipeline works Passing the pipeline data, Advanced considerations for pipeline data. Hands on Working with pipeline parameter binding. Predicting pipeline behaviour. * Using PSProviders and PSDrives Using PSProviders, Using PSDrives. Hands on Using PSProviders and PSDrives Creating files and folders on a remote computer, Creating a registry key for your future scripts, Create a new Active Directory group. * Querying system information by using WMI and CIM Understanding WMI and CIM, Querying data by using WMI and CIM, Making changes with WMI/CIM. Hands on Working with WMI and CIM. Querying information by using WMI, Querying information by using CIM, Invoking methods. * Working with variables, arrays, and hash tables Manipulating variables, arrays and hash tables. Hands on Working with variables, Using arrays, Using hash tables. * Basic scripting Introduction to scripting, Scripting constructs, Importing data from files. Hands on Basic scripting. Setting a script, Processing an array with a ForEach loop, Processing items by using If statements, Creating a random password, Creating users based on a CSV file. * Advanced scripting Accepting user input, Overview of script documentation, Troubleshooting and error handling, Functions and modules. Hands on Accepting data from users. Querying disk information from remote computers, Updating the script to use alternate credentials, Documenting a script. Hands on Implementing functions and modules. Creating a logging function, Adding error handling to a script, Converting a function to a module. * Administering Remote Computers Using basic Windows PowerShell remoting, Using advanced Windows PowerShell remoting techniques, Using PSSessions. Hands on Using basic remoting. Enabling remoting on the local computer, Performing one-to-one remoting, Performing one-to-many remoting. Hands on Using PSSessions. Using implicit remoting, Managing multiple computers. * Using background jobs and scheduled jobs Using background jobs, Using scheduled jobs. Hands on Using background jobs and scheduled jobs. Starting and managing jobs, Creating a scheduled job. * Using advanced Windows PowerShell techniques Creating profile scripts, Using advanced techniques. Hands on Practicing advanced techniques. Creating a profile script, Verifying the validity of an IP address, Reporting disk information, Configuring NTFS permissions, Creating user accounts with passwords from a CSV file. Hands on Practicing script development (optional)

Using Windows PowerShell
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Integrating UNIX and Microsoft

5.0(3)

By Systems & Network Training

INTEGRATING UNIX AND MICROSOFT COURSE DESCRIPTION This course is designed for the enterprise-level UNIX professional and represents the highest level of professional, distribution-neutral UNIX certification within the industry. It covers administering UNIX enterprise-wide with an emphasis on mixed environments. WHAT WILL YOU LEARN * Configure and troubleshoot OpenLDAP. * Use OpenLDAP as an authentication backend. * Manage software packages. * Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients INTEGRATING UNIX AND MICROSOFT COURSE DETAILS * Who will benefit: Enterprise-level UNIX professionals. * Prerequisites: UNIX network administration. * Duration 5 days INTEGRATING UNIX AND MICROSOFT COURSE CONTENTS * OPENLDAP CONFIGURATION * OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. * Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. * OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. * OPENLDAP AS AN AUTHENTICATION BACKEND LDAP * Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. * Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. * SAMBA BASICS * Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. * Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. * Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. * Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. * Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. * SAMBA SHARE CONFIGURATION * Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. * Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. * SAMBA USER AND GROUP MANAGEMENT * Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. * Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. * SAMBA DOMAIN INTEGRATION * Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. * Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. * Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. * SAMBA NAME SERVICES * NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. * Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. * WORKING WITH LINUX AND WINDOWS CLIENTS * CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. * Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating UNIX and Microsoft
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Integrating Linux and Microsoft

5.0(3)

By Systems & Network Training

INTEGRATING LINUX AND MICROSOFT COURSE DESCRIPTION This course is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution-neutral Linux certification within the industry. LPIC-3 300 covers administering Linux enterprise-wide with an emphasis on mixed environments. WHAT WILL YOU LEARN * Configure and troubleshoot OpenLDAP. * Use OpenLDAP as an authentication backend. * Manage software packages. * Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients INTEGRATING LINUX AND MICROSOFT COURSE DETAILS * Who will benefit: Enterprise-level Linux professionals. * Prerequisites: Delegates must have an active LPIC-2 certification to receive LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order. * Duration 5 days INTEGRATING UNIX AND MICROSOFT COURSE CONTENTS * OPENLDAP CONFIGURATION * OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. * Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. * OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. * OPENLDAP AS AN AUTHENTICATION BACKEND LDAP * Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. * Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. * SAMBA BASICS * Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. * Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. * Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. * Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. * Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. * SAMBA SHARE CONFIGURATION * Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. * Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. * SAMBA USER AND GROUP MANAGEMENT * Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. * Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. * SAMBA DOMAIN INTEGRATION * Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. * Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. * Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. * SAMBA NAME SERVICES * NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. * Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. * WORKING WITH LINUX AND WINDOWS CLIENTS * CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. * Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating Linux and Microsoft
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - AZURE VIRTUAL DESKTOP ARCHITECTURE * Azure Virtual Desktop for the enterprise * Azure Virtual Desktop components * Personal and pooled desktops * Service updates for Azure Virtual Desktop desktops * Azure limitations for Azure Virtual Desktop * Virtual machine sizing for Azure Virtual Desktop * Azure Virtual Desktop pricing 2 - DESIGN THE AZURE VIRTUAL DESKTOP ARCHITECTURE * Assess network capacity and speed requirements for Azure Virtual Desktop * Azure Virtual Desktop Experience Estimator * Recommend an operating system for an Azure Virtual Desktop implementation * Balancing host pools * Recommendations for using subscriptions and management groups * Configure a location for the Azure Virtual Desktop metadata * Recommend a configuration for performance requirements 3 - DESIGN FOR USER IDENTITIES AND PROFILES * Select an appropriate licensing model for Azure Virtual Desktop based on requirements * Personal and multi-session desktop scenarios * Recommend an appropriate storage solution * Plan for a desktop client deployment * Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) * Windows Desktop client to multiple devices * Hybrid Identity with Azure Active Directory * Plan for Azure Active Directory (AD) Connect for user identities 4 - IMPLEMENT AND MANAGE NETWORKING FOR AZURE VIRTUAL DESKTOP * Implement Azure virtual network connectivity * Manage connectivity to the internet and on-premises networks * Understanding Azure Virtual Desktop network connectivity * Implement and manage network security for Azure Virtual Desktop * Configure Azure Virtual Desktop session hosts using Azure Bastion * Monitor and troubleshoot network connectivity for Azure Virtual Desktop * Plan and implement Remote Desktop Protocol Shortpath * Configure Remote Desktop Protocol Shortpath for managed networks * Configure Windows Defender Firewall with Advanced Security for RDP Shortpath * Plan and implement Quality of Service for Azure Virtual Desktop 5 - IMPLEMENT AND MANAGE STORAGE FOR AZURE VIRTUAL DESKTOP * Storage for FSLogix components * Configure storage for FSLogix components * Configure storage accounts * Create file shares * Configure disks 6 - CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS FOR AZURE VIRTUAL DESKTOP * Automate creation of an Azure Virtual Desktop host pool using PowerShell * Configure host pool assignment type * Customize Remote Desktop Protocol (RDP) properties for a host pool * Manage licensing for session hosts that run Windows client * Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - CREATE AND MANAGE SESSION HOST IMAGE FOR AZURE VIRTUAL DESKTOP * Create a managed virtual machine (VM) image * Modify a session host image * Plan for image update and management * Create and use an Azure Compute Gallery using the portal * Create an Azure Virtual Desktop image by using VM Image Builder * Install Microsoft 365 Apps on a master Virtual Hard Disk image * Install language packs in Azure Virtual Desktop 8 - MANAGE ACCESS FOR AZURE VIRTUAL DESKTOP * Role-based access control (RBAC) for Azure Virtual Desktop * Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop * Using Azure Virtual Desktop with Microsoft Intune * Configuring screen capture protection for Azure Virtual Desktop 9 - MANAGE SECURITY FOR AZURE VIRTUAL DESKTOP * Plan and implement Conditional Access policies for connections to Azure Virtual Desktop * Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop * Understand Conditional Access policy components * Manage security by using Azure Security Center * Security posture management and threat protection 10 - IMPLEMENT AND MANAGE FSLOGIX * Plan for FSLogix * FSLogix profile containers and Azure files * Install FSLogix * Storage options for FSLogix profile containers * Profile Container vs Office Container * Configure Office Containers * Installing Microsoft Office using FSLogix application containers * Configure Cloud Cache * Configure Profile Containers * Create a profile container with Azure NetApp Files and capacity pool * Manage Rule Sets and application masking 11 - CONFIGURE USER EXPERIENCE SETTINGS * Virtual desktop optimization principles * Persistent virtual desktop environments * Configure user settings through group policies * Configure user settings through Endpoint Manager policies * Configure session timeout properties * Configure device redirections * Configure Universal Print * Implement the Start Virtual Machine on Connect feature * Troubleshoot user profile issues * Troubleshoot Azure Virtual Desktop clients 12 - INSTALL AND CONFIGURE APPS ON A SESSION HOST * MSIX app attach * How MSIX app attach works * Set up a file share for MSIX app attach * Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop * How to configure apps for users * Using the OneDrive sync app on virtual desktops * Using Microsoft Teams on Azure Virtual desktop * Publish built-in apps in Azure Virtual Desktop * Troubleshoot application issues for Azure Virtual Desktop 13 - PLAN FOR DISASTER RECOVERY * Disaster recovery for Azure Virtual Desktop * Virtual machine replication * FSLogix configuration 14 - AUTOMATE AZURE VIRTUAL DESKTOP MANAGEMENT TASKS * Scale session hosts using Azure Automation * Create or update an Azure Automation account * Create an Azure Automation Run As account * Create the Azure Logic App and execution schedule 15 - MONITOR AND MANAGE PERFORMANCE AND HEALTH * Monitor Azure Virtual Desktop by using Azure Monitor * Log Analytics workspace for Azure Monitor * Monitor Azure Virtual Desktop by using Azure Advisor * How to resolve Azure Advisor recommendations * Diagnose graphics performance issues ADDITIONAL COURSE DETAILS: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered Online5 days, Aug 20th, 13:00 + 1 more
£2380

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

55371 Windows Server Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Information Technology (IT) Professionals who have some experience working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server. The course is also for individuals from a service desk role who wish to transition into server maintenance. This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server in most organizations. MODULE 1: WINDOWS SERVER ADMINISTRATION OVERVIEW  * Introducing Windows Server * Windows Server Core Overview * Windows Server administration principles and tools overview MODULE 2: IDENTITY SERVICES IN WINDOWS SERVER  * AD DS Overview * Deploying Windows Server domain controllers * Azure AD overview * Implementing Group Policy * Active Directory Certificate Services overview MODULE 3: NETWORK INFRASTRUCTURE SERVICES IN WINDOWS SERVER  * Deploying and managing DHCP * Deploying and managing DNS service * Deploying and managing IPAM * Remote Access Services in Windows Server MODULE 4: FILE SERVERS AND STORAGE MANAGEMENT IN WINDOWS SERVER  * Volumes and File Systems in Windows Server * Implementing sharing in Windows Server * Implementing Storage Spaces in Windows Server * Implementing Data Deduplication * Implementing iSCSI * Deploying Distributed File System MODULE 5: HYPER-V VIRTUALIZATION AND CONTAINERS IN WINDOWS SERVER  * Hyper-V in Windows Server * Configuring VMs * Securing virtualization in Windows Server * Containers in Windows Server * Overview of Kubernetes MODULE 6: HIGH AVAILABILITY IN WINDOWS SERVER * Planning for failover clustering implementation * Creating and configuring failover cluster * Overview of stretch clusters * High availability and disaster recovery solutions with Hyper-V VMs MODULE 7: DISASTER RECOVERY IN WINDOWS SERVER * Hyper-V Replica * Backup and restore infrastructure in Windows Server MODULE 8: WINDOWS SERVER SECURITY * Credentials and privileged access protection * Hardening Windows Server * JEA in Windows Server * Securing and analyzing SMB traffic * Windows Server update management MODULE 9: RDS IN WINDOWS SERVER * Overview of RDS * Configuring a session-based desktop deployment * Overview of personal and pooled virtual desktops MODULE 10: REMOTE ACCESS AND WEB SERVICES IN WINDOWS SERVER * Implementing VPNs * Implementing Always On VPN * Implementing NPS * Implementing Web Server in Windows Server MODULE 11: SERVER AND PERFORMANCE MONITORING IN WINDOWS SERVER  * Overview of Windows Server monitoring tools * Using Performance Monitor * Monitoring event logs for troubleshooting MODULE 12: UPGRADE AND MIGRATION IN WINDOWS SERVER * AD DS migration * Storage Migration Service * Windows Server migration tools ADDITIONAL COURSE DETAILS: Nexus Humans 55371 Windows Server Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55371 Windows Server Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55371 Windows Server Administration
Delivered Online6 days, Aug 12th, 13:00 + 2 more
£2975

Securing Linux systems

5.0(3)

By Systems & Network Training

SECURING LINUX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure Linux accounts. * Secure Linux file systems. * Secure Linux access through the network. SECURING LINUX SYSTEMS TRAINING COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING LINUX SYSTEMS TRAINING COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

MS-900T01 Microsoft 365 Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for candidates looking to demonstrate foundational-level knowledge of cloud-based solutions to facilitate productivity and collaboration on-site, at home, or a combination of both.ÿCandidates may have knowledge of cloud-based solutions or may be new to Microsoft 365. Overview After completing this course, students will be able to: Describe cloud concepts Describe core Microsoft 365 services and concepts Describe security, compliance, privacy, and trust in Microsoft 365 Describe Microsoft 365 pricing and support This course introduces Microsoft 365, an integrated cloud platform that delivers industry-leading productivity apps along with intelligent cloud services, and world-class security. You?ll learn foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing. You will be introduced to Microsoft 365 and learn how Microsoft 365 solutions improve productivity, facilitate collaboration, and optimize communications. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support. 1 - DESCRIBE CLOUD COMPUTING * What is cloud computing * Describe the shared responsibility model * Define cloud models * Describe the consumption-based model 2 - DESCRIBE THE BENEFITS OF USING CLOUD SERVICES * Describe the benefits of high availability and scalability in the cloud * Describe the benefits of reliability and predictability in the cloud * Describe the benefits of security and governance in the cloud * Describe the benefits of manageability in the cloud 3 - DESCRIBE CLOUD SERVICE TYPES * Describe Infrastructure as a Service * Describe Platform as a Service * Describe Software as a Service 4 - WHAT IS MICROSOFT 365? * Describe the differences between Office 365 and Microsoft 365 * Describe Windows 365 * Describe how Microsoft 365 empowers workers in this hybrid world of work * Explore Microsoft 365 tenant 5 - DESCRIBE PRODUCTIVITY SOLUTIONS OF MICROSOFT 365 * Describe the productivity capabilities and benefits of Microsoft 365 * Describe Microsoft 365 Apps * Describe work management tools in Microsoft 365 * Describe additional Microsoft 365 productivity apps 6 - DESCRIBE COLLABORATION SOLUTIONS OF MICROSOFT 365 * Describe the collaboration capabilities and benefits of Microsoft 365 * Describe how Microsoft Teams promotes collaboration and enhances teamwork * Describe the Microsoft Viva apps * Describe how Yammer helps communities connect and grow 7 - DESCRIBE ENDPOINT MODERNIZATION, MANAGEMENT CONCEPTS, AND DEPLOYMENT OPTIONS IN MICROSOFT 365 * Describe the endpoint management capabilities of Microsoft 365 * Compare the differences of Windows 365 and Azure Virtual Desktop * Describe the deployment and release models for Windows-as-a-Service (WaaS) * Identify deployment methods and update channels for Microsoft 365 Apps 8 - DESCRIBE ANALYTICS CAPABILITIES OF MICROSOFT 365 * Describe the capabilities of Viva Insights * Describe the capabilities of the Microsoft 365 admin center and Microsoft 365 user portal * Describe the reports available in the Microsoft 365 admin center and other admin centers 9 - DESCRIBE THE SERVICES AND IDENTITY TYPES OF AZURE AD * Describe Azure Active Directory * Describe the available Azure AD editions * Describe Azure AD identity types * Describe the types of external identities * Describe the concept of hybrid identity 10 - DESCRIBE THE ACCESS MANAGEMENT CAPABILITIES OF AZURE AD * Describe Conditional Access in Azure AD * Describe the benefits of Azure AD roles and role-based access control 11 - DESCRIBE THREAT PROTECTION WITH MICROSOFT 365 DEFENDER * Describe Microsoft 365 Defender services * Describe Microsoft Defender for Office 365 * Describe Microsoft Defender for Endpoint * Describe Microsoft Defender for Cloud Apps * Describe Microsoft Defender for Identity * Describe the Microsoft 365 Defender portal 12 - DESCRIBE SECURITY CAPABILITIES OF MICROSOFT SENTINEL * Describe how Microsoft Sentinel provides integrated threat management * Understand Sentinel costs 13 - DESCRIBE THE COMPLIANCE MANAGEMENT CAPABILITIES IN MICROSOFT PURVIEW * Describe the Microsoft Purview compliance portal * Describe Compliance Manager * Describe use and benefits of compliance score 14 - DESCRIBE THE SERVICE TRUST PORTAL AND PRIVACY AT MICROSOFT * Describe the Service Trust Portal * Describe Microsoft's privacy principles * Describe Microsoft Priva 15 - DESCRIBE MICROSOFT 365 PRICING, LICENSING, AND BILLING OPTIONS * Explore pricing models for Microsoft cloud services * Explore the billing and bill management options * Explore the available licensing and management options 16 - DESCRIBE SUPPORT OFFERINGS FOR MICROSOFT 365 SERVICES * Explore support options for Microsoft 365 services * Explain service level agreement (SLAs) concepts * Identify how to track the service health status * Explore how organizations can share feedback on Microsoft 365 services

MS-900T01 Microsoft 365 Fundamentals
Delivered OnlineTwo days, Jul 22nd, 08:30 + 4 more
£595