• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2322 Administrator courses delivered Online

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA'S SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS) * The motivations behind STIGs * Requirements that the various software development roles must meet * Implementing STIG requirements and guidelines WHY HUNT BUGS? * The Language of CyberSecurity * The Changing Cybersecurity Landscape * AppSec Dissection of SolarWinds * The Human Perimeter * Interpreting the 2021 Verizon Data Breach Investigation Report * First Axiom in Web Application Security Analysis * First Axiom in Addressing ALL Security Concerns * Lab: Case Study in Failure SAFE AND APPROPRIATE BUG HUNTING/HACKING * Working Ethically * Respecting Privacy * Bug/Defect Notification * Bug Bounty Programs * Bug Hunting Mistakes to Avoid PRINCIPLES OF INFORMATION SECURITY * Secuity Is a Lifecycle Issue * Minimize Attack Surface Area * Layers of Defense: Tenacious D * Compartmentalize * Consider All Application States * Do NOT Trust the Untrusted IDENTIFICATION AND AUTHENTICATION FAILURES * Applicable STIGs * Quality and Protection of Authentication Data * Proper hashing of passwords * Handling Passwords on Server Side * Session Management * HttpOnly and Security Headers * Lab: STIG Walk-Throughs INJECTION * Applicable STIGs * Injection Flaws * SQL Injection Attacks Evolve * Drill Down on Stored Procedures * Other Forms of Server-Side Injection * Minimizing Injection Flaws * Client-side Injection: XSS * Persistent, Reflective, and DOM-Based XSS * Best Practices for Untrusted Data * Lab: STIG Walk-Throughs APPLICATIONS: WHAT NEXT? * Common Vulnerabilities and Exposures * CWE/SANS Top 25 Most Dangerous SW Errors * Strength Training: Project Teams/Developers * Strength Training: IT Organizations CRYPTOGRAPHIC FAILURES * Applicable STIGs * Identifying Protection Needs * Evolving Privacy Considerations * Options for Protecting Data * Transport/Message Level Security * Weak Cryptographic Processing * Keys and Key Management * Threats of Quantum Computing * Steal Now, Crack Later Threat * Lab: STIG Walk-Throughs APPLICATION SECURITY AND DEVELOPMENT CHECKLISTS * Checklist Overview, Conventions, and Best Practices * Leveraging Common AppSec Practices and Control * Actionable Application Security * Additional Tools for the Toolbox * Strength Training: Project Teams/Developers * Strength Training: IT Organizations * Lab: Recent Incidents SDL OVERVIEW * Attack Phases: Offensive Actions and Defensive Controls * Secure Software Development Processes * Shifting Left * Actionable Items Moving Forward * Lab: Design Study Review ASSET ANALYSIS * Asset Analysis Process * Types of Application-Related Assets * Adding Risk Escalators * Discovery and Recon DESIGN REVIEW * Asset Inventory and Design * Assets, Dataflows, and Trust Boundaries * Risk Escalators in Designs * Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives DAY 0 OPERATIONS: VMWARE TELCO CLOUD INFRASTRUCTURE INSTALLATION * Describe the challenges of the telco cloud * Describe the key functions of the telco cloud * List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure * Describe the VMware Telco Cloud Infrastructure architecture * Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture * List the VMware Telco Cloud Infrastructure deployment options * Describe the VMware Cloud Director architecture * List the key VMware components that are part of VMware Cloud Director * Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure DAY 0 OPERATIONS: ETSI NFV REQUIREMENTS FOR CLOUD PLATFORMS * Compare physical and virtual infrastructures * List the benefits and challenges of physical infrastructure * Describe the types of virtual infrastructure * Describe the advantages and components of the NFV infrastructure (NFVI) * Explain the role of network virtualization in the NFVI * List the requirements of NFVI for VMware Cloud Director * Describe the networking options of VMware Cloud Director * Describe the key networking use cases * Describe requirements of VMware Telco Cloud Automation? for networking * Describe the storage options of VMware Cloud Director * Describe the key storage use cases DAY 1 OPERATIONS: VIRTUALIZED INFRASTRUCTURE MANAGER (VIM) CONFIGURATION * Explain basic concepts related to VMware Cloud Director * Describe the components of the VMware Cloud Director architecture * Describe the basic configuration of the VMware Cloud Director architecture * Describe virtual data centers or VDCs * Explain the role of organization VDCs * Describe the relationship between provider VDCs and organization VDCs * Describe resources in VMware Cloud Director * List the key resource organization * Create resource pools * Describe how vSAN integrates with VMware Cloud Director DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR PROVIDERS * Describe how compute resources are provided to VMware Cloud Director * Describe how storage resources are provided to VMware Cloud Director * Describe provider VDC requirements and best practices * List the requirements of creating VDCs * Describe the VNF on-boarding process * Create provider VDCs DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR ORGANIZATIONS * Describe VMware Cloud Director organizations * Create VMware Cloud Director organizations * Navigate through the VMware Cloud Director HTML5 provider portal * Describe the VMware Cloud Director organization VDC * Navigate through the tenant portal * List use cases for a VMware Cloud Director organization VDC * List the organization VDC allocation models * Describe the types of resources that can be allocated * Describe how resources are allocated for an organization * Examine the function and requirements of network pools * Describe the network types available in VMware Cloud Director (external, organization, and vApp) * Create and manage organization VDC networks * Describe catalogs * Manage an organization?s catalog * Populate, share, and publish catalogs * Describe vApps * Manage access to vApps and catalogs * Modify the configuration of vApps and their virtual machines (VMs) * Manage organization VDC networking * Create affinity and anti-affinity rules DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR SECURITY * Describe role-based access * Create custom security roles * Describe the directory services in VMware Cloud Director * Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director * Explain the use of VMware Cloud Director with SSO DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR NETWORKING * List networking options in VMware Cloud Director * Describe key networking use cases in VMware Cloud Director * Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director * Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director * Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall * Describe an overview of VMware NSX-T? Data Center * Explain the architecture of NSX-T Data Center * Describe VMware Cloud Director supported features of NSX-T Data Center * Describe the benefits and challenges of multisite networking * List the requirements for multisite networking * Describe the benefits and challenges of networking between VDCs * List the requirements for networking between VDCs * Configure cross-VDC networking DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR RESOURCE MANAGEMENT AND MONITORING * Identify the key resources that need to be managed with VMware Cloud Director * List monitoring options with VMware Cloud Director * Explain the resource management and monitoring architecture in VMware Cloud Director * Monitor objects from the VMware Cloud Director portal * Identify features of VMware vRealize© Operations Manager? * Integrate VMware Cloud Director with vRealize Operations Manager * Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? * Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director * Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director * Integrate VMware Cloud Director with the Tenant App * Configure the Tenant App for VMware Cloud Director * Monitor objects with the Tenant App * List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager * List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? * List the steps to review historical virtual machine metrics in VMware Cloud Director * Examine VMware Cloud Director logs DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR TROUBLESHOOTING * Identify the features of the VMware Telco Cloud Automation dashboards * List the components of the VMware Telco Cloud Automation dashboards * Explain the features of fault management in VMware Telco Cloud Director * Describe the use of fault management in VMware Cloud Director * Describe the use of performance management in VMware Cloud Director * Describe the use of logs in VMware Cloud Director * Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CLOUD FOUNDATION OVERVIEW * Describe the VMware Cloud Foundation solution * Describe VMware Cloud Foundation architecture * Identify VMware Cloud Foundation components * Describe the VMware Cloud Foundation topology VMWARE CLOUD FOUNDATION+ AND VMWARE CLOUD CONNECTIVITY * Describe the VMware Cloud Foundation+ architecture * Identify the pre-requisites for VMware Cloud Foundation+ * Describe VMware Cloud Foundation+ value added features * Configure subscription-based licensing parameters * Describe the vCenter Cloud Gateway functionality * Identify the vCenter Cloud Gateway components * Describe the vCenter Cloud Gateway architecture * Connect the vCenter Cloud Gateway to VMware Cloud * Describe the VMware Cloud platform * Describe the VMware vSphere+ services used in VMware Cloud Foundation+ * Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ DAY ZERO TASKS * Identify the requirements for deploying VMware Cloud Foundation * Describe the VMware Cloud Foundation bring-up process * Identify the information required for the Planning and Preparation Workbook * Complete the Deployment Parameter Workbook * Describe how VMware Cloud Builder automates the deployment process * Identify the configuration validation process performed by VMware Cloud Builder * Describe the deployment of the management domain POST-DEPLOYMENT OPERATIONS * Complete the Onboarding Wizard * Understand VMware Cloud Foundation integration with VMware Single Sign-On * Configure user access to VMware Cloud Foundation * Describe the importance of user roles in vSphere * Configure identity sources for VMware Cloud Foundation * Perform the SDDC Manager backup and restore process * Identify steps in the NSX backup and restore process * Manage passwords in VMware Cloud Foundation * Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components * Manage and secure a primary password list * Describe the process for rotating passwords not managed by VMware Cloud Foundation VMWARE CLOUD FOUNDATION NETWORKING WITH NSX * Describe network virtualization with NSX * Recognize NSX operational planes * Identify NSX components * Describe logical switching * Describe NSX Data Center deployment in VMware Cloud Foundation * Explain how logical routing works in NSX * Identify NSX Edge functions * Describe data plane preparation for NSX Edge nodes in a workload domain * Recognize Tier-0 and Tier-1 gateway topologies * Define application virtual networks * Describe management domain rack options * List NSX Edge cluster requirements for vSphere with Tanzu * Discuss NSX Edge cluster placement considerations MANAGING WORKLOAD DOMAINS * Define workload domains * List the types of workload domains * Identify workload domain prerequisites * Understand the scalability limits for workload domains * Identify use cases for multiple clusters in a workload domain * Create network pools * Size network pools * Commission hosts with SDDC Manager * Create workload domains * Scale workload domains * Decommission hosts from a workload domain * Remove workload domains * Describe distinctive design decisions for VMware Cloud Foundation components VSPHERE WITH TANZU IN VMWARE CLOUD FOUNDATION * Explain vSphere with Tanzu * Define the role of the Spherelet * Describe the supervisor cluster control plane * Create vSphere with Tanzu namespaces * Describe the role of NSX networking components in vSphere with Tanzu * Discuss vSphere with Tanzu networking topology * Describe control plane VM management networking requirements * Plan appropriate IP address ranges for pod, ingress, and egress networking * Describe prerequisites for vSphere with Tanzu cluster compatibility * Deploy vSphere with Kubernetes * Create a vSphere namespace * Configure limits and permissions for a vSphere namespace VMWARE CLOUD FOUNDATION STORAGE MANAGEMENT * Identify storage use cases in VMware Cloud Foundation * Determine the most appropriate storage option for a workload domain * Describe different vSphere-native storage design options * Identify vSAN architecture and components * Describe vSAN requirements for the management and workload domains * Configure deduplication and compression * Discuss how to scale vSAN clusters in VMware Cloud Foundation * Configure storage policies for vSAN * Explain storage policy failure tolerance rules * Identify a virtual machine storage policy compliance status * Explain how vSAN storage policies protect VMware Cloud Foundation components AVAILABILITY AND BUSINESS CONTINUITY * Explain the importance of external service availability * Describe availability options native to VMware vSphere * Identify stretched cluster use cases * Identify stretched cluster components * Recognize stretched cluster requirements in VMware Cloud Foundation * Prepare and deploy a vSAN stretched cluster using APIs VMWARE CLOUD FOUNDATION CERTIFICATE MANAGEMENT * Learn the basics of public key infrastructure (PKI) * Describe the purpose of certificate signing requests (CSRs) * Describe available options in SDDC Manager for certificate authorities * View certificates for VMware Cloud Foundation components * Install and replace certificates for VMware Cloud Foundation components * Configure the integrated Certificate Authorities in SDDC Manager * Configure a certificate template in Microsoft Certificate Authority server * Configure the OpenSSL certificate authority in SDDC Manager * Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMWARE CLOUD FOUNDATION LIFECYCLE MANAGEMENT * Describe VMware Cloud Foundation Life Cycle Management * List the products managed by VMware Cloud Foundation Lifecycle management * Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management * Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation * Understand vSphere Lifecycle Manager features * Understand how and when to use cluster images * Describe the importance of Hardware Support Managers * Describe the upgrade prerequisites * Outline the upgrade precheck process * Describe the order of upgrade for VMware Cloud Foundation components VMWARE CLOUD FOUNDATION TROUBLESHOOTING * Use the SoS command-line tool to create log bundles, perform health checks, and check password validity * List VMware Cloud Foundation services * Identify VMware Cloud Foundation log files * Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Workspace ONE: Deploy and Manage [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. COURSE INTRODUCTION * Introductions and course logistics * Course objectives PLATFORM ARCHITECTURE * Summarize the features and functionality of Workspace ONE UEM * Outline the benefits of leveraging Workspace ONE UEM * Recognize the core and productivity components that make up the Workspace ONE UEM platform * Summarize high availability and disaster recovery for the Workspace ONE solution ADMINISTRATION * Navigate and customize the Workspace ONE UEM console * Summarize the hierarchical management structure * Explain the features and functions of Workspace ONE Hub Services * Outline account options and permissions ENTERPRISE INTEGRATIONS * Outline the process of integrating with directory services * Explain certificate authentication and practical implementation with Workspace ONE * Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console * Describe VMware Dynamic Environment Manager and its architecture ONBOARDING * Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management * Outline the steps for setting up autodiscovery in the Workspace ONE UEM console * Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app * Summarize the platform onboarding options MANAGING ENDPOINTS * Explain the differences between device and user profiles * Describe policy management options for Windows and macOS * Describe the functions and benefits of using compliance policies * Explain the use case for Freestyle Orchestrator * Describe the capabilities that sensors and scripts enable. ALTERNATIVE MANAGEMENT METHODS * Describe the function and benefits of device staging * Configure product provisioning in the Workspace ONE UEM console * Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices * List the system and device requirements for Linux device management in Workspace ONE UEM APPLICATIONS * Describe the features, benefits, and capabilities of application management in Workspace ONE UEM * Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console * Describe the benefits of using Apple Business Manager content integration * Describe the benefits of using server-to-client software distribution * List the functions and benefits of VMware Workspace ONE© SDK DEVICE EMAIL * List the email clients supported by Workspace ONE UEM * Configure an Exchange Active Sync profile in the Workspace ONE UEM console * Configure VMware Workspace ONE© Boxer settings * Summarize the available email infrastructure integration models and describe their workflows * Configure email compliance policies and notifications services CONTENT SHARING * Describe the benefits of using Content Gateway * Describe the Content Gateway workflows * Describe the benefits of integrating content repositories with Workspace ONE UEM * Configure a repository in the Workspace ONE UEM console MAINTENANCE * Manage endpoints from the Device List view and the Details view. * Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. WORKSPACE ONE ACCESS * Summarize the benefits of Workspace ONE Access * Outline the core features and functions enabled by Workspace ONE Access * Navigate the Workspace ONE Access console * Explain the functions of directory integration with Workspace ONE Access * Explain the various types of authentication protocols enabled by Workspace ONE Access INTEGRATING WORKSPACE ONE UEM AND WORKSPACE ONE ACCESS * Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access * Outline the process of connecting Workspace ONE UEM and Workspace ONE Access * Examine the workflow of integrations * Summarize the key features of an integrated solution PRODUCTIVITY INTEGRATIONS * Identify the functions enabled by VMware Unified Access Gateway? * Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service * Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service * Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 AUTHENTICATION * Outline the authentication methods supported by Workspace ONE Access * Summarize the main properties of the SAML protocol * Summarize the SAML authentication workflow * Explain the application SSO authentication workflow with SAML MOBILE SINGLE SIGN-ON * Describe the concept of mobile SSO * Outline the mobile SSO workflows INTELLIGENCE AND AUTOMATION * Summarize the features of Workspace ONE© Intelligence? * Outline the benefits of using Workspace ONE Intelligence ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Workspace ONE: Deploy and Manage [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools * Searching in the Configuration Manager console * Using Windows PowerShell with Configuration Manager * Using Configuration Manager Service Manager to manage components * Monitoring site and component status * Reviewing log files by using the Configuration Manager Trace tool * Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. * Describe the Configuration Manager architecture. * Describe the management tools that you use to perform administrative functions for Configuration Manager. * Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. ANALYZING DATA USING QUERIES AND REPORTS * Introduction to queries * Configuring Microsoft SQL Server Reporting Services (SSRS) * Lab : Creating and running queriesConfiguring boundaries and resource discovery * Creating data queries * Creating subselect queries * Creating status message queries * Lab : Configuring SSRS * Configuring a reporting services point * Creating a report by using Report Builder * Create and configure data and status message queries. * Configure and manage SSRS and the reporting services point. PREPARING THE MANAGEMENT INFRASTRUCTURE TO SUPPORT PCS AND MOBILE DEVICES * Configuring site boundaries and boundary groups * Configuring resource discovery * Configuring the Exchange Server Connector for mobile device management * Configuring user and device collections * Lab : Configuring boundaries and resource discovery * Configuring boundaries, boundary groups, and fallback relationships * Configuring Active Directory discovery methods * Lab : Configuring user and device collections * Creating a device collection * Creating a user collection * Configuring a maintenance window * Configure boundaries and boundary groups. * Configure resource discovery. * Configure the Exchange Server connector mobile device management. * Organize resources using device and user collections. DEPLOYING AND MANAGING CLIENTS * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings in Configuration Manager * Lab : Deploying the Microsoft System Center Configuration Manager client software * Preparing the site for client installation * Deploying the Configuration Manager client software by using client push installation * Lab : Configuring and monitoring client status * Configuring and monitoring client health status * Lab : Managing client settings * Configuring client settings * Describe the requirements and considerations for installing the Configuration Manager client software. * Deploy the Configuration Manager client software. * Configure and monitor client status. * Manage Configuration Manager client settings. MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Configuring and managing hardware inventory * Lab : Configuring software metering * Configuring software metering * Lab : Configuring and managing Asset Intelligence * Preparing the site for Asset Intelligence * Configuring Asset Intelligence * Monitoring license agreements by using Asset Intelligence * Viewing Asset Intelligence reports * Describe inventory collection. * Configure and collect hardware and software inventory. * Manage inventory collection. * Configure software metering. * Configure Asset Intelligence. DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments * Installing a new distribution point * Managing content distribution * Prepare the infrastructure for content management. * Distribute and manage content on distribution points. DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Installing and configuring the Application Catalog roles * Creating applications with requirements * Deploying applications * Lab : Managing application supersedence and removal * Managing application supersedence * Uninstalling the Excel Viewer application * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Configuring support for App-V * Deploying virtual applications * Lab : Using Configuration Manager to deploy Windows Store apps * Configuring support for sideloading Windows Store apps * Configuring a Windows Store app * Deploying Windows 10 apps to users * Describe the application management features of Configuration Manager. * Create applications. * Deploy applications. * Manage applications. * Configure and deploy virtual applications. * Configure and deploy Windows Store apps. MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Lab : Configuring the site for software updates * Configuring and synchronizing the software update point * Lab : Deploying and managing software updates * Determining software update compliance * Deploying software updates to clients * Configuring automatic deployment rules * Describe how the software updates feature integrates with Configuration Manager. * Prepare the Configuration Manager site for software updates. * Manage the evaluation and deployment of software updates. * Configure automatic deployment rules. * Monitor and troubleshoot software updates. IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Lab : Implementing Microsoft System Center Endpoint Protection * Configuring the System Center Endpoint Protection point and client settings * Configuring and deploying Endpoint Protection policies * Monitoring Endpoint Protection * Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. * Configure, deploy, and manage Endpoint Protection policies. MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere: Fast Track [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi™ hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use and manage resource pools Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler™ Create virtual networks with VMware vSphere Distributed Switch™ and enable distributed switch features Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines Use host profiles to manage ESXi configuration compliance Describe how vSphere storage APIs help storage systems integrate with vSphere Configure and use virtual machine storage policies Discuss the purpose and capabilities of VMware vSphere with Kubernetes and how it fits into the VMware Tanzu™ portfolio This five-day, intensive course takes you from introductory to advanced VMware vSphere© 7 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VSPHERE AND THE SOFTWARE-DEFINED DATA CENTER * Explain basic virtualization concepts * Describe how vSphere fits into the software-defined data center and the cloud infrastructure * Explain how vSphere interacts with CPUs, memory, networks, and storage * Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts * Use VMware Host Client? to access and manage ESXi host VIRTUAL MACHINES * Create and remove a virtual machine * Provision a virtual machine with virtual devices * Identify the files that make up a virtual machine * Explain the importance of VMware Tools VCENTER SERVER * Describe the vCenter Server architecture * Discuss how ESXi hosts communicate with vCenter Server * Deploy and configure vCenter Server Appliance * Use the vSphere Client to manage the vCenter Server inventory * Add data center, organizational objects, and hosts to vCenter Server * Use roles and permissions to enable users to access objects in the vCenter Server inventory * Back up vCenter Server Appliance * Monitor vCenter Server tasks, events, and appliance health * Use vCenter Server High Availability to protect a vCenter Server Appliance CONFIGURING AND MANAGING VIRTUAL NETWORKS * Create and manage standard switches * Describe the virtual switch connection types * Configure virtual switch security, traffic-shaping and load-balancing policies * Compare vSphere distributed switches and standard switches CONFIGURING AND MANAGING VIRTUAL STORAGE * Identify storage protocols and storage device types * Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage * Create and manage VMFS and NFS datastores * Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage * Deploy virtual machines on a VMware vSAN? datastore VIRTUAL MACHINE MANAGEMENT * Use templates and cloning to deploy new virtual machines * Modify and manage virtual machines * Create a content library and deploy virtual machines from templates in the library * Dynamically increase the size of a virtual disk * Use customization specification files to customize a new virtual machine * Perform vSphere vMotion and vSphere Storage vMotion migrations * Create and manage virtual machine snapshots * Examine the features and functions of VMware vSphere© Replication? RESOURCE MANAGEMENT AND MONITORING * Discuss CPU and memory concepts in a virtualized environment * Describe what over commitment of a resource means * Describe methods for optimizing CPU and memory usage * Use various tools to monitor resource use * Create and use alarms to report certain conditions or events VSPHERE CLUSTERS * Describe options for making a vSphere environment highly available * Explain the vSphere HA architecture * Configure and manage a vSphere HA cluster * Examine the features and functions of VMware vSphere© Fault Tolerance * Configure a vSphere cluster using ESXi Cluster Quickstart * Describe the functions of a vSphere DRS cluster * Create a vSphere DRS cluster NETWORK SCALABILITY * Configure and manage vSphere distributed switches * Describe how VMware vSphere© Network I/O Control enhances performance * Explain distributed switch features such as port mirroring and NetFlow VSPHERE LIFECYCLE MANAGEMENT * Describe how VMware vSphere© Lifecycle Manager? works * Use vSphere Lifecycle Manager to update ESXi hosts in a cluster HOST AND MANAGEMENT SCALABILITY * Use host profiles to manage ESXi configuration compliance * Create and manage resource pools in a cluster STORAGE SCALABILITY * Explain why VMware vSphere© VMFS is a highperformance, scalable file system * Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O Filtering * Configure and assign virtual machine storage policies * Create VMware vSAN? storage policies * Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control * Discuss vSphere support for NVMe and iSER INTRODUCTION TO VSPHERE WITH KUBERNETES * Differentiate between containers and virtual machines * Identify the parts of a container system * Recognize the basic architecture of Kubernetes * Describe a basic Kubernetes workflow * Describe the purpose of vSphere with Kubernetes and how it fits into the VMware Tanzu portfolio * Explain the vSphere with Kubernetes supervisor cluster * Describe the Tanzu Kubernetes Grid service ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Fast Track [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Fast Track [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Fast Track [v7.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Cloud Foundation: Planning, Management, Operations [V4.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system integrators, and consultants responsible for implementing and managing VMware Cloud Foundation Overview By the end of the course, you should be able to meet the following objectives: Describe design implications of VMware Cloud Foundation standard or consolidated architecture List requirements for VMware Cloud Foundation deployment Describe the VMware Cloud Foundation bring-up process and the VMware Cloud Foundation architecture Perform VMware Cloud Foundation bring-up Describe physical and virtual networking considerations Outline VMware Cloud Foundation storage options Use the VMware Imaging Appliance to image ESXi hosts Describe VMware Cloud Foundation multi-instance federation Use VMware Cloud Foundation™ SDDC Manager™ to perform operational tasks Describe user roles in VMware Cloud Foundation and VMware vSphere Manage users and passwords using VMware Cloud Foundation Manage certificate rotation for VMware Cloud Foundation components Use Active Directory integration to automate certificate generation and rotation Describe workload domains Manage workload domains in VMware Cloud Foundation Manage VMware NSX-T™ for VMware Cloud Foundation Describe use cases for Application Virtual Networks (AVNs) Meet vSphere with VMware Tanzu™ requirements Deploy a vSphere with Tanzu enabled workload domain Manage VMware vSAN™ storage in a workload domain Create vSAN storage policies Describe Cloud Native storage Describe the importance of business continuity measures in VMware Cloud Foundation Plan appropriate backup and restore workflows for VMware Cloud Foundation components Implement stretched clusters in VMware Cloud Foundation workload domains This five-day course includes instruction on the capabilities of VMware Cloud Foundation? and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization. The course explains the architecture of VMware Cloud Foundation and explains licensing, certificates, and storage and network management. The course also covers workload domains, availability, life cycle management, and troubleshooting. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CLOUD FOUNDATION OVERVIEW * Describe the VMware Cloud Foundation solution * Describe VMware Cloud Foundation architecture * Identify VMware Cloud Foundation components * Describe VMware Cloud Foundation topology * Define VMware Cloud Foundation terminology DAY ZERO TASKS * Identify the requirements for deploying VMware Cloud Foundation * Identify management domain sizing considerations * Identify workload domain sizing considerations * Detail design considerations for ESXi in management and VI workload domains * Detail design considerations for vCenter in management and VI workload domains * Detail the VMware Cloud Foundation bring-up process * Identify information required for the Planning and Preparation Workbook * Identify information required for the Deployment Parameter Workbook * Describe how VMware Cloud Builder automates the deployment process * Explain how the Deployment Parameter Workbook is imported into VMware Cloud Builder * Recognize the configuration validation process performed by VMware Cloud Builder * Detail the deployment of the management domain * Recognize the options to image a host * Identify the key capabilities of VIA * Recognize how to use VIA for imaging the ESXi Nodes POST DEPLOYMENT OPERATIONS * Understand VMware Cloud Foundation integration with VMware Single Sign-On * Configure user access to VMware Cloud Foundation * Describe the importance of user roles in vSphere * Configure identity sources in vSphere to use with VMware Cloud Foundation * Manage passwords in VMware Cloud Foundation * Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components * Detail the best practices for password management for VMware Cloud Foundation * Retrieve and secure the password list * Describe the process for rotating passwords not managed by VMware Cloud Foundation VMWARE CLOUD FOUNDATION LICENSE MANAGEMENT * Describe how to add license keys to the VMware Cloud Foundation inventory * Describe how to view license keys in SDDC Manager * Describe how to assign license keys * Describe how to remove license keys * Describe how to replace expiring licenses VMWARE CLOUD FOUNDATION NETWORKING WITH NSX-T * Describe NSX Management plane and Control planes * Detail design considerations for workload domains with shared NSX Manager instances * Detail design considerations for workload domains with dedicated NSX Manager instances * Describe the spine-and-leaf design * Describe the addressing scheme for the underlay * Recognize possible variations of the spine-and-leaf design * Describe the multi-NIC design * Describe NSX Edge node design and BGP peering with the physical network * Describe cluster design and rack design * Explain dynamic routing with BGP * Explain virtual IP addressing * Describe logical switching * Detail NSX Edge functions * Define application virtual networks * Describe management domain rack options * List NSX Edge cluster requirements for vSphere with Tanzu * Discuss NSX Edge cluster placement considerations * Describe NSX-T Data Center deployment in VMware Cloud Foundation * Explain how logical routing works in NSX-T Data Center * Identify NSX Edge functions * Describe data plane preparation for NSX-T Data Center Edge nodes in a workload domain * Recognize Tier-0 and Tier-1 gateway topologies * Recognize features of NSX distributed firewalls * Describe the benefits of NSX Federation in VMware Cloud Foundation * Identify NSX Federation Use Cases * Explain NSX Federation Components and Architecture * Discuss NSX Federation configuration basics MANAGING WORKLOAD DOMAINS * Define workload domains * Detail design considerations for vSphere networking in management and VI workload domains * Detail design considerations for storage in management and VI workload domains * Recognize design choices for a consolidated design or standard design * List the types of workload domains * State scale limits for workload domains * Identify use cases for multiple clusters in a workload domain * List workload domain prerequisites * Explain how to create a workload domain * Describe how to scale a workload domain * Explain how to delete a workload domain * Describe host decommissioning VSPHERE WITH TANZU IN VMWARE COULD FOUNDATION * Discuss the vSphere with Tanzu solution * Define the role of Spherelet * Describe the supervisor cluster control plane * Define vSphere with Tanzu namespaces * Describe the role of NSX-T networking components * Discuss vSphere with Tanzu networking topology * Describe VMware Container Networking with Antrea * Describe control plane VM management networking requirements * Plan appropriate IP address CIDR ranges for pod, ingress, and egress networking * Describe prerequisites for vSphere with Tanzu cluster compatibility * Deploy vSphere with Kubernetes * Create a vSphere namespace * Configure limits and permissions for a vSphere namespace * Enabling Harbor Image Registry VMWARE CLOUD FOUNDATION STORAGE MANAGEMENT * Identify vSAN architecture and components * Recognize storage options for VMware Cloud Foundation * Recognize the connectivity options for supplemental storage * Explain why vSAN is the best option for VMware Cloud Foundation storage * Recognize vSAN design considerations * Identify sizing and performance considerations that impact the storage design * Describe vSAN requirements for the management and workload domains * Define deduplication and compression * Discuss how to scale vSAN clusters in VMware Cloud Foundation * Explain how storage policies work with VMware Cloud Foundation vSAN clusters * Explain storage policy failure tolerance rules * Identify a VM storage policy compliance status * Relate storage policies to Kubernetes storage classes * Describe persistent volumes * Monitor Cloud Native Storage in the vSphere Client AVAILABILITY AND BUSINESS CONTINUITY * Identify steps in the SDDC Manager backup and restore process * Recognize the importance of external service availability * Describe native vSphere availability options * Identify steps in the NSX backup and restore process * Identify stretched cluster use cases * Identify stretched cluster components * Recognize stretched cluster requirements in VMware Cloud Foundation * Prepare and deploy a vSAN stretched cluster using APIs VMWARE CLOUD FOUNDATION CERTIFICATE MANAGEMENT * Describe public key infrastructure (PKI) * Explain the purpose of certificate signing requests (CSRs) * List the available CA options in SDDC Manager * Describe how to view certificates * Explain how to generate a CSR * Describe how to replace and install certificates for VMware Cloud Foundation components * List the available CA options in SDDC Manager * Explain how to configure the Microsoft CA server * Describe how to install certificates issued by the Microsoft CA server * Explain how to add OpenSSL CA in SDDC Manager * Describe how to install certificates issued by OpenSSL CA * Explain how to install certificates issued by third-party CAs

VMware Cloud Foundation: Planning, Management, Operations [V4.3]
Delivered on-request, onlineDelivered Online
Price on Enquiry

AN100 IBM AIX Basics

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. DAY 1 * Introduction to AIX * Using the System * AIX Documentation * Files and Directories * Using Files DAY 2 * File Permissions * The vi Editor * Shell Basics * Using Shell Variables DAY 3 * Processes * Controlling Processes * Customizing the User Environment * AIX Utilities, Part I * AIX Utilities, Part I (Continued) * AIX Utilities, Part II DAY 4 * AIX Utilities, Part II (Continued) * Additional Shell Features * The AIX Graphical User Interface

AN100 IBM AIX Basics
Delivered on-request, onlineDelivered Online
Price on Enquiry

Power BI - dashboards (1 day) (In-House)

By The In House Training Company

Power BI is a powerful data visualisation program that allows businesses to monitor data, analyse trends, and make decisions. This course is designed to provide a solid understanding of the reporting side of Power BI, the dashboards, where administrators, and end users can interact with dynamic visuals that communicates information. This course focuses entirely on the creation and design of visualisations in dashboards, including a range of chart types, engaging maps, and different types of tables. Designing dashboards with KPI's (key performance indicators), heatmaps, flowcharts, sparklines, and compare multiple variables with trendlines. This one-day programme focuses entirely on creating dashboards, by using the many visualisation tools available in Power BI. You will learn to build dynamic, user-friendly interfaces in both Power BI Desktop and Power BI Service. 1 INTRODUCTION * Power BI ecosystem * Things to keep in mind * Selecting dashboard colours * Importing visuals into Power BI * Data sources for your analysis * Joining tables in Power BI 2 WORKING WITH DATA * Utilising a report theme * Table visuals * Matrix visuals * Drilling into hierarchies * Applying static filters * Group numbers with lists * Group numbers with bins 3 CREATING VISUALS * Heatmaps in Power BI * Visualising time-intelligence trends * Ranking categorical totals * Comparing proportions * View trends with sparklines 4 COMPARING VARIABLES * Insert key performance indicators (KPI) * Visualising trendlines as KPI * Forecasting with trendlines * Visualising flows with Sankey diagrams * Creating a scatter plot 5 MAPPING OPTIONS * Map visuals * Using a filled map * Mapping with latitude and longitude * Mapping with ArcGIS or ESRI 6 CREATING DASHBOARDS * High-level dashboard * Migration analysis dashboard * Adding slicers for filtering * Promote interaction with nudge prompts * Searching the dashboard with a slicer * Creating dynamic labels * Highlighting key points on the dashboard * Customised visualisation tooltips * Syncing slicers across pages 7 SHARING DASHBOARDS * Setting up and formatting phone views * Exporting data * Creating PDF files * Uploading to the cloud * Share dashboards in SharePoint online

Power BI - dashboards (1 day) (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Contract management for practitioners (In-House)

By The In House Training Company

This two-day programme gives the key insights and understanding of contracting principles and the impact they have on business and operations. The course is designed for individuals involved in or supporting contracting who want to improve their commercial management skills; individuals in functions such as project management, business development, finance, operations who need practical training in commercial management; general audiences wanting to gain a basic understanding of commercial management. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Associate (CCMA) qualification. The programme addresses 31 different subject areas, across the five stages of the contracting process. By the end of the course the participants will be able, among other things, to: * Develop robust contract plans, including scope of work and award strategies * Conduct effective contracting activities, including ITT, RFP, negotiated outcomes * Negotiate effectively with key stakeholders, making use of the key skills of persuading and influencing and to work with stakeholders to improve outcomes * Set up and maintain contract management systems * Take a proactive approach to managing contracts * Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates * Develop and monitor appropriate and robust Key Performance Indicators to manage the contractor and facilitate improved performance * Understand the approvals process and how to develop and present robust propositions * Make appropriate use of best practice contract management tools, techniques and templates DAY ONE 1 INTRODUCTIONS * Aims * Objectives * Plan for the day 2 COMMERCIAL CONTEXT * Explaining the contracting context * Define the key objective * The importance of contact management * Impact upon the business 3 STAKEHOLDERS * How to undertake stakeholder mapping and analysis * Shared vision concept, * How to engage with HSE, Finance, Operations 4 ROLES AND RESPONSIBILITIES * Exploring the key roles and responsibilities of contract administrators, HSE, Finance, Divisional managers, etc 5 INITIATING THE CONTRACT CYCLE * Overview of the contracting cycle * Requirement to tender * Methods * Rationale and exceptions 6 SPECIFICATIONS * Developing robust scope of works * Use of performance specifications * Output based SOW 7 STRATEGY AND AWARD CRITERIA * Developing a robust contract strategy * Award submissions/criteria 8 MANAGING THE TENDER PROCESS * Review the pre-qualification process * Vendor registration rules and processes * Creation of bidder lists * Evaluation, short listing, and how to use of the 10Cs© model template and app 9 TYPES OF CONTRACT * Classify the different types of contracts * Call-offs * Framework agreement * Price agreements * Supply agreements 10 THE CONTRACT I: PRICE * Understanding contract terms * Methods of compensation * Lump sum, unit price, cost plus, time and materials, alternative methods * Cost plus a fee, target cost, gain share contracts * Advanced payments * Price escalation clauses DAY TWO 11 RISK * How to manage risks * Risk classification * Mitigation of contractual risks 12 CONTRACTOR RELATIONSHIP MANAGEMENT SESSION * Effectively managing relationships with contractors, * Types of relationships * Driving forces? * Link between type of contract and style of relationship 13 DISPUTES * Dealing with disputes * Conflict resolution * Negotiation * Mediation * Arbitration 14 CONTRACT MANAGEMENT * Measuring and improving contract performance * Using KPIs and SLAs * Benchmarking * Cost controls 15 THE CONTRACT II: TERMS AND CONDITIONS * Contract terms and conditions * Legal aspects * Drafting special terms 16 MANAGING CLAIMS AND VARIATIONS * How to manage contract and works variations orders * Identifying the causes of variations * Contractor claims process 17 COMPLETION * Contract close-out process * Acceptance/completion * Capture the learning/HSE * Final payments, evaluation of performance 18 CLOSE * Review * Final assessment

Contract management for practitioners (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry