• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2337 Administrator courses

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: CLI OVERVIEW * User Interface Options * Command-Line Interface * Initial Configuration * Interface Configuration * Lab 1: CLI Overview CHAPTER 3: ADVANCED SECURITY POLICY * Session Management * Junos ALGs * Policy Scheduling * Policy Logging * Lab 2: Advanced Security Policy CHAPTER 4: APPLICATION SECURITY THEORY * Application ID * Application Signatures * App Track * App Firewall * App QoS * App QoE CHAPTER 5: APPLICATION SECURITY IMPLEMENTATION * AppTrack Implementation * AppFW Implementation * AppQos Implementation * APBR Implementation * Lab 3: Application Security CHAPTER 6: INTRUSION DETECTION AND PREVENTION * IPS Overview * IPS Policy * Attack Objects * IPS Configuration * IPS Monitoring * Lab 4: Implementing IPS CHAPTER 7: SECURITY DIRECTOR * Overview * Security Director Objects * Security Director Policy Management * Lab 5: Security Director CHAPTER 8: SKY ATP IMPLEMENTATION * Architecture and Key Components * Features and Benefits * Configuration * Compromised Hosts * Command and Control * File Scanning * E-mail Scanning * Geo IP * Security Policy Integration * Troubleshooting * Lab 6: Sky ATP Implementation CHAPTER 9: POLICY ENFORCER * Policy Enforcer Concepts * Configuration Options * Policy Enforcer Installation * Lab 7: Policy Enforcer CHAPTER 10: JATP OVERVIEW * Traffic Inspection * Threat Detection * Threat Analysis * JATP Architecture CHAPTER 11: JATP IMPLEMENTATION * Data Collectors * Configure SmartCore Analytics Engine * Log Ingestion * Incident Management * SRX Threat Prevention * 3rd Party support for Threat Prevention * Reporting * Lab 8: JATP CHAPTER 12: JUNIPER SECURE ANALYTICS (JSA) * JSA Overview * Data Collection * Log Analytics * Threat Analytics * Vulnerability Management * Risk Management * Lab 9: JSA CHAPTER 13: JIMS * JIMS Overview * JIMS Integration * Lab 10: JIMS CHAPTER 14: VSRX AND CSRX * vSRX Overview * vSRX Supported Features * vSRX Use Cases * cSRX Overview * Lab 11: vSRX Installation CHAPTER 15: SSL PROXY * SSL Proxy Overview * SSL Concepts * SSL Proxy Configurations * Troubleshooting * Lab 12: SSL Proxy CHAPTER 16: CLUSTER CONCEPTS * Chassis Cluster Concepts * Chassis Cluster Operation CHAPTER 17: CHASSIS CLUSTER IMPLEMENTATION * Chassis Cluster Configuration * Chassis Cluster Advanced Options * Lab 13: Chassis Cluster Implementation CHAPTER 18: CHASSIS CLUSTER TROUBLESHOOTING * Chassis Cluster Case Studies * Troubleshooting Examples * Lab 14: Chassis Cluster Troubleshooting ADDITIONAL COURSE DETAILS: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to SQL Programming Basics (TTSQL002)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. BASIC RDBMS PRINCIPLES * Relational design principles * Accessing data through a structured query language * Entity relationship diagrams * Data Domains * Null values * Indexes * Views * Denormalization * Data Model Review THE SQL LANGUAGE AND TOOLS * Using SQL*Plus * Why Use SQL*Plus When * Other Tools Are Available? * Starting SQL*Plus * EZConnect * SQL Commands * PL/SQL Commands * SQL*Plus Commands * The COLUMN Command * The HEADING Clause * The FORMAT Clause * The NOPRINT Clause * The NULL Clause * The CLEAR Clause * Predefined define variables * LOGIN.SQL * Command history * Copy and paste in SQL*Plus * Entering SQL commands * Entering PL/SQL commands * Entering SQL*Plus commands * Default output from SQL*Plus * Entering Queries * What about PL/SQL? USING SQL DEVELOPER * Choosing a SQL Developer version * Configuring connections * Creating A Basic Connection * Creating A TNS Connection * Connecting * Configuring preferences * Using SQL Developer * The Columns Tab * The Data Tab * The Constraints Tab * The Grants Tab * The Statistics Tab * Other Tabs * Queries In SQL Developer * Query Builder * Accessing Objects Owned By Other Users * The Actions Pulldown Menu * Differences between SQL Developer and SQL*Plus * Reporting Commands Missing In SQL Developer * General Commands Missing In SQL Developer * Data Dictionary report * User Defined reports * Using scripts in SQL Developer WHERE AND ORDER BY * WHERE clause basics * Comparison operators * Literals and Constants in SQL * Simple pattern matching * Logical operations * The DUAL table * Arithmetic operations * Expressions in SQL * Character operators * Pseudo columns * Order by clause basics * Ordering Nulls * Accent and case sensitive sorts * Sampling data * WHERE and ORDER BY in SQL Developer * All, Any, Some FUNCTIONS * The basics of Oracle functions * Number functions * Character functions * Date functions * Conversion functions * Other functions * Large object functions * Error functions * The RR format mode; * Leveraging your knowledge ANSI 92 JOINS * Basics of ANSI 92 Joins * Using Query Builder with multiple tables * Table Aliases * Outer joins * Outer Joins In Query Builder * Set operators * Self-referential joins * Non-Equijoins ANSI 99 JOINS * Changes with ANSI99 * CROSS Join * NATURAL Join * JOIN USING * JOIN ON * LEFT / RIGHT OUTER JOIN * FULL OUTER JOIN SUBQUERIES * Why use subqueries? * WHERE clause subqueries * FROM clause subqueries * HAVING clause subqueries * CORRELATED subqueries * SCALAR subqueries * DML and subqueries * EXISTS subqueries * Hierarchical queries * TOP N AND BOTTOM N queries * Creating subqueries using Query Builder REGULAR EXPRESSIONS * Available Regular Expressions * Regular Expression Operators * Character Classes * Pattern matching options * REGEX_LIKE * REGEXP_SUBSTR * REGEXP_INSTR * REGEXP_REPLACE * REGEXP_COUNT ANALYTICS * The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity MORE ANALYTICS * RANKING functions * RANK * DENSE_RANK * CUME_DIST * PERCENT_RANK * ROW_NUMBER * Windowing aggregate functions * RATIO_TO_REPORT * LAG / LEAD * Linear Regression functions * Inverse Percentile functions * Hypothetical ranking functions * Pattern Matching ADDITIONAL COURSE DETAILS: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to SQL Programming Basics (TTSQL002)
Delivered on-request, onlineDelivered Online
Price on Enquiry

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Deploy and manage Virtual Delivery Agent machines to on-premises resource locations as well as in Microsoft Azure using MCS. Integrate Citrix Cloud and Citrix Virtual Apps and Desktops 2203 LTSR with Microsoft Azure Active Directory. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you will learn how to create a new Citrix DaaS deployment on Citrix Cloud, with a resource location on Microsoft Azure. You will also learn how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and a Microsoft Azure resource location that will host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. MODULE 1: INTRODUCTION TO CITRIX DAAS * New Citrix Workspace Packaging * Citrix Virtual Apps and Desktops - On-Premises Site * What is Citrix Cloud? * Why Citrix DaaS? * What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? * Citrix Cloud Administration MODULE 2: PLANNING - CITRIX DAAS ARCHITECTURE, SECURITY, AND OPERATIONS * Architecture and Deployment Options * Citrix DaaS Security * Citrix DaaS Operations MODULE 3: PLANNING - CITRIX CLOUD CONNECTORS * Cloud Connector Architecture * Cloud Connector Services and Communications Overview * Cloud Connector Operations in a Resource Location * Cloud Connector Resiliency * Installing, Updating, and Removing Cloud Connectors * Supported Domain Scenarios for Cloud Connectors * Securing Cloud Connector Communications * Local Host Cache (LHC) * Citrix Cloud Connector vs Delivery Controller Operations MODULE 4: PLANNING - CITRIX DAAS RESOURCE LOCATIONS * Citrix DaaS Resource Locations * Citrix DaaS Hosting Connections * Zones MODULE 5: ACTIVE DIRECTORY, AUTHENTICATION, AND AUTHORIZATION * Active Directory Design Options * Desktops from Non-Domain Joined VDAs * Citrix Federated Authentication Service and Identity Provider Services MODULE 6: PLANNING - PROVISIONING VDA WORKLOADS AND DELIVERING RESOURCES * Master Images * Machine Creation Services (MCS) in Citrix DaaS * Citrix Provisioning in Citrix DaaS * Machine Catalogs * Delivery Groups * Citrix Cloud Library MODULE 7: PLANNING - PROVIDE ACCESS IN CITRIX CLOUD * Selecting Between Citrix digital workspace experience and StoreFront * Citrix StoreFront and Citrix digital workspace experience Communications * Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway * Access Layer Communications * User Authentication MODULE 8: PLANNING - CITRIX DAAS ADMINISTRATION * Citrix Cloud Manage and Monitor * Delegated Administration * Citrix DaaS Remote PowerShell Software Development Kit * Manage Multiple Resource Locations MODULE 9: PLANNING - PUBLIC CLOUD CONSIDERATIONS * General Public Cloud Considerations * Using Autoscale to Power Manage Machines in a Public Cloud * Microsoft Azure as a Citrix DaaS Resource Location * Amazon Web Services as a Citrix DaaS Resource Location * Google Cloud as a Citrix DaaS Resource Location MODULE 10: PLANNING - MIGRATING TO CITRIX DAAS FROM CITRIX VIRTUAL APPS AND DESKTOPS * Citrix Cloud Migration Options and Considerations * Citrix Automated Configuration Tool * Citrix Image Portability Service MODULE 11: MANAGE - OPERATIONS AND SUPPORT IN CITRIX CLOUD * Citrix Cloud Connector Support * Updating and Rolling Back Machine Catalogs * VDA Restore * Citrix Self-Help Strategy * Monitor Your Environment MODULE 12: INTRODUCTION TO CITRIX DAAS ON MICROSOFT AZURE * Partnering for Success MODULE 13: PLANNING - CITRIX DAAS RESOURCE LOCATION ON MICROSOFT AZURE * Overview of Citrix DaaS Components * Creating a Citrix DaaS Deployment Overview MODULE 14: PLANNING - MICROSOFT AZURE OVERVIEW * Azure Virtual Network Structure * Azure Virtual Network Connectivity * Azure Virtual Resources * Azure Active Directory Identity and Access Management * Azure Active Directory Options and Considerations MODULE 15: PLANNING - DEPLOYING CITRIX DAAS ON MICROSOFT AZURE * Citrix DaaS Resource Locations in Azure * Citrix DaaS Components in Azure * Creating and Managing Workloads in an Azure Resource Location MODULE 16: PLANNING - PROVIDE ACCESS TO END USERS * Providing Access to Resources in Citrix Cloud * Citrix Gateway Deployment Options * Deploying Citrix Gateway or ADC in Azure * GSLB and StoreFront Optimal Gateway in Hybrid Environments MODULE 17: ROLLOUT - CITRIX DAAS DEPLOYMENT ON MICROSOFT AZURE * Citrix Workspace App Rollout * Preparing Migration of * End-Users to Workspace Platform MODULE 18: MANAGING - CITRIX DAAS WORKLOADS ON MICROSOFT AZURE * Maintaining Citrix Gateway * Backup and Monitoring in Azure * Maintaining Master Images in Azure * Monitoring VDAs in Manage Console and Azure MODULE 19: OPTIMIZE - CITRIX DAAS ON MICROSOFT AZURE * Managing Azure Costs * Using Azure Pricing Calculator - Instructor Demo ADDITIONAL COURSE DETAILS: Nexus Humans CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure
Delivered on-request, onlineDelivered Online
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot * Lab : Creating and running queries * Lab : Configuring SSRS * Lab : Analyzing the real-time state of a device by using CMPivot PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections * Lab : Configuring boundaries and resource discovery * Lab: Configuring user and device collections DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations * Lab : Deploying the Microsoft System Center Configuration Manager client software * Lab: Configuring and monitoring client status * Lab : Managing client settings MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Lab : Configuring software metering * Lab : Configuring and managing Asset Intelligence DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Lab : Managing application supersedence and removal * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Lab : Using Configuration Manager to deploy Windows Store apps MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates * Lab : Configuring the site for software updates * Lab : Deploying and managing software updates IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies * Lab : Implementing Microsoft System Center Endpoint Protection * Lab : Implementing advanced threat policies MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access * Lab : Managing compliance settings MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service * Lab : Preparing the site for operating -system deployment * Lab : Deploying operating -system images for bare-metal installations MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance * Backing up and recovering a Configuration Manager site * Lab : Configuring role-based administration * Lab : Configuring Remote Tools * Lab : Maintaining a Configuration Manager site ADDITIONAL COURSE DETAILS: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE TELCO CLOUD AUTOMATION INSTALLATION * Describe day zero operations for VMware Telco Cloud Automation * Describe the VMware Telco Cloud Automation architecture * List the steps to perform VMware Telco Cloud Automation deployment * List the steps to perform VMware Telco Cloud Automation control plane integration * Describe VMware Telco Cloud Automation control plane scaling * Describe the requirements for other applications such as vRealize Orchestrator and Harbor * Describe where, when, and how to use VMware Telco Cloud Automation tagging DAY 1 OPERATIONS: INFRASTRUCTURE AUTOMATION * Describe infrastructure automation * List the use cases of infrastructure automation * List the benefits of infrastructure automation * Describe the infrastructure requirements of infrastructure automation * Describe the infrastructure automation domains * List the steps to deploy an infrastructure using infrastructure automation DAY 1 OPERATIONS: INFRASTRUCTURE SETTINGS * Describe the VMware Telco Cloud Automation infrastructure options * Describe VMware Telco Cloud Automation infrastructure requirements * Outline the role of virtual infrastructure and VMware Telco Cloud Automation * Identify the benefits of public and private infrastructures * List the steps to integrate a VM-based virtual infrastructure * List the steps to integrate a container-based virtual infrastructure * Describe private infrastructure requirements DAY 1 OPERATIONS: CONTAINERS AS A SERVICE * Define containers as a service (CaaS) * List the challenges of CNF deployment without automation * Describe the Kubernetes and Tanzu Kubernetes Grid architectures * List steps to create a Kubernetes cluster template * Describe the process for deploying node pools and groups * List the steps to support anti-affinity of workload cluster nodes * Describe cluster monitoring * List CaaS scale options DAY 1 OPERATIONS: PARTNER INTEGRATION * Describe partner integration and the types of partners * Describe Harbor and the various Harbor platforms * List the steps to interface with a Harbor platform * Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) * Explain how to add an S-VNFM * Define S-VNFM use cases * List the benefits and challenges of using Airgap DAY 1 OPERATIONS: NETWORK FUNCTIONS AD NETWORK SERVICES * Describe the roles of network services and network functions * List the types of descriptors * Describe the role of TOSCA * Describe the role of onboarding * List the steps to onboard network functions and network services * Examine the results of the onboarding process * List the steps to instantiate network functions and network services * Examine the results of the instantiation process DAY 2 OPERATIONS: AUTHORIZATION MODEL * Explain the resources that can be accessed in vSphere * Define the role of a vCenter Server system in credential management * Define the role of Keycloak in credential management * Describe the procedures to create, delete, and modify rules using vCenter Server * Explain how to control and verify access to vSphere resources * List the roles in VMware Telco Cloud Automation * Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation * List all the permissions and filters that can be implemented in VMware Telco Cloud Automation DAY 2 OPERATIONS: LIFE CYCLE MANAGEMENT * Explain the life cycle stages in VMware Telco Cloud Automation control plane * Explain the life cycle stages in VMware Telco Cloud Automation * Define an upgrade schedule * Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane * Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation * Describe network function and network service life cycle management events * Execute network function and network service healing * Perform network function and network service termination DAY 2 OPERATIONS: TROUBLESHOOTING * List the components of the VMware Telco Cloud Automation dashboard * Explain the features of fault management in VMware Telco Cloud Automation * Explain the features of performance management in VMware Telco Cloud Automation * Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of CCLI for troubleshooting * Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation * Describe how to use vRealize Operations DAY TWO OPERATIONS: API MANAGEMENT * Define the VMware Telco Cloud Automation API * Explain the API architecture * Describe VMware Telco Cloud Automation API use cases * Describe how to request security tokens for implementation * Explain how to implement commands through external systems using APIs DAY TWO OPERATIONS: CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY * Describe continuous integration and continuous delivery (CICD) * List the benefits and challenges of CICD * Describe how VMware Telco Cloud Automation can be used in a CICD environment * Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA'S SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS) * The motivations behind STIGs * Requirements that the various software development roles must meet * Implementing STIG requirements and guidelines WHY HUNT BUGS? * The Language of CyberSecurity * The Changing Cybersecurity Landscape * AppSec Dissection of SolarWinds * The Human Perimeter * Interpreting the 2021 Verizon Data Breach Investigation Report * First Axiom in Web Application Security Analysis * First Axiom in Addressing ALL Security Concerns * Lab: Case Study in Failure SAFE AND APPROPRIATE BUG HUNTING/HACKING * Working Ethically * Respecting Privacy * Bug/Defect Notification * Bug Bounty Programs * Bug Hunting Mistakes to Avoid PRINCIPLES OF INFORMATION SECURITY * Secuity Is a Lifecycle Issue * Minimize Attack Surface Area * Layers of Defense: Tenacious D * Compartmentalize * Consider All Application States * Do NOT Trust the Untrusted IDENTIFICATION AND AUTHENTICATION FAILURES * Applicable STIGs * Quality and Protection of Authentication Data * Proper hashing of passwords * Handling Passwords on Server Side * Session Management * HttpOnly and Security Headers * Lab: STIG Walk-Throughs INJECTION * Applicable STIGs * Injection Flaws * SQL Injection Attacks Evolve * Drill Down on Stored Procedures * Other Forms of Server-Side Injection * Minimizing Injection Flaws * Client-side Injection: XSS * Persistent, Reflective, and DOM-Based XSS * Best Practices for Untrusted Data * Lab: STIG Walk-Throughs APPLICATIONS: WHAT NEXT? * Common Vulnerabilities and Exposures * CWE/SANS Top 25 Most Dangerous SW Errors * Strength Training: Project Teams/Developers * Strength Training: IT Organizations CRYPTOGRAPHIC FAILURES * Applicable STIGs * Identifying Protection Needs * Evolving Privacy Considerations * Options for Protecting Data * Transport/Message Level Security * Weak Cryptographic Processing * Keys and Key Management * Threats of Quantum Computing * Steal Now, Crack Later Threat * Lab: STIG Walk-Throughs APPLICATION SECURITY AND DEVELOPMENT CHECKLISTS * Checklist Overview, Conventions, and Best Practices * Leveraging Common AppSec Practices and Control * Actionable Application Security * Additional Tools for the Toolbox * Strength Training: Project Teams/Developers * Strength Training: IT Organizations * Lab: Recent Incidents SDL OVERVIEW * Attack Phases: Offensive Actions and Defensive Controls * Secure Software Development Processes * Shifting Left * Actionable Items Moving Forward * Lab: Design Study Review ASSET ANALYSIS * Asset Analysis Process * Types of Application-Related Assets * Adding Risk Escalators * Discovery and Recon DESIGN REVIEW * Asset Inventory and Design * Assets, Dataflows, and Trust Boundaries * Risk Escalators in Designs * Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. COURSE INTRODUCTION * Introductions and course logistics * Course objectives DAY 0 OPERATIONS: VMWARE TELCO CLOUD INFRASTRUCTURE INSTALLATION * Describe the challenges of the telco cloud * Describe the key functions of the telco cloud * List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure * Describe the VMware Telco Cloud Infrastructure architecture * Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture * List the VMware Telco Cloud Infrastructure deployment options * Describe the VMware Cloud Director architecture * List the key VMware components that are part of VMware Cloud Director * Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure DAY 0 OPERATIONS: ETSI NFV REQUIREMENTS FOR CLOUD PLATFORMS * Compare physical and virtual infrastructures * List the benefits and challenges of physical infrastructure * Describe the types of virtual infrastructure * Describe the advantages and components of the NFV infrastructure (NFVI) * Explain the role of network virtualization in the NFVI * List the requirements of NFVI for VMware Cloud Director * Describe the networking options of VMware Cloud Director * Describe the key networking use cases * Describe requirements of VMware Telco Cloud Automation? for networking * Describe the storage options of VMware Cloud Director * Describe the key storage use cases DAY 1 OPERATIONS: VIRTUALIZED INFRASTRUCTURE MANAGER (VIM) CONFIGURATION * Explain basic concepts related to VMware Cloud Director * Describe the components of the VMware Cloud Director architecture * Describe the basic configuration of the VMware Cloud Director architecture * Describe virtual data centers or VDCs * Explain the role of organization VDCs * Describe the relationship between provider VDCs and organization VDCs * Describe resources in VMware Cloud Director * List the key resource organization * Create resource pools * Describe how vSAN integrates with VMware Cloud Director DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR PROVIDERS * Describe how compute resources are provided to VMware Cloud Director * Describe how storage resources are provided to VMware Cloud Director * Describe provider VDC requirements and best practices * List the requirements of creating VDCs * Describe the VNF on-boarding process * Create provider VDCs DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR ORGANIZATIONS * Describe VMware Cloud Director organizations * Create VMware Cloud Director organizations * Navigate through the VMware Cloud Director HTML5 provider portal * Describe the VMware Cloud Director organization VDC * Navigate through the tenant portal * List use cases for a VMware Cloud Director organization VDC * List the organization VDC allocation models * Describe the types of resources that can be allocated * Describe how resources are allocated for an organization * Examine the function and requirements of network pools * Describe the network types available in VMware Cloud Director (external, organization, and vApp) * Create and manage organization VDC networks * Describe catalogs * Manage an organization?s catalog * Populate, share, and publish catalogs * Describe vApps * Manage access to vApps and catalogs * Modify the configuration of vApps and their virtual machines (VMs) * Manage organization VDC networking * Create affinity and anti-affinity rules DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR SECURITY * Describe role-based access * Create custom security roles * Describe the directory services in VMware Cloud Director * Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director * Explain the use of VMware Cloud Director with SSO DAY 1 OPERATIONS: CONFIGURING VMWARE CLOUD DIRECTOR NETWORKING * List networking options in VMware Cloud Director * Describe key networking use cases in VMware Cloud Director * Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director * Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director * Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall * Describe an overview of VMware NSX-T? Data Center * Explain the architecture of NSX-T Data Center * Describe VMware Cloud Director supported features of NSX-T Data Center * Describe the benefits and challenges of multisite networking * List the requirements for multisite networking * Describe the benefits and challenges of networking between VDCs * List the requirements for networking between VDCs * Configure cross-VDC networking DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR RESOURCE MANAGEMENT AND MONITORING * Identify the key resources that need to be managed with VMware Cloud Director * List monitoring options with VMware Cloud Director * Explain the resource management and monitoring architecture in VMware Cloud Director * Monitor objects from the VMware Cloud Director portal * Identify features of VMware vRealize© Operations Manager? * Integrate VMware Cloud Director with vRealize Operations Manager * Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? * Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director * Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director * Integrate VMware Cloud Director with the Tenant App * Configure the Tenant App for VMware Cloud Director * Monitor objects with the Tenant App * List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager * List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? * List the steps to review historical virtual machine metrics in VMware Cloud Director * Examine VMware Cloud Director logs DAY 2 OPERATIONS: VMWARE CLOUD DIRECTOR TROUBLESHOOTING * Identify the features of the VMware Telco Cloud Automation dashboards * List the components of the VMware Telco Cloud Automation dashboards * Explain the features of fault management in VMware Telco Cloud Director * Describe the use of fault management in VMware Cloud Director * Describe the use of performance management in VMware Cloud Director * Describe the use of logs in VMware Cloud Director * Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CLOUD FOUNDATION OVERVIEW * Describe the VMware Cloud Foundation solution * Describe VMware Cloud Foundation architecture * Identify VMware Cloud Foundation components * Describe the VMware Cloud Foundation topology VMWARE CLOUD FOUNDATION+ AND VMWARE CLOUD CONNECTIVITY * Describe the VMware Cloud Foundation+ architecture * Identify the pre-requisites for VMware Cloud Foundation+ * Describe VMware Cloud Foundation+ value added features * Configure subscription-based licensing parameters * Describe the vCenter Cloud Gateway functionality * Identify the vCenter Cloud Gateway components * Describe the vCenter Cloud Gateway architecture * Connect the vCenter Cloud Gateway to VMware Cloud * Describe the VMware Cloud platform * Describe the VMware vSphere+ services used in VMware Cloud Foundation+ * Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ DAY ZERO TASKS * Identify the requirements for deploying VMware Cloud Foundation * Describe the VMware Cloud Foundation bring-up process * Identify the information required for the Planning and Preparation Workbook * Complete the Deployment Parameter Workbook * Describe how VMware Cloud Builder automates the deployment process * Identify the configuration validation process performed by VMware Cloud Builder * Describe the deployment of the management domain POST-DEPLOYMENT OPERATIONS * Complete the Onboarding Wizard * Understand VMware Cloud Foundation integration with VMware Single Sign-On * Configure user access to VMware Cloud Foundation * Describe the importance of user roles in vSphere * Configure identity sources for VMware Cloud Foundation * Perform the SDDC Manager backup and restore process * Identify steps in the NSX backup and restore process * Manage passwords in VMware Cloud Foundation * Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components * Manage and secure a primary password list * Describe the process for rotating passwords not managed by VMware Cloud Foundation VMWARE CLOUD FOUNDATION NETWORKING WITH NSX * Describe network virtualization with NSX * Recognize NSX operational planes * Identify NSX components * Describe logical switching * Describe NSX Data Center deployment in VMware Cloud Foundation * Explain how logical routing works in NSX * Identify NSX Edge functions * Describe data plane preparation for NSX Edge nodes in a workload domain * Recognize Tier-0 and Tier-1 gateway topologies * Define application virtual networks * Describe management domain rack options * List NSX Edge cluster requirements for vSphere with Tanzu * Discuss NSX Edge cluster placement considerations MANAGING WORKLOAD DOMAINS * Define workload domains * List the types of workload domains * Identify workload domain prerequisites * Understand the scalability limits for workload domains * Identify use cases for multiple clusters in a workload domain * Create network pools * Size network pools * Commission hosts with SDDC Manager * Create workload domains * Scale workload domains * Decommission hosts from a workload domain * Remove workload domains * Describe distinctive design decisions for VMware Cloud Foundation components VSPHERE WITH TANZU IN VMWARE CLOUD FOUNDATION * Explain vSphere with Tanzu * Define the role of the Spherelet * Describe the supervisor cluster control plane * Create vSphere with Tanzu namespaces * Describe the role of NSX networking components in vSphere with Tanzu * Discuss vSphere with Tanzu networking topology * Describe control plane VM management networking requirements * Plan appropriate IP address ranges for pod, ingress, and egress networking * Describe prerequisites for vSphere with Tanzu cluster compatibility * Deploy vSphere with Kubernetes * Create a vSphere namespace * Configure limits and permissions for a vSphere namespace VMWARE CLOUD FOUNDATION STORAGE MANAGEMENT * Identify storage use cases in VMware Cloud Foundation * Determine the most appropriate storage option for a workload domain * Describe different vSphere-native storage design options * Identify vSAN architecture and components * Describe vSAN requirements for the management and workload domains * Configure deduplication and compression * Discuss how to scale vSAN clusters in VMware Cloud Foundation * Configure storage policies for vSAN * Explain storage policy failure tolerance rules * Identify a virtual machine storage policy compliance status * Explain how vSAN storage policies protect VMware Cloud Foundation components AVAILABILITY AND BUSINESS CONTINUITY * Explain the importance of external service availability * Describe availability options native to VMware vSphere * Identify stretched cluster use cases * Identify stretched cluster components * Recognize stretched cluster requirements in VMware Cloud Foundation * Prepare and deploy a vSAN stretched cluster using APIs VMWARE CLOUD FOUNDATION CERTIFICATE MANAGEMENT * Learn the basics of public key infrastructure (PKI) * Describe the purpose of certificate signing requests (CSRs) * Describe available options in SDDC Manager for certificate authorities * View certificates for VMware Cloud Foundation components * Install and replace certificates for VMware Cloud Foundation components * Configure the integrated Certificate Authorities in SDDC Manager * Configure a certificate template in Microsoft Certificate Authority server * Configure the OpenSSL certificate authority in SDDC Manager * Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMWARE CLOUD FOUNDATION LIFECYCLE MANAGEMENT * Describe VMware Cloud Foundation Life Cycle Management * List the products managed by VMware Cloud Foundation Lifecycle management * Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management * Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation * Understand vSphere Lifecycle Manager features * Understand how and when to use cluster images * Describe the importance of Hardware Support Managers * Describe the upgrade prerequisites * Outline the upgrade precheck process * Describe the order of upgrade for VMware Cloud Foundation components VMWARE CLOUD FOUNDATION TROUBLESHOOTING * Use the SoS command-line tool to create log bundles, perform health checks, and check password validity * List VMware Cloud Foundation services * Identify VMware Cloud Foundation log files * Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Workspace ONE: Deploy and Manage [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. COURSE INTRODUCTION * Introductions and course logistics * Course objectives PLATFORM ARCHITECTURE * Summarize the features and functionality of Workspace ONE UEM * Outline the benefits of leveraging Workspace ONE UEM * Recognize the core and productivity components that make up the Workspace ONE UEM platform * Summarize high availability and disaster recovery for the Workspace ONE solution ADMINISTRATION * Navigate and customize the Workspace ONE UEM console * Summarize the hierarchical management structure * Explain the features and functions of Workspace ONE Hub Services * Outline account options and permissions ENTERPRISE INTEGRATIONS * Outline the process of integrating with directory services * Explain certificate authentication and practical implementation with Workspace ONE * Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console * Describe VMware Dynamic Environment Manager and its architecture ONBOARDING * Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management * Outline the steps for setting up autodiscovery in the Workspace ONE UEM console * Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app * Summarize the platform onboarding options MANAGING ENDPOINTS * Explain the differences between device and user profiles * Describe policy management options for Windows and macOS * Describe the functions and benefits of using compliance policies * Explain the use case for Freestyle Orchestrator * Describe the capabilities that sensors and scripts enable. ALTERNATIVE MANAGEMENT METHODS * Describe the function and benefits of device staging * Configure product provisioning in the Workspace ONE UEM console * Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices * List the system and device requirements for Linux device management in Workspace ONE UEM APPLICATIONS * Describe the features, benefits, and capabilities of application management in Workspace ONE UEM * Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console * Describe the benefits of using Apple Business Manager content integration * Describe the benefits of using server-to-client software distribution * List the functions and benefits of VMware Workspace ONE© SDK DEVICE EMAIL * List the email clients supported by Workspace ONE UEM * Configure an Exchange Active Sync profile in the Workspace ONE UEM console * Configure VMware Workspace ONE© Boxer settings * Summarize the available email infrastructure integration models and describe their workflows * Configure email compliance policies and notifications services CONTENT SHARING * Describe the benefits of using Content Gateway * Describe the Content Gateway workflows * Describe the benefits of integrating content repositories with Workspace ONE UEM * Configure a repository in the Workspace ONE UEM console MAINTENANCE * Manage endpoints from the Device List view and the Details view. * Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. WORKSPACE ONE ACCESS * Summarize the benefits of Workspace ONE Access * Outline the core features and functions enabled by Workspace ONE Access * Navigate the Workspace ONE Access console * Explain the functions of directory integration with Workspace ONE Access * Explain the various types of authentication protocols enabled by Workspace ONE Access INTEGRATING WORKSPACE ONE UEM AND WORKSPACE ONE ACCESS * Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access * Outline the process of connecting Workspace ONE UEM and Workspace ONE Access * Examine the workflow of integrations * Summarize the key features of an integrated solution PRODUCTIVITY INTEGRATIONS * Identify the functions enabled by VMware Unified Access Gateway? * Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service * Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service * Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 AUTHENTICATION * Outline the authentication methods supported by Workspace ONE Access * Summarize the main properties of the SAML protocol * Summarize the SAML authentication workflow * Explain the application SSO authentication workflow with SAML MOBILE SINGLE SIGN-ON * Describe the concept of mobile SSO * Outline the mobile SSO workflows INTELLIGENCE AND AUTOMATION * Summarize the features of Workspace ONE© Intelligence? * Outline the benefits of using Workspace ONE Intelligence ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Workspace ONE: Deploy and Manage [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools * Searching in the Configuration Manager console * Using Windows PowerShell with Configuration Manager * Using Configuration Manager Service Manager to manage components * Monitoring site and component status * Reviewing log files by using the Configuration Manager Trace tool * Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. * Describe the Configuration Manager architecture. * Describe the management tools that you use to perform administrative functions for Configuration Manager. * Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. ANALYZING DATA USING QUERIES AND REPORTS * Introduction to queries * Configuring Microsoft SQL Server Reporting Services (SSRS) * Lab : Creating and running queriesConfiguring boundaries and resource discovery * Creating data queries * Creating subselect queries * Creating status message queries * Lab : Configuring SSRS * Configuring a reporting services point * Creating a report by using Report Builder * Create and configure data and status message queries. * Configure and manage SSRS and the reporting services point. PREPARING THE MANAGEMENT INFRASTRUCTURE TO SUPPORT PCS AND MOBILE DEVICES * Configuring site boundaries and boundary groups * Configuring resource discovery * Configuring the Exchange Server Connector for mobile device management * Configuring user and device collections * Lab : Configuring boundaries and resource discovery * Configuring boundaries, boundary groups, and fallback relationships * Configuring Active Directory discovery methods * Lab : Configuring user and device collections * Creating a device collection * Creating a user collection * Configuring a maintenance window * Configure boundaries and boundary groups. * Configure resource discovery. * Configure the Exchange Server connector mobile device management. * Organize resources using device and user collections. DEPLOYING AND MANAGING CLIENTS * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings in Configuration Manager * Lab : Deploying the Microsoft System Center Configuration Manager client software * Preparing the site for client installation * Deploying the Configuration Manager client software by using client push installation * Lab : Configuring and monitoring client status * Configuring and monitoring client health status * Lab : Managing client settings * Configuring client settings * Describe the requirements and considerations for installing the Configuration Manager client software. * Deploy the Configuration Manager client software. * Configure and monitor client status. * Manage Configuration Manager client settings. MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Configuring and managing hardware inventory * Lab : Configuring software metering * Configuring software metering * Lab : Configuring and managing Asset Intelligence * Preparing the site for Asset Intelligence * Configuring Asset Intelligence * Monitoring license agreements by using Asset Intelligence * Viewing Asset Intelligence reports * Describe inventory collection. * Configure and collect hardware and software inventory. * Manage inventory collection. * Configure software metering. * Configure Asset Intelligence. DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments * Installing a new distribution point * Managing content distribution * Prepare the infrastructure for content management. * Distribute and manage content on distribution points. DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Installing and configuring the Application Catalog roles * Creating applications with requirements * Deploying applications * Lab : Managing application supersedence and removal * Managing application supersedence * Uninstalling the Excel Viewer application * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Configuring support for App-V * Deploying virtual applications * Lab : Using Configuration Manager to deploy Windows Store apps * Configuring support for sideloading Windows Store apps * Configuring a Windows Store app * Deploying Windows 10 apps to users * Describe the application management features of Configuration Manager. * Create applications. * Deploy applications. * Manage applications. * Configure and deploy virtual applications. * Configure and deploy Windows Store apps. MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Lab : Configuring the site for software updates * Configuring and synchronizing the software update point * Lab : Deploying and managing software updates * Determining software update compliance * Deploying software updates to clients * Configuring automatic deployment rules * Describe how the software updates feature integrates with Configuration Manager. * Prepare the Configuration Manager site for software updates. * Manage the evaluation and deployment of software updates. * Configure automatic deployment rules. * Monitor and troubleshoot software updates. IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Lab : Implementing Microsoft System Center Endpoint Protection * Configuring the System Center Endpoint Protection point and client settings * Configuring and deploying Endpoint Protection policies * Monitoring Endpoint Protection * Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. * Configure, deploy, and manage Endpoint Protection policies. MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry