• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

324 ALERT courses

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA OUTLINE * Configure the Security Management Server. * Use the WebUI to run the First Time Wizard. * Install the Smart Console. * Install the Alpha Gateway using the network detailed in the course topology. * Demonstrate how the Security Management Server and Gateway communicate. * Test SIC Status. * Create multiple administrators and apply different roles and permissions for simultaneous administration. * Validate existing licenses for products installed on the network. * Create and configure host, network and group objects. * Create a simplified Security Policy. * Demonstrate how to use Security Zones in policy. * Demonstrate how to share a layer between Security Polices. * Configure Network Address Translation for server and network objects. * Enable Identity Awareness. * Deploy user access roles for more granular control of the security Policy. * Generate network Traffic and use traffic visibility tools to monitor the data. * Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE OUTLINE * Prepare for a Security Management Server Upgrade * Upgrade the Security Management Server * Deploy a Secondary Security Management Server * Configure a Distributed Log Server * Upgrade a Security Gateway from SmartConsole * Work with the Command Line * Use Scripts and SmartTasks * Configure Dynamic Objects * Monitor Traffic * Verify Policy Installation and Status * Work with Gaia and Management APIs * Work with Acceleration Features * Configure a Locally Managed Site to Site VPN * Configure a Site to Site VPN with an Interoperable Device * Configure Remote Access VPN * Configure Mobile Access VPN * Configure a High Availability Cluster * Work with ClusterXL * Configure Policy Compliance * Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. OVERVIEW OF ENDPOINT LIFECYCLE MANAGEMENT * Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview IMPLEMENTATION ASSESSMENT * ELM Requirements Gathering Solution Analysis of ELM Requirements IMPLEMENTATION DESIGN * GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration INSTALLATION AND CONFIGURATION OF THE ELM SOLUTION * Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment ENDPOINT IDENTIFICATION & GATHERING * IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements ENDPOINT CONFIGURATION STANDARDS * Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards ENDPOINT PROVISIONING * Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology ENDPOINT DEPLOYMENT & STAGING * Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images SOFTWARE DISTRIBUTION * Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks IMAGE AND BUILD MAINTENANCE * Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs MANAGING SOFTWARE UPGRADES * Software Upgrade Process Overview Distribution of Software Updates SUPPORTING THE BUSINESS * Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management HARDWARE REFRESH & MIGRATION * Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process ENDPOINT RETIREMENT/DISPOSAL * Ensuring Compliant Disposal Methods and Procedures END TO END ENDPOINT LIFECYCLE USE CASE * Endpoint Management Lifecycle Use Case for GSS ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. EXPLORING CISCO TETRATION * Data Center Challenges * Define and Position Cisco Tetration * Cisco Tetration Features * Cisco Tetration Architecture * Cisco Tetration Deployment Models * Cisco Tetration GUI Overview IMPLEMENTING AND OPERATING CISCO TETRATION * Explore Data Collection * Install the Software Agent * Install the Hardware Agent * Import Context Data * Describe Cisco Tetration Operational Concepts EXAMINING CISCO TETRATION ADM AND APPLICATION INSIGHT * Describe Cisco Tetration Application Insight * Perform ADM * Interpret ADM Results Application Visibility EXAMINING CISCO TETRATION INTENT-BASED NETWORKING * Describe Intent-Based Policy * Examine Policy Features * Implement Policies ENFORCING TETRATION POLICY PIPELINE AND COMPLIANCE * Examine Policy Enforcement * Implement Application Policy * Examine Policy Compliance Verification and Simulation EXAMINING TETRATION SECURITY USE CASES * Examine Workload Security * Attack Prevention * Attack Detection * Attack Remediation EXAMINING IT OPERATIONS USE CASES * Key Features and IT Operations Use Cases * Performing Operations in Neighborhood App-based Use Cases EXAMINING PLATFORM ENHANCEMENT USE CASES * Integrations and Advanced Features * Third-party Integration Examples * Explore Data Platform Capabilities EXPLORING CISCO TETRATION ANALYTICS ADMINISTRATION * Examine User Authentication and Authorization * Examine Cluster Management * Configure Alerts and Syslog ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cloud Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager Overview After completion of this course you will be able to describe: Cloud architecture and design Security within the cloud Automation and virtualization Troubleshooting and Disaster recovery High availability  This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution. UNDERSTANDING CLOUD CONCEPTS * Topic 1A: Recognize Cloud Concepts * Topic 1B: Recognize Cloud Terms * Topic 1C: Understand the Troubleshooting Methodology * * PLANNING AND DESIGNING A CLOUD ENVIRONMENT * Topic 2A: Meet Cloud Business Requirements * Topic 2B: Design Capacity Planning and Requirements ADMINISTERING CLOUD RESOURCES * Topic 3A: Manage Cloud Administration * Topic 3B: Manage Compute Resources in the Cloud * Topic 3C: Manage Memory Resources MANAGING CLOUD STORAGE * Topic 4A: Understand Cloud Storage Types * Topic 4B: Configure Cloud Storage Solutions * Topic 4C: Configure Cloud Storage Protocols and RAID MANAGING NETWORKS IN THE CLOUD * Topic 5A: Deploying Cloud Network Services * Topic 5B: Identify Cloud Network Infrastructure Components * SECURING AND TROUBLESHOOTING NETWORKS IN THE CLOUD * Topic 6A: Secure a Network in a Cloud Environment * Topic 6B: Troubleshooting Cloud Connectivity MANAGING CLOUD MIGRATIONS AND TROUBLESHOOTING CLOUD DEPLOYMENTS * Topic 7A: Manage Cloud Migrations * Topic 7B: Troubleshoot Cloud Deployment and Migration Issues MANAGING CLOUD AUTOMATION AND ORCHESTRATION * Topic 8A: Understand Cloud Automation and Orchestration Techniques * Topic 8B: Troubleshoot Automation and Orchestration in the Cloud UNDERSTANDING CLOUD SECURITY CONCEPTS * Topic 9A: Administer Identity and Access Management in the Cloud * Topic 9B: Manage Cloud Operating System and * Application Security * Topic 9C: Manage Data Security and Compliance in the Cloud MANAGING CLOUD SECURITY * Topic 10A: Implement Security Measures in the Cloud Domain * Topic 10B: Troubleshoot Cloud Security MANAGING CLOUD PERFORMANCE * Topic 11A: Operate Efficiently in the Cloud * Topic 11B: Accomplish Cloud Operations Tasks * Topic 11C: Optimize Cloud Resources * Topic 11D: Troubleshoot Common Cloud Performance Problems MANAGING MAINTENANCE IN THE CLOUD * Topic 12A: Configure Logs, Monitoring, and Alerting for Cloud Services * Topic 12B: Manage Backup and Restore in the Cloud IMPLEMENTING HIGH AVAILABILITY AND DISASTER RECOVERY IN THE CLOUD * Topic 13A: Understand High Availability and Scaling in the Cloud * Topic 13B: Manage Disaster Recovery in the Cloud * Topic 13C: Incident Response ADDITIONAL COURSE DETAILS: Nexus Humans Cloud Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Those new to Citrix or considering a move to Citrix Cloud Overview Gain foundational knowledge of Citrix Virtual Apps and Desktops 7Learn how to install, configure, and manage a Citrix Virtual Apps and Desktops 7 site and Cloud connectorsIdentify the considerations between Citrix Virtual Apps and Desktops on-premises and the Citrix Virtual Apps and Desktops ServiceDiscover how to deliver app and desktop resources This course will teach students how to deploy, install, configure, setup profile management, configure policies, printing and basic security features for on-premises Virtual Apps and Desktop solution building, and then migrating to Citrix Cloud.This course includes a voucher to take the related exam and earn your Citrix Certified Associate - Virtualization (CCA-V) certification. ARCHITECTURE OVERVIEW * Introduction to Citrix Virtual Apps and Desktops * Architecture Overview * Features * Hosting Platform Considerations * Citrix Virtual Apps and Desktops Service * Connection Flow Process Introduction DEPLOY THE SITE * Pre-Deployment Considerations * Citrix Licensing Setup * Delivery Controller Setup * Site Setup And Management * Redundancy Considerations THE APPS AND DESKTOPS IMAGES * Consider Master Image Creation Methods * Master Image Requirements PROVISION AND DELIVER APP AND DESKTOP RESOURCES * Machine Catalogs and Delivery Groups * Provisioning Methods and Considerations * Machine Creation Services (MCS) Deep Dive * MCS Environment Considerations * Resource Locations PROVIDE ACCESS TO APP AND DESKTOP RESOURCES * Consider Workspace Experience versus StoreFront Workspace Experience User Authentication * Workspace App * Communication Flow MANAGE THE USER EXPERIENCE * Methods to Manage the User Experience * Common User Experience Settings PUBLISHED APP AND DESKTOP PRESENTATION AND MANAGEMENT * Published App Properties * Server OS Published App Optimizations * Published App Presentation * Application Groups * Apps and Desktops Presentation MANAGE PRINTING FOR USER SESSIONS * Map Printers to the User Session * Printer Drivers * Print Environment Considerations CITRIX PROFILE MANAGEMENT * Introduction and Considerations * Configure Citrix Profile Management MANAGE THE SITE * Delegated Administration * Use PowerShell with Citrix Virtual Apps and Desktops * Power Management Considerations CITRIX VIRTUAL APPS AND DESKTOPS BASIC SECURITY CONSIDERATIONS * Citrix Admin Security Considerations * XML Service Security Considerations * Secure HDX External Traffic MONITOR THE SITE * Citrix Director Introduction * Monitor and Interact with User Sessions * Published Apps Analysis * Monitor the Machines Running the VDA * Site Specific Common Monitoring * Alerts and Notifications * Optimize Citrix Director Monitoring with Citrix ADM INTRODUCTION TO SUPPORTING AND TROUBLESHOOTING CITRIX VIRTUAL APPS AND DESKTOPS * Introduction to Supporting a Citrix Virtual Apps and Desktops Site * Tools * Proactive Administration Common Tasks MIGRATE TO CITRIX CLOUD * Migration Considerations * Citrix Cloud Connector Deployment * Citrix Virtual Apps and Desktops with an On-Premises Resource Location * The Migration Process CITRIX ANALYTICS * Citrix Analytics Introduction * Prepare to Use Citrix Analytics * Types of Analytics ADDITIONAL COURSE DETAILS: Nexus Humans CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and In Citrix Cloud
Delivered on-request, onlineDelivered Online
Price on Enquiry

Google Cloud Fundamentals for Azure Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Platform Developers, systems operations professionals, and solution architects getting started with Google Cloud Platform Executives and business decision makers evaluating the potential of Google Cloud Platform to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for Azure IaaS, Azure PaaS, Azure SQL, Azure Blob Storage, Azure Application Insights, and Azure Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing,storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This 1-day instructor led course introduces Azure professionals to the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database. It is designed for Azure system administrators, Solution Architects and SysOps Administrators familiar with Azure features and setup; and want to gain experience configuring Google Cloud products immediately. With presentations, demos, and hands-on labs, participants get details of similarities, differences, and initial how-tos quickly. INTRODUCING GOOGLE CLOUD * Explain the advantages of Google Cloud. * Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. * Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). * GETTING STARTED WITH GOOGLE CLOUD * Identify the purpose of projects on Google Cloud. * Understand how Azure's resource hierarchy differs from Google Cloud's * Understand the purpose of and use cases for Identity and Access Management. * Understand how Azure AD differs from Google Cloud IAM. * List the methods of interacting with Google Cloud. * Launch a solution using Cloud Marketplace. VIRTUAL MACHINES IN THE CLOUD * Identify the purpose and use cases for Google Compute Engine * Understand the basics of networking in Google Cloud. * Understand how Azure VPC differs from Google VPC. * Understand the similarities and differences between Azure VM and Google Compute Engine. * Understand how typical approaches to load-balancing in Google Cloud differ from those in Azure. * Deploy applications using Google Compute Engine STORAGE IN THE CLOUD * Understand the purpose of and use cases for: Cloud Storage, * Cloud SQL, Cloud Bigtable and Cloud Datastore. * Understand how Azure Blob compares to Cloud Storage. * Compare Google Cloud?s managed database services with Azure SQL. * Learn how to choose among the various storage options on Google Cloud. * Load data from Cloud Storage into BigQuery CONTAINERS IN THE CLOUD * Define the concept of a container and identify uses for containers. * Identify the purpose of and use cases for Google Container Engine and Kubernetes. * Understand how Azure Kubernetes Service differs from from Google Kubernetes Engine. * Provision a Kubernetes cluster using Kubernetes Engine. * Deploy and manage Docker containers using kubectl APPLICATIONS IN THE CLOUD * Understand the purpose of and use cases for Google App Engine. * Contrast the App Engine Standard environment with the App Engine Flexible environment. * Understand how App Engine differs from Azure App Service. * Understand the purpose of and use cases for Google Cloud Endpoints. * DEVELOPING, DEPLOYING AND MONITORING IN THE CLOUD * Understand options for software developers to host their source code. * Understand the purpose of template-based creation and management of resources. * Understand how Google Cloud Deployment Manager differs from Azure Resource Manager. * Understand the purpose of integrated monitoring, alerting, and debugging * Understand how Google Monitoring differs from Azure Application Insights and Azure Log Analytics. * Create a Deployment Manager deployment. * Update a Deployment Manager deployment. * View the load on a VM instance using Google Monitoring. BIG DATA AND MACHINE LEARNING IN THE CLOUD * Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. * Understand how Google Cloud BigQuery differs from Azure Data Lake. * Understand how Google Cloud Pub/Sub differs from Azure Event Hubs and Service Bus. * Understand how Google Cloud?s machine-learning APIs differ from Azure's. * Load data into BigQuery from Cloud Storage. * Perform queries using BigQuery to gain insight into data SUMMARY AND REVIEW * Review the products that make up Google Cloud and remember how to choose among them * Understand next steps for training and certification * Understand, at a high level, the process of migrating from Azure to Google Cloud.

Google Cloud Fundamentals for Azure Professionals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Site Reliability Engineering (SRE) Practitioner (DevOps Institute)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience for the SRE Practitioner course are professionals including: Anyone focused on large-scale service scalability and reliability Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will have learned: Practical view of how to successfully implement a flourishing SRE culture in your organization. The underlying principles of SRE and an understanding of what it is not in terms of anti-patterns, and how you become aware of them to avoid them. The organizational impact of introducing SRE. Acing the art of SLIs and SLOs in a distributed ecosystem and extending the usage of Error Budgets beyond the normal to innovate and avoid risks. Building security and resilience by design in a distributed, zero-trust environment. How do you implement full stack observability, distributed tracing and bring about an Observability-driven development culture? Curating data using AI to move from reactive to proactive and predictive incident management. Also, how you use DataOps to build clean data lineage. Why is Platform Engineering so important in building consistency and predictability of SRE culture? Implementing practical Chaos Engineering. Major incident response responsibilities for a SRE based on incident command framework, and examples of anatomy of unmanaged incidents. Perspective of why SRE can be considered as the purest implementation of DevOps SRE Execution model Understanding the SRE role and understanding why reliability is everyone's problem. SRE success story learnings This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability. SRE ANTI-PATTERNS * Rebranding Ops or DevOps or Dev as SRE * Users notice an issue before you do * Measuring until my Edge * False positives are worse than no alerts * Configuration management trap for snowflakes * The Dogpile: Mob incident response * Point fixing * Production Readiness Gatekeeper * Fail-Safe really? SLO IS A PROXY FOR CUSTOMER HAPPINESS * Define SLIs that meaningfully measure the reliability of a service from a user?s perspective * Defining System boundaries in a distributed ecosystem for defining correct SLIs * Use error budgets to help your team have better discussions and make better data-driven decisions * Overall, Reliability is only as good as the weakest link on your service graph * Error thresholds when 3rd party services are used BUILDING SECURE AND RELIABLE SYSTEMS * SRE and their role in Building Secure and Reliable systems * Design for Changing Architecture * Fault tolerant Design * Design for Security * Design for Resiliency * Design for Scalability * Design for Performance * Design for Reliability * Ensuring Data Security and Privacy FULL-STACK OBSERVABILITY * Modern Apps are Complex & Unpredictable * Slow is the new down * Pillars of Observability * Implementing Synthetic and End user monitoring * Observability driven development * Distributed Tracing * What happens to Monitoring? * Instrumenting using Libraries an Agents PLATFORM ENGINEERING AND AIOPS * Taking a Platform Centric View solves Organizational scalability challenges such as fragmentation, inconsistency and unpredictability. * How do you use AIOps to improve Resiliency * How can DataOps help you in the journey * A simple recipe to implement AIOps * Indicative measurement of AIOps SRE & INCIDENT RESPONSE MANAGEMENT * SRE Key Responsibilities towards incident response * DevOps & SRE and ITIL * OODA and SRE Incident Response * Closed Loop Remediation and the Advantages * Swarming ? Food for Thought * AI/ML for better incident management CHAOS ENGINEERING * Navigating Complexity * Chaos Engineering Defined * Quick Facts about Chaos Engineering * Chaos Monkey Origin Story * Who is adopting Chaos Engineering * Myths of Chaos * Chaos Engineering Experiments * GameDay Exercises * Security Chaos Engineering * Chaos Engineering Resources SRE IS THE PUREST FORM OF DEVOPS * Key Principles of SRE * SREs help increase Reliability across the product spectrum * Metrics for Success * Selection of Target areas * SRE Execution Model * Culture and Behavioral Skills are key * SRE Case study POST-CLASS ASSIGNMENTS/EXERCISES * Non-abstract Large Scale Design (after Day 1) * Engineering Instrumentation- Instrumenting Gremlin (after Day 2)

Site Reliability Engineering (SRE) Practitioner (DevOps Institute)
Delivered on-request, onlineDelivered Online
Price on Enquiry

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support INTRODUCTION * The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. MANAGING THE NUTANIX CLUSTER * In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. SECURING THE NUTANIX CLUSTER * This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. ACROPOLILS NETWORKING * This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM MANAGEMENT * This section shows you how to upload images, and how to create and manage virtual machines. HEALTH MONITORING AND ALERTS * In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. DISTRIBUTED STORAGE FABRIC * This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV WORKLOAD MIGRATION * Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. FILE AND VOLUMES * This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. UNDERSTANDING INFRASTRUCTURE RESILIENCY * This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. DATA PROTECTION * Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. PRISM CENTRAL * Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. MONITORING THE NUTANIX CLUSTER * This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. CLUSTER MANAGEMENT AND EXPANSION * This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. REMOTE OFFICE BRANCH OFFICE (ROBO) DEPLOYMENTS * In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. ADDITIONAL COURSE DETAILS: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. INTRODUCTION TO SYMANTEC DATA LOSS PREVENTION * Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture NAVIGATION AND REPORTING * Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. INCIDENT REMEDIATION AND WORKFLOW * Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences POLICY MANAGEMENT * Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies RESPONSE RULE MANAGEMENT * Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules DESCRIBED CONTENT MATCHING * DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents EXACT DATA MATCHING AND DIRECTORY GROUP MATCHING * Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident INDEXED DOCUMENT MATCHING * Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents VECTOR MACHINE LEARNING * Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy NETWORK MONITOR * Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters NETWORK PREVENT * Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents MOBILE EMAIL MONITOR AND MOBILE PREVENT * Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting NETWORK DISCOVER AND NETWORK PROTECT * Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining ENDPOINT PREVENT * Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents ENDPOINT DISCOVER * Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents ENTERPRISE ENABLEMENT * Preparing for risk reduction Risk reduction DLP Maturity model SYSTEM ADMINISTRATION * Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Google Cloud Fundamentals for AWS Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for AWS IaaS, AWS PaaS, AWS SQL, AWS Blob Storage, AWS Application Insights, and AWS Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing, storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This course with labs introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup and want to gain experience configuring GCP products immediately. With presentations, demos, and hands-on labs, participants will get details of similarities, differences, and initial how-tos quickly. INTRODUCING GOOGLE CLOUD * Explain the advantages of Google Cloud. * Define the components of Google's network infrastructure,including: Points of presence, data centers, regions, and zones. * Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) GETTING STARTED WITH GOOGLE CLOUD * Identify the purpose of projects on Google Cloud Platform. * Understand how AWS?s resource hierarchy differs from Google Cloud?s. * Understand the purpose of and use cases for Identity and Access Management. * Understand how AWS IAM differs from Google Cloud IAM. * List the methods of interacting with Google Cloud Platform. * Launch a solution using Cloud Marketplace. VIRTUAL MACHINES IN THE CLOUD * Identify the purpose and use cases for Google Compute Engine. * Understand the basics of networking in Google Cloud Platform. * Understand how Amazon VPC differs from Google VPC. * Understand the similarities and differences between Amazon EC2 and Google Compute Engine. * Understand how typical approaches to load-balancing in Google Cloud differ from those in AWS. * Deploy applications using Google Compute Engine. STORAGE IN THE CLOUD * Understand the purpose of and use cases for: Cloud Storage,Cloud SQL, Cloud Bigtable and Cloud Datastore. * Understand how Amazon S3 and Amazon Glacier compare to Cloud Storage. * Compare Google Cloud?s managed database services with Amazon RDS and Amazon Aurora. * Learn how to choose among the various storage options on Google Cloud Platform. * Load data from Cloud Storage into BigQuery. Perform a query on the data in BigQuery. * CONTAINERS IN THE CLOUD * Define the concept of a container and identify uses for containers. * Identify the purpose of and use cases for Google Container Engine and Kubernetes. * Understand how Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS) differ from GKE. * Provision a Kubernetes cluster using Kubernetes Engine. * Deploy and manage Docker containers using kubectl APPLICATIONS IN THE CLOUD * Understand the purpose of and use cases for Google App Engine. * Contrast the App Engine Standard environment with the App Engine Flexible environment. * Understand how App Engine differs from Amazon Elastic Beanstalk. * Understand the purpose of and use cases for Google Cloud Endpoints. * DEVELOPING, DEPLOYING AND MONITORING IN THE CLOUD * Understand options for software developers to host their source code. * Understand the purpose of template-based creation and management of resources. * Understand how Cloud Deployment Manager differs from AWS CloudFormation. * Understand the purpose of integrated monitoring, alerting, and debugging. * Understand how Google Monitoring differs from Amazon CloudWatch and AWS CloudTrail. * Create a Deployment Manager deployment. * Update a Deployment Manager deployment. * View the load on a VM instance using Google Monitoring. BIG DATA AND MACHINE LEARNING IN THE CLOUD * Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. * Understand how Google Cloud BigQuery differs from AWS Data Lake. * Understand how Google Cloud Pub/Sub differs from AWS Event Hubs and Service Bus. * Understand how Google Cloud?s machine-learning APIs differ from AWS's. * Load data into BigQuery from Cloud Storage. * Perform queries using BigQuery to gain insight into data. SUMMARY AND REVIEW * Review the products that make up Google Cloud and remember how to choose among them * Understand next steps for training and certification * Understand, at a high level, the process of migrating from AWS to Google Cloud. ADDITIONAL COURSE DETAILS: Nexus Humans Google Cloud Fundamentals for AWS Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Fundamentals for AWS Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Fundamentals for AWS Professionals
Delivered on-request, onlineDelivered Online
Price on Enquiry