• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

119 Business Continuity Management courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CompTIA Security+ (SY0-601)

By Apex Learning

OVERVIEW This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. REQUIREMENTS Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand
£12

CompTIA Advanced Security Practitioner (CASP) Online Training Diploma

By Alpha Academy

This CompTIA Advanced Security Practitioner (CASP) Online Training Diploma establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. COURSE HIGHLIGHTS * The price is for the whole course including final exam - no hidden fees * Accredited Certificate upon successful completion * Efficient exam system with instant results * Track progress within own personal learning portal * 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Advanced Security Practitioner (CASP) Online Training Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. ASSESSMENT AND CERTIFICATION At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. CAREER PATH Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £50,700. The sky really is the limit. COURSE CURRICULUM The Enterprise Security Architecture The Basics of Enterprise Security 01:00:00 Secure the Design of the Enterprise Infrastructure 00:10:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:21:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 Secure the Design of the Enterprise Infrastructure 00:10:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 Advanced Security Course 10 Topic D DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Mock Exam Final Exam

CompTIA Advanced Security Practitioner (CASP) Online Training Diploma
Delivered Online On Demand
£10.99

CompTIA Advanced Security Practitioner (CASP) Online Training Diploma

By Alpha Academy

This CompTIA Advanced Security Practitioner (CASP) Online Training Diploma establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. COURSE HIGHLIGHTS * The price is for the whole course including final exam - no hidden fees * Accredited Certificate upon successful completion * Efficient exam system with instant results * Track progress within own personal learning portal * 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Advanced Security Practitioner (CASP) Online Training Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. ASSESSMENT AND CERTIFICATION At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. CAREER PATH Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £50,700. The sky really is the limit. COURSE CURRICULUM The Enterprise Security Architecture The Basics of Enterprise Security 01:00:00 Secure the Design of the Enterprise Infrastructure 00:10:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:21:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 Secure the Design of the Enterprise Infrastructure 00:10:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 Advanced Security Course 10 Topic D DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Mock Exam Final Exam

CompTIA Advanced Security Practitioner (CASP) Online Training Diploma
Delivered Online On Demand
£10.99

Purchasing, Procurement and Inventory Management

By Course Gate

Gain essential skills in purchasing, procurement, and inventory management with our comprehensive course. Perfect for professionals and students alike, this course covers supply chain basics, procurement strategies, and inventory control techniques to enhance your career prospects in the competitive job market.

Purchasing, Procurement and Inventory Management
Delivered Online On Demand
£11.99

Project Management Basics for Gen Z

By Empower UK Employment Training

Embark on a comprehensive journey through the intricacies of Project Management. From PMBOK guidelines to effective planning, quality control, and risk management, this course offers the tools and insights needed to excel in managing complex projects in any industry.

Project Management Basics for Gen Z
Delivered Online On Demand
£12

Strategies for Success in a Hybrid Workplace

By Enspark

Explore effective strategies for thriving in the evolving landscape of hybrid workplaces. As organizations embrace the combination of remote work and in-person office presence, gain insights into the advantages of this model for both employees and employers. Discover how flexibility, increased talent acquisition, enhanced productivity, reduced expenses, and improved business continuity contribute to the sustainability and success of hybrid workplaces. Learn key practices, from creating dedicated workspaces and maintaining routines to setting goals, engaging proactively, prioritizing communication, and embracing technology, that empower individuals to excel in this dynamic work environment. LEARNING OBJECTIVES Construct a dedicated and productive remote workspace, considering factors such as comfort, organization, and freedom from distractions, to enhance focus and work-life balance.;Develop effective time management skills and routines, including setting clear boundaries, prioritizing tasks, and scheduling breaks, to optimize productivity and prevent burnout in a hybrid work setting.;Enhance your communication and collaboration skills with the steps to accurately engage in virtual meetings, share ideas, and foster effective teamwork, ensuring successful interactions in the hybrid workspace.

Strategies for Success in a Hybrid Workplace
Delivered Online On Demand
£4.95

Juniper Networks Design Fundamentals (JNDF)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas ƒ?? data center, security, and WAN. COURSE INTRODUCTION NETWORK DESIGN FUNDAMENTALS * A Need for Design * Knowledge is King * A Proposed Design Methodology * A Reference Network UNDERSTANDING CUSTOMER REQUIREMENTS * RFP Requirements * Scoping the Design Project * Analyzing the Data * Lab: Understanding Customer Requirements ORGANIZING THE DATA * Processing the Data and Requests * Understanding Boundaries and Scope * Design Proposal Considerations SECURING THE NETWORK * Why Secure the Network? * Security Design Considerations CREATING THE DESIGN CAMPUS * The Campus Network: An Overview * Best Practices and Considerations * Architectural Design Options * Lab: Creating the Design Campus CREATING THE DESIGN WIDE AREA NETWORK * The WAN: An Overview * Best Practices and Considerations * WAN Design Examples * Lab: Creating the Design WAN CREATING THE DESIGN DATA CENTER * The Data Center: An Overview * Best Practices and Considerations * Data Center Design Examples * Lab: Creating the Design Data Center BUSINESS CONTINUITY & NETWORK ENHANCEMENTS * Business Continuity Planning * High Availability Design Considerations and Best Practices * Offerings and Solutions * CoS and Traffic Engineering Considerations * Environmental Design NETWORK MANAGEMENT * Designing for Network Management AUTOMATION * Designing for Network Automation * Lab: Enhancing the Design PUTTING NETWORK DESIGN INTO PRACTICE * Network Design Recap * Responding to the RFP * Final Lab Introduction * Lab: Putting Network Design into Practice

Juniper Networks Design Fundamentals (JNDF)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Nutanix Advanced Administration and Performance Management V5.5

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Primary audience: IT administrators, architects, and business leaders who already manage Nutanix clusters in the datacenter, but who would like more in-depth knowledge of Nutanix datacenter administration. Anyone seeking preparation for the Nutanix Platform Professional (NPP) Advanced certification (in development).Secondary audience: Managers and technical staff seeking more detailed information before making a purchase decision. Overview Protect intellectual property and company data to guarantee business continuity with a complete, advanced data protection strategy.Practice advanced datacenter management procedures using hands on labs.Get the most out of Nutanix systems by maximizing configuration and operation for peak efficiency.Validate new skills by preparing for and completing the Nutanix Platform Professional Advanced certification. The Nutanix AAPM Advanced Administration & Performance Management course is an advanced level training program for experienced Nutanix data center administrators, technicians, and support personnel.The course features comprehensive coverage of performance management for Nutanix clusters, including options for performance optimization, troubleshooting issues and tuning. Learn through hands-on labs to monitor system performance, advanced networking and storage to help optimize data center administration.Advanced Administration explains in detail how to use the major Acropolis services such as Acropolis Block Services (ABS) and Acropolis File Services (AFS). The course also explains how to define and manage assets and applications using Calm, including how to connect to clouds, automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.Take advantage of Flash mode to improve system performance as well as how to effectively clone and delete VMs, move them between storage containers, and how to manage VMs (tagging, sizing, migration). PERFORMANCE MANAGEMENT MANAGING CONTROLLER VM SERVICES ADVANCED VIRTUAL MACHINE ADMINISTRATION IMPLEMENTING BUSINESS CONTINUITY/DISASTER RECOVERY CONFIGURING ADVANCED NETWORKING CUSTOMIZING SECURITY SERVICES MANAGING ACROPOLIS SERVICES PRISM CENTRAL MANAGEMENT

Nutanix Advanced Administration and Performance Management V5.5
Delivered on-request, onlineDelivered Online
Price on Enquiry

AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-600: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub are interested in becoming Azure Stack Hub operators who provide cloud services to end users or customers from within their own datacenter using Azure Stack Hub. Azure Stack Hub operators responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Stack Hub infrastructure. They also offer hybrid cloud resources and requested services and manage infrastructure as a service (IaaS) and platform as a service (PaaS). Overview Prepare for Azure Stack Hub deployment Manage infrastructure certificates for Azure Stack Hub Manage Azure Stack Hub registration Configure an Azure Stack Hub home directory Provision a service principal for Azure Stack Hub Recommend a business continuity disaster recovery (BCDR) strategy Manage Azure Stack Hub by using privileged endpoints Manage Azure Stack Hub Marketplace Offer App Services and Event Hub resource providers Manage usage and billing This course teaches Azure administrators and Azure Stack Hub operators how to plan, deploy, package, update, and maintain the Azure Stack Hub infrastructure. Lessons include deploying Azure Stack Hub, managing the Azure Stack Hub Marketplace, offering App Services and Event Hub resource providers, managing Azure Stack Hub registration, and maintaining system health. OVERVIEW OF AZURE STACK HUB * Azure Stack Hub * Datacenter integration * Azure Stack Hub PowerShell * Module review questions PROVIDE SERVICES * Manage Azure Stack Hub Marketplace * Offer an App Services resource provider * Offer an Event Hubs resource provider * Offer services * Manage usage and billing * Module review questions IMPLEMENT DATA CENTER INTEGRATION * Prepare for Azure Stack Hub deployment * Manage Azure Stack Hub registration * Module review questions * MANAGE IDENTITY AND ACCESS FOR AZURE STACK HUB * Manage multi-tenancy * Manage access * Module review questions * MANAGE THE AZURE STACK HUB INFRASTRUCTURE * Manage system health * Azure Monitor on Azure Stack Hub * Plan and configure business continuity and disaster recovery * Manage capacity * Update infrastructure * Manage Azure Stack Hub by using privileged endpoints * Module review questions * ADDITIONAL COURSE DETAILS: Nexus Humans AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub
Delivered on-request, onlineDelivered Online
Price on Enquiry

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. MODULE 1: METHODOLOGY & ASSESSMENT * The Citrix Consulting Methodology * Citrix Consulting Methodology Use * Business Drivers * Prioritize Business Drivers * User Segmentation * User Segmentation Process * App Assessment Introduction * App Assessment Analysis * Why Perform a Capabilities Assessment? * Common Capabilities Assessment Risks MODULE 2: USER LAYER * Endpoint Considerations * Peripherals Considerations * Citrix Workspace App Version Considerations * Citrix Workspace App Multiple Version Considerations * Network Connectivity and the User Experience * Bandwidth and Latency Considerations * Graphics Mode Design Considerations * HDX Transport Protocols Considerations * Media Content Redirection Considerations * Session Interruption Management Session Reliability Feature Considerations * Session Interruption Management Auto-Client Reconnect Feature Considerations * Session Interruption Management ICA Keep-Alive Feature Considerations MODULE 3: ACCESS LAYER * Access Matrix * Access Layer * Access Layer Communications * Double-Hop Access Layer Considerations * Citrix Cloud Access Layer Considerations * Use Cases for Multiple Stores * Define Access Paths per User Group * Define Number of URLs * Configuration and Prerequisites for Access Paths * Citrix Gateway Scalability * Citrix Gateway High Availability * StoreFront Server Scalability * StoreFront Server High Availability MODULE 4: RESOURCE LAYER - IMAGES * Flexcast Models * VDA Machine Scalability * VDA Machine Sizing with NUMA * VDA Machine Sizing * VDA Machine Scalability Cloud Considerations * Scalability Testing and Monitoring * Secure VDA Machines Network Traffic * Secure VDA Machines Prevent Breakouts * Secure VDA Machines Implement Hardening * Secure VDA Machines Anti-Virus * Review of Image Methods * Citrix Provisioning Overall Benefits and Considerations * Citrix Provisioning Target Device Boot Methods * Citrix Provisioning Read Cache and Sizing * Citrix Provisioning Write Cache Type * Citrix Provisioning vDisk Store Location * Citrix Provisioning Network Design * Citrix Provisioning Scalability Considerations * Citrix Machine Creation Services Overall Benefits and Considerations * Citrix Machine Creation Services Cloning Types * Citrix Machine Creation Services Storage Locations & Sizing * Citrix Machine Services Read and Write Cache * App Layering Considerations * Image Management Methods MODULE 5: RESOURCE LAYER - APPLICATIONS AND PERSONALIZATION * Application Delivery Option * Determine the Optimal Deployment Method for an App * General Application Concerns * Profile Strategy Profile Types Review * Citrix Profile Management Design Considerations * Citrix Profile Management Scaling * Citrix Profile Management Permissions * Policies Review * Optimize Logon Performance with Policies * Printing Considerations MODULE 6: CONTROL LAYER * Pod Architecture Introduction * Pod Architecture Considerations * Citrix Virtual Apps and Desktops Service Design Considerations * Implement User Acceptance Testing * Load Balancing the Machine Running the VDA * Citrix Director Design Considerations * Management Console Considerations * Change Control * Delivery Controller Scalability and High Availability * Control Layer Security * Configuration Logging Considerations * Session Recording MODULE 7: HARDWARE/COMPUTE LAYER * Hypervisor Host Hardware Considerations * Separating Workloads Considerations * Workload Considerations * VMs Per Host and Hosts Per Pool * Citrix Hypervisor Scalability * VM Considerations in Azure and Amazon Web Services * Storage Tier Considerations * Storage I/O Considerations * Storage Architecture * Storage RAID & Disk Type * Storage Sizing LUNs * Storage Bandwidth * Storage in Public Cloud * Datacenter Networking Considerations * Securing Hypervisor Administrative Access * Secure the Physical Datacenter * Secure the Virtual Datacenter MODULE 8: MODULE 8: HIGH AVAILABILITY AND MULTIPLE LOCATION ENVIRONMENTS * Redundancy vs. Fault Tolerance vs. High Availability * Multi-Location Architecture Considerations * Multi-Site Architecture Considerations * Global Server Load Balancing * Optimal Gateway Routing * Zone Preference and Failover * StoreFront Resource Aggregation * StoreFront Subscription Sync * Hybrid Environment Options * Citrix Provisioning Across Site * Site Database Scalability and High Availability * Citrix Provisioning Across Sites Considerations * Citrix Machine Creation Across Sites * App Layering Across Sites * Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices * Profile Management Multi-Site Replication Considerations * Folder Redirections and Other User Data in a Multi-Location Environment * Application Data Considerations * Cloud-Based Storage Replication Options * Multi-Location Printing Considerations * Zone Considerations * Active Directory Considerations MODULE 9: DISASTER RECOVERY * Tiers of Disaster Recovery * Disaster Recovery Considerations * Business Continuity Planning and Testing * Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered on-request, onlineDelivered Online
Price on Enquiry