• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

15682 Introduction To Construction courses

Mastering React | React Foundation (TT4195)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This introductory-level, fast-paced course is for skilled web developers new to React who have prior experienced working HTML5, CSS3 and JavaScript. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: A basic and advanced understanding of React components An advanced, in-depth knowledge of how React works A complete understanding of using Redux How to build, validate, and populate interactive forms How to use inline styles for perfect looking components How to test React components How to build and use components How to get control of your build process A deep understanding of data-driven modeling with props and state How to use client-side routing for pages in your apps How to debug a React application Mastering React is a comprehensive hands-on course that aims to be the single most useful resource on getting up to speed quickly with React. Geared for more experienced web developers new to React, this course provides students with the core knowledge and hands-on skills they require to build reliable, powerful React apps. After the first few modules, you?ll have a solid understanding of React?s fundamentals and will be able to build a wide array of rich, interactive web apps with the framework. The first module is an introduction to the new functionality in ECMAScript 6 (JavaScript). Client-side routing between pages, managing complex state, and heavy API interaction at scale are also covered. This course consists of two parts. In the first part of the course students will explore all the fundamentals with a progressive, example-driven approach. You?ll create your first apps, learn how to write components, start handling user interaction, and manage rich forms. We end the first part by exploring the inner workings of Create React App (Facebook?s tool for running React apps), writing automated unit tests, and building a multi-page app that uses client-side routing. The latter part of the course moves into more advanced concepts that you?ll see used in large, production applications. These concepts explore strategies for data architecture, transport, and management: Redux is a state management paradigm based on the Flux architecture. Redux provides a structure for large state trees and allows you to decouple user interaction in your app from state changes. GraphQL is a powerful, typed, REST API alternative where the client describes the data it needs. Hooks is the powerful, new way to maintain state and properties with functional components and the future of React according to Facebook. ES6 PRIMER (OPTIONAL) * Prefer const and let over var * Arrow functions * Modules * Object.assign() * Template literals * The spread operator and Rest parameters * Enhanced object literals * Default arguments * Destructuring assignments YOUR FIRST REACT WEB APPLICATION * Setting up your development environment * JavaScript ES6 /ES7 * Getting started * What?s a component? * Our first component * Building the App * Making the App data-driven * Your app?s first interaction * Updating state and immutability * Refactoring with the Babel plugin transform-class-properties JSX AND THE VIRTUAL DOM * React Uses a Virtual DOM * Why Not Modify the Actual DOM? * What is a Virtual DOM? * Virtual DOM Pieces * ReactElement * JSX * JSX Creates Elements * JSX Attribute Expressions * JSX Conditional Child Expressions * JSX Boolean Attributes * JSX Comments * JSX Spread Syntax * JSX Gotchas * JSX Summary COMPONENTS * A time-logging app * Getting started * Breaking the app into components * The steps for building React apps from scratch * Updating timers * Deleting timers * Adding timing functionality * Add start and stop functionality * Methodology review ADVANCED COMPONENT CONFIGURATION WITH PROPS, STATE, AND CHILDREN * ReactComponent * props are the parameters * PropTypes * Default props with getDefaultProps() * context * state * Stateless Components * Talking to Children Components with props.children FORMS * Forms 101 * Text Input * Remote Data * Async Persistence * Redux * Form Modules UNIT TESTING & JEST * Writing tests without a framework * What is Jest? * Using Jest * Testing strategies for React applications * Testing a basic React component with Enzyme * Writing tests for the food lookup app * Writing FoodSearch.test.js ROUTING * What?s in a URL? * React Router?s core components * Building the components of react-router * Dynamic routing with React Router * Supporting authenticated routes INTRO TO FLUX AND REDUX * Why Flux? * Flux is a Design Pattern * Flux implementations * Redux & Redux?s key ideas * Building a counter * The core of Redux * The beginnings of a chat app * Building the reducer() * Subscribing to the store * Connecting Redux to React INTERMEDIATE REDUX * Using createStore() from the redux library * Representing messages as objects in state * Introducing threads * Adding the ThreadTabs component * Supporting threads in the reducer * Adding the action OPEN_THREAD * Breaking up the reducer function * Adding messagesReducer() * Defining the initial state in the reducers * Using combineReducers() from redux REACT HOOKS * Motivation behind Hooks * How Hooks Map to Component Classes * Using Hooks Requires react 'next' * useState() Hook Example * useEffect() Hook Example * useContext() Hook Example * Using Custom Hooks USING WEBPACK WITH CREATE REACT APP * JavaScript modules * Create React App * Exploring Create React App * Webpack basics * Making modifications * Hot reloading; Auto-reloading * Creating a production build * Ejecting * Using Create React App with an API server * When to use Webpack/Create React App USING GRAPHQL * Your First GraphQL Query * GraphQL Benefits * GraphQL vs. REST * GraphQL vs. SQL * Relay and GraphQL Frameworks * Chapter Preview * Consuming GraphQL * Exploring With GraphiQL * GraphQL Syntax 101 . * Complex Types * Exploring a Graph * Graph Nodes ; Viewer * Graph Connections and Edges * Mutations * Subscriptions * GraphQL With JavaScript * GraphQL With React

Mastering React | React Foundation (TT4195)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Determine steps and requirements to deploy or upgrade Horizon Cloud Service on Microsoft Azure Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Discuss and create Remote Desktop Session Host Farms Explain power management options in the RDSH farm Create VDI desktop assignments and entitlements Manage assignable images on Horizon Cloud Service on Microsoft Azure Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure Describe the integration of Dynamic Environment Manger with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod's environment Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to achieve competence in deploying and managing VMware Horizon© Cloud Service? on Microsoft Azure. This training increases your skills and competence in using the VMware Horizon© Cloud Administration Console and Microsoft Azure portal.Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for VDI and RDSH assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, Workspace ONE Access and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. COURSE INTRODUCTION * Introduction and course logistics * Course objectives INTRODUCTION TO HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Identify Horizon Cloud Service on Microsoft Azure features, benefits, and licensing options * Interpret Horizon Cloud Service on Microsoft Azure architecture components to identify configuration prerequisite * Interpret Horizon Cloud Service on Microsoft Azure deployment models * Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment MICROSOFT AZURE NETWORKING REQUIREMENTS * Summarize Horizon Cloud connectivity considerations and tasks * Discuss Horizon Cloud on Microsoft Azure networking concepts * Identify ports required for local connections, remote connections, and endpoint operating system firewall rules ACTIVE DIRECTORY * List the features and limitations of supported AD configurations * Discuss Horizon Cloud Service on Microsoft Azure AD integration best practices * Determine Horizon Cloud Service on Microsoft Azure AD requirements DEPLOYMENT AND UPGRADES * Determine steps and requirements to deploy Horizon Cloud Service on Microsoft Azure * Discuss the features and benefits of using multiple tenant subnets for desktops and RDSH * Discuss the features and benefits of using Internal and External UAG * Recognize Horizon Cloud Service console controls that are available for administrators * Identify Horizon Cloud upgrade features and benefits CREATING IMAGES * Outline the process and choices to set up primary VMs * Identify the configuration choices for importing primary VMs * List steps to install the user software on the primary VM * Identify steps to convert a configured primary VM to an assignable image ACCESS DESKTOPS AND APPLICATIONS * Use Horizon Client to access desktops and remote applications * Compare the remote display protocols that are available for Horizon Cloud REMOTE DESKTOP SESSION HOST FARMS * List the steps and considerations to take when creating an RDSH farm * List the actions that can be performed on farms listed on the console?s Farms page * List the actions to assign an application to a user or group * List the prerequisites and steps to create an RDSH session assignment VDI DESKTOPS * Compare a dedicated assignment to floating assignment * Outline steps to create a VDI desktop assignment * Explain the entitlement of desktops MANAGING ASSIGNABLE IMAGES * Describe and manage assignable images * Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure VMWARE DYNAMIC ENVIRONMENT MANAGER * Identify the VMware Dynamic Environment Manager functional areas and their benefits * Prepare an infrastructure for VMware Dynamic Environment Manager * Outline the steps that are required to install and configure Dynamic Environment Manager components * Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler APP VOLUMES FOR HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure * Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure * Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure * Install and configure App Volumes in Horizon Cloud Service on Microsoft Azure WORKSPACE ONE ACCESS * Describe the benefits of integrating VMware Horizon Cloud service with Workspace ONE Access. * Describe how a user obtains access to an entitled virtual desktop or application from the Intelligent Hub catalog. * Describe the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization. * Describe the importance of configuring the Remote App Access Client in Workspace ONE Access. * Summarize the steps of configuring the Access settings in Horizon Cloud control panel. * Access an entitled Horizon virtual desktop or application in the Intelligent Hub catalog. SCALABILITY CONSIDERATIONS * Discuss the Horizon Cloud Service on Microsoft Azure scalability cost and settings * Describe the usage of Universal Broker in Horizon Cloud Service on Microsoft Azure HORIZON CLOUD CONNECTOR * Describe the features and benefits of Horizon Cloud Connector * List the prerequisites and requirements to connect a Horizon pod with Horizon Cloud Connector * Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod?s environment TROUBLESHOOTING HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Discuss Horizon Cloud Service on Microsoft Azure troubleshooting basics * Discuss Horizon Cloud Service troubleshooting basics * Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure
Delivered on-request, onlineDelivered Online
Price on Enquiry

Mastering Python Programming (TTPS4820)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This introductory-level Python course is geared for experienced users who want to use Python in web development projects, or system administrators and web site administrators who want to use Python to support their server installations, as well as anyone else who wants to automate or simplify common tasks with the use of Python scripts. Basic familiarity with any programming or scripting language would be helpful, along with a working, user-level knowledge of Unix/Linux, Mac, or Windows. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Throughout the hands-on course students, will learn to write essential Python scripts using the most current and efficient skills and techniques. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Create working Python scripts following best practices Use python data types appropriately Read and write files with both text and binary data Search and replace text with regular expressions Get familiar with the standard library and its work-saving modules Use lesser known but powerful Python data types Create 'real-world', professional Python applications Work with dates, times, and calendars Know when to use collections such as lists, dictionaries, and sets Understand Pythonic features such as comprehensions and iterators Write robust code using exception handling Mastering Python Programming is an introductory and beyond-level practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This comprehensive, practical course provides an in-depth exploration of working with the programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world. AN OVERVIEW OF PYTHON * What is python? * Python Timeline * Advantages/Disadvantages of Python * Getting help with pydoc THE PYTHON ENVIRONMENT * Starting Python * Using the interpreter * Running a Python script * Python scripts on Unix/Windows * Editors and IDEs GETTING STARTED * Using variables * Builtin functions * Strings * Numbers * Converting among types * Writing to the screen * Command line parameters FLOW CONTROL * About flow control * White space * Conditional expressions * Relational and Boolean operators * While loops * Alternate loop exits ARRAY TYPES * About array types (AKA sequences) * Lists and list methods * Tuples * Indexing and slicing * Iterating through a sequence * Nested sequences * Sequence functions, keywords, and operators * List comprehensions * Generator Expressions WORKING WITH FILES * File overview * Opening a text file * Reading a text file * Writing to a text file * Reading and writing raw (binary) data * Converting binary data with struct DICTIONARIES AND SETS * About dictionaries * Creating dictionaries * Iterating through a dictionary * About sets * Creating sets * Working with sets FUNCTIONS * Defining functions * Parameters * Global and local scope * Nested functions * Returning values SORTING * The sorted() function * Alternate keys * Lambda functions * Sorting collections * Using operator.itemgetter() * Reverse sorting ERRORS AND EXCEPTION HANDLING * Syntax errors * Exceptions * Using try/catch/else/finally * Handling multiple exceptions * Ignoring exceptions MODULES AND PACKAGES * The import statement * Module search path * Creating Modules * Using packages * Function and Module aliases AN INTRODUCTION TO PYTHON CLASSES * About o-o programming * Defining classes * Constructors * Methods * Instance data * Properties * Class methods and data REGULAR EXPRESSIONS * RE syntax overview * RE Objects * Searching and matching * Compilation flags * Groups and special groups * Replacing text * Splitting strings USING THE STANDARD LIBRARY * The sys module * Launching external programs * Math functions * Random numbers * Reading CSV data DATES AND TIMES * Working with dates and times * Translating timestamps * Parsing dates from text * Formatting dates * Calendar data WORKING WITH THE FILE SYSTEM * Paths, directories, and filenames * Checking for existence * Permissions and other file attributes * Walking directory trees * Creating filters with fileinput * Using shutil for file operations ADVANCED DATA HANDLING * Defaultdict and Counter * Prettyprinting data structures * Compressed archives (zip, gzip, tar, etc.) * Persistent data NETWORK PROGRAMMING * Using requests * Grabbing web content * Sending email * Using SSH for remote access * Using FTP WRITING REAL-LIFE APPLICATIONS * Reading input files a la Unix * Parsing command-line options * Detecting the current platform * Implementing logging ADDITIONAL COURSE DETAILS: Nexus Humans Mastering Python Programming (TTPS4820) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering Python Programming (TTPS4820) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Mastering Python Programming (TTPS4820)
Delivered on-request, onlineDelivered Online
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot * Lab : Creating and running queries * Lab : Configuring SSRS * Lab : Analyzing the real-time state of a device by using CMPivot PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections * Lab : Configuring boundaries and resource discovery * Lab: Configuring user and device collections DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations * Lab : Deploying the Microsoft System Center Configuration Manager client software * Lab: Configuring and monitoring client status * Lab : Managing client settings MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Lab : Configuring software metering * Lab : Configuring and managing Asset Intelligence DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Lab : Managing application supersedence and removal * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Lab : Using Configuration Manager to deploy Windows Store apps MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates * Lab : Configuring the site for software updates * Lab : Deploying and managing software updates IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies * Lab : Implementing Microsoft System Center Endpoint Protection * Lab : Implementing advanced threat policies MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access * Lab : Managing compliance settings MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service * Lab : Preparing the site for operating -system deployment * Lab : Deploying operating -system images for bare-metal installations MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance * Backing up and recovering a Configuration Manager site * Lab : Configuring role-based administration * Lab : Configuring Remote Tools * Lab : Maintaining a Configuration Manager site ADDITIONAL COURSE DETAILS: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

AJER - Advanced Junos Enterprise Routing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. Describe OSPF link metrics. Describe the various OSPF authentication methods. Explain the differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Configure OSPF multi-area adjacencies. Configure OSPF virtual links. Explain OSPF external reachability. List useful commands that are used to troubleshoot and verify OSPF. Isolate different OSPF issues. Describe BGP operations. Configure various BGP options. Explain the route selection process for BGP. Describe how to alter the route selection process. Explain the use of routing policies in BGP. Explain how BGP routes are processed. Describe the various BGP attributes and their use. Manipulate common BGP attributes. Review common BGP troubleshooting procedures. List common BGP troubleshooting commands. Identify issues with BGP peering. Explain reasons to use BGP in the Enterprise. Explain how ISP policies can influence external connectivity. Describe three common routing policies for external connectivity in the enterprise. Identify common commands for troubleshooting routing policy. Describe basic multicast terminology. Describe the multicast address space. Describe how RPF is used in a multicast network. Describe the basic functionality of IGMP. Describe the multicast service models and modes. Describe PIM-SM operation and configuration when using the ASM model. Describe PIM-SM operation and configuration when using the SSM model. Verify and troubleshoot multicast. Identify environments that may require a modified CoS implementation. Describe the various CoS components and their respective functions. Explain the CoS processing along with CoS defaults on SRX Series devices. Describe situations in which some CoS features are used in the enterprise. Describe the use of the Real-Time Performance Monitoring tool. Verify and troubleshoot CoS. Describe a traditional Campus network design. Understand the need for a new architectural design. Describe the five key concepts of the Evolved Core. Describe the benefits of a Layer 3-based Campus Networks. Describe Layer 2 tunneling. Explain VXLAN functionality. Describe VXLAN gateways. Describe EVPN features. Describe EVPN operations. This five-day course is designed to provide students with the tools required for implementing, monitoring, and troubleshooting Layer 3 components in an enterprise network. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: OSPF * OSPFv2 Review * Link-State Advertisements * Protocol Operations * OSPF Authentication * OSPFv3 * Lab 1: Configuring and Monitoring OSPF CHAPTER 3: OSPF AREAS * Review of OSPF Areas * Stub Area Operation * Stub Area Configuration * NSSA Operation * NSSA Configuration * Route Summarization * Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization CHAPTER 4: ADVANCED OSPF OPTIONS * OSPF Multi-Area Adjacencies * Virtual Links * External Reachability * Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options CHAPTER 5: TROUBLESHOOTING * Troubleshooting LSDB Consistency Issues * Case Study: Adjacency Issues * Lab: Troubleshooting OSPF CHAPTER 6: BGP * Review of BGP * BGP Configuration Options * BGP Operations * BGP Path Selection and Options * Lab: Implementing BGP CHAPTER 7: BGP ATTRIBUTES AND POLICY * Policy and BGP * BGP Attributes * Details and Manipulation of Common BGP Path Attributes * Lab: BGP Attributes CHAPTER 8: TROUBLESHOOTING BGP * BGP Troubleshooting * BGP Case Study * Lab: Troubleshooting BGP CHAPTER 9: ENTERPRISE ROUTING POLICIES * Enterprise BGP Core Network Design * Enterprise External Network Deployment * Lab: Implementing Enterprise Routing Policies CHAPTER 10: TROUBLESHOOTING POLICIES * Routing Policy Structure * Using RegEx * Routing Policy Troubleshooting * Case Study * Lab: Troubleshooting Routing Policies CHAPTER 11: INTRODUCTION TO MULTICAST * Overview of Multicast * Multicast Addressing * RPF * IGMP * Lab: PIM-SM CHAPTER 12: MULTICAST ROUTING PROTOCOLS AND SSM * Overview of Multicast Routing Protocols * PIM-SM Using the ASM Model * PIM-SM Using the SSM Model * Lab: Implementing PIM-SM * Lab: Implementing SSM CHAPTER 13: TROUBLESHOOTING MULTICAST * Multicast Troubleshooting * Multicast Case Study * Lab: Troubleshooting Multicast CHAPTER 14: CLASS OF SERVICE * CoS Components Review and Case Study * CoS Processing and CoS Defaults on the SRX Series Device * Policing * Virtual Channels * Monitoring with Resource Performance Monitoring * Lab 9: Implementing CoS Features in the Enterprise CHAPTER 15: TROUBLESHOOTING CLASS OF SERVICE * CoS Troubleshooting * CoS Case Study * Lab: Troubleshooting Class of Service CHAPTER 16: ENTERPRISE ARCHITECTURES * Traditional Enterprise Networks * A New Architecture * Key Concepts of the Evolved Core * IP Fabric Campus Design CHAPTER 17: VXLAN * Layer 2 Connectivity over a Layer 3 Network * VXLAN Overview * VXLAN Gateways CHAPTER 18: EVPN-VXLAN * Overview of EVPN * EVPN Operations * EVPN and VXLAN CHAPTER 19: CONFIGURING EVPN-VXLAN * Configuring EVPN-VXLAN Spine Only network * Add IP Fabric leaf nodes to a Spine Only design * Configuring a new IP Fabric EVPN-VXLAN network CHAPTER 20: MIGRATING TO AN IP FABRIC * EVPN Routes * Useful EVPN Commands * Appendix A: BGP Route Reflection * Route Reflection Operation * Configuration and Routing Knowledge * Lab: BGP Route Reflection (Optional) * Appendix B: Troubleshooting IS-IS * IS-IS Troubleshooting * Lab: Troubleshooting IS-IS and Mixed Environments ADDITIONAL COURSE DETAILS: Nexus Humans AJER - Advanced Junos Enterprise Routing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJER - Advanced Junos Enterprise Routing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJER - Advanced Junos Enterprise Routing
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. EXPLORING ORACLE DATABASE ARCHITECTURE * Introducing Oracle Database * Relation Database Models * Oracle SQL and PL/SQL * Oracle Database Server Architecture * Connecting to Oracle Databases * Oracle Database Tools * Oracle-Supplied User Accounts * Querying the Oracle Data Dictionary MANAGING DATABASE INSTANCES * Initialization Parameter Files * Starting Up Oracle Databases * Shutting Down Oracle Databases * Opening and Closing PDBs * Working with the Automatic Diagnostic Repository (ADR) * Querying Dynamic Performance Views CREATING PDBS * Methods and Tools to Create PDBs * Creating PDBs from Seed with SQL*Plus * Cloning PDBs with SQL*Plus * Unplugging and Pluggin In PDBs with SQL*Plus * Dropping PDBs with SQL*Plus CONFIGURING THE ORACLE NETWORK ENVIRONMENT * Oracle Net Services * How Listeners Work * Configuring Listeners for Dynamic Service Registration * Configuring Listeners for Static Service Registration * Configuring Local Naming for Connections * Testing Oracle Net Connectivity with tnsping * Configuring Communication Between Databases * Dedicated Versus Shared Server Configurations ADMINISTERING USER SECURITY * Creating Users * Granting Privileges * Creating and Granting Roles * Revoking Privileges and Roles * Creating and Assigning Profiles * Authenticating Users * Assigning Quotas to Users * Applying the Principal of Least Privilege CREATING AND MANAGING TABLESPACES * How Table Data is Stored * Creating Tablespaces in SQL*Plus * Altering and Dropping Tablespaces in SQL*Plus * Viewing Tablespace Information in SQL*Plus * Implementing Oracle Managed Files * Moving and Renaming Online Data Files in SQL*Plus MANAGING STORAGE SPACE * Oracle Database Space Management Features * Block Space Management * Row Chaining and Migration * Free Space Management Within Segments * Types of Segments * Allocating Extents * Understanding Deferred Segment Creation * Space-Saving Features MANAGING UNDO DATA * Undo Data: Overview * Transactions and Undo Data * Storing Undo Information * Comparing Undo Data and Redo Data * Managing Undo * Local Undo Mode Versus Shared Undo Mode * Configuring Undo Retention * Categories of Undo MOVING DATA * Moving Data: General Architecture * Oracle Data Pump: Overview * Oracle Data Pump: Benefits * Data Pump Export and Import Clients * Data Pump Utility: Interfaces and Modes * Data Pump Import: Transformations * SQL*Loader Overview * Loading Methods BACKUP AND RECOVERY CONCEPTS * DBA Responsibilities * Categories of Failure * Understanding Instance Recovery * Understanding Types of Backups * Comparing Complete and Incomplete Recovery * Oracle Data Protection Solutions * Flashback Technology MONITORING AND TUNING DATABASE PERFORMANCE * Managing Performance Activities * Performance Planning Considerations * Database Maintenance * Automatic Workload Repository (AWR) * Automatic Database Diagnostic Monitor * Performance Monitoring * Performance Tuning Methodology * Database Server Statistics and Metrics SQL TUNING * SQL Tuning Process * Oracle Optimizer * Optimizer Statistics * SQL Plan Directives * Adaptive Execution Plans * SQL Tuning Advisor * SQL Access Advisor * SQL Performance Analyzer ORACLE DATABASE RESOURCE MANAGER * Oracle Database Resource Manager: Overview * Resource Manager Elements * Using Resource Manager to Allocate Resources * Creating a Simple Resource Plan * Creating a Complex Resource Plan * Using the Active Session Pool Feature * Limiting CPU Utilization at the Database Level * Limiting CPU Utilization at the Server Level ENTERPRISE MANAGER CLOUD CONTROL * Controlling the Enterprise Manager Cloud Control Framework * Starting the Enterprise Manager Cloud Control Framework * Stopping the Enterprise Manager Cloud Control Framework INTRODUCTION TO ORACLE DATABASE CLOUD SERVICE * Oracle Cloud: Overview * Database Cloud Service Offerings * DBCS Architecture * Features and Tooling * Additional Database Configuration Options CREATING DBCS DATABASE DEPLOYMENTS * Automated Database Provisioning * Creating a Database Deployment * How SSH Key Pairs are Used * Creating an SSH Key Pair * Storage Used for Database Files MANAGING DBCS DATABASE DEPLOYMENTS * Cloud Tooling * Accessing Tools and Features from the DBCS Console * Managing the Compute Node Associated With a Database Deployment * Managing Network Access to DBCS * Enabling Access to a Compute Node Port * Scaling a Database Deployment BACKING UP AND RESTORING DBCS DATABASE DEPLOYMENTS * Backing Up and Recovering Databases on DBCS * Backup Destination Choices * Backup Configuration * Creating an On-Demand Backup * Customizing the Backup Configuration * Performing Recovery by Using the Console * Performing Recovery by Using the dbaascli Utility PATCHING DBCS DATABASE DEPLOYMENTS * Patching DBCS * Using the DBCS Console to Manage Patches * Using the dbaascli Utility to Manage Patches CREATING MASTER ENCRYPTION KEYS FOR PDBS * CDB and PDB Master Encryption Keys * Determining Whether You Need to Create and Activate and Encryption Key for a PDB * Creating and Activating an Encryption Key TABLESPACE ENCRYPTION BY DEFAULT * Tablespace Encryption by Default in DBCS * Transparent Data Encryption (TDE) Overview * Components of TDE * Using TDE * Defining the Keystore Location * Controlling Tablespace Encryption by Default * Managing the Software Keystore and Master Encryption Key * Managing the Keystore in CDBs and PDBs ADDITIONAL COURSE DETAILS: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

SA120 - Server Automation 10.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. COURSE OVERVIEW AND INTRODUCTION TO HP SERVER AUTOMATION * ? Discuss the IT organization?s preference for automation * ? Discuss the main features of HP SA * ? Discuss the benefits of using SA * ? Describe the distributed architecture of SA EXPLORING THE ARCHITECTURE AND INTERFACES * ? Define an SA core * ? Describe the functionality of each key component of SA * ? Describe SA users * ? Use the SA client to explore a managed server environment * ? Describe the SA core architecture and key components * ? Learn how to use the SA interfaces to explore the server environment AGENT FUNCTIONALITY AND SERVER INTEGRATION * ? Differentiate the agent types * ? Describe the SA agent functionality * ? Specify the requirements for installing an SA agent onto an unmanaged server * ? Install an agent onto an unmanaged server using the SA client and manual installation * ? Troubleshoot agent installation and communication failures * ? Explore the server inventory using the Device Explorer of the SA client * ? Describe the Agent Tools feature within SA * ? Integrate existing, unmanaged servers into the SA managed environment * ? Summarize what server information is collected by the agent * ? Explain the server module objects * ? Explain agent extensions PROVISIONING OPERATING SYSTEMS (OS) USING OS BUILD PLANS (OSBPS) * ? Describe the Operating System (OS) provisioning feature within SA * ? Describe the process of provisioning an OS on a server * ? Define and run an OS Build Plan (OSBP) DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) LESS OR STATIC IP PROVISIONING * ? Configure and run the Managed Boot Client(s) (MBC) * ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) MANAGING VIRTUALIZATION * ? Describe the supported virtualization management features in SA * ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 * ? Identify the relationship between the hypervisor and its virtual servers * ? Manage the lifecycle of VMware Virtual Machines (VMs) * ? Manage the lifecycle of Solaris zones * ? Integrate with VMware Virtual Center using Virtualization Service (VS) EXPLORING DEVICE GROUPS * ? Explain device groups and their characteristics * ? Describe the different types of device groups supported in SA * ? Create static and dynamic device groups using the SA client EXPLORING DEVICE GROUPS WITH SEARCH RESULTS * ? Describe the different types of search in the SA client * ? Discuss the process to save and retrieve search results * ? Create device groups from search results * ? Develop sample reports using advanced search MANAGING PACKAGES * ? Describe how to manage packages in SA * ? Discuss the supported package types * ? Explain how to organize the software library * ? Import and export packages into the software repository * ? Install and uninstall packages * ? Manage Red Hat Package Manager (RPM) packages SOFTWARE MANAGEMENT * ? Describe the use of policy-based software management in SA * ? Describe how to manage software policies in SA * ? List the software management setup tasks * ? Install and uninstall software using software policies * ? Manage software updates using software policies WORKING WITH APPLICATION DEPLOYMENT MANAGER (ADM) * ? Describe the Application Deployment Manager (ADM) and its functions * ? Manage the ADM * ? Set permissions for ADM * ? Define an application, a target, and a component * ? Deploy an application * ? Manage an Application Deployment job * ? Describe the rollback and undeploy process * ? Import and export Application Deployment data from SA APPLICATION CONFIGURATION MANAGEMENT * ? Describe how application configurations are managed in SA * ? Describe application configuration components * ? Control values using an application configuration inheritance model * ? Push application configuration values to servers MANAGING PATCHES * ? Describe the patch management feature in SA * ? View patch information * ? Describe UNIX patch management tasks * ? Install patches using patch policies on the Windows platform * ? Identify Microsoft patch administration tasks * ? Manage patches on Red Hat LINUX WORKING WITH AUDITS, SNAPSHOTS, AND REMEDIATION * ? Describe the audit and remediation feature in SA * ? Create and run audits * ? Configure file audit rules * ? Set audit rule exceptions * ? View audit results and remediate the differences * ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits ENFORCING COMPLIANCE * ? Define server compliance concepts * ? Describe the compliance management feature in SA * ? Scan and view the compliance status of servers * ? Remediate non-compliant servers EXPLORING SERVERS USING THE GLOBAL SHELL AND GLOBAL FILE SYSTEM * ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA * ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment * ? Describe how to navigate and filter data in the OGFS using the Global Shell * ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server * ? Use the SA remote terminal feature to access and manage servers in the managed environment SCRIPTING WITH SA * ? Describe the script management and execution feature in SA * ? Create scripts using the SA client * ? Execute ad hoc or saved scripts * ? View and download script results * ? Describe PowerShell integration with SA * ? Explain the Extensible Discovery server module * ? Introduce Automation Platform eXtensions (APX) scripting EXPLORING REPORTS IN SA * ? Explain SA reports * ? List the reports available in SA * ? Generate an SA report * ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS PROVISIONING WITH OS SEQUENCES * ? Describe the OS Provisioning feature within SA * ? Describe the process of provisioning an OS on a server * ? Define and run an OS Sequence

SA120 - Server Automation 10.x Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools * Searching in the Configuration Manager console * Using Windows PowerShell with Configuration Manager * Using Configuration Manager Service Manager to manage components * Monitoring site and component status * Reviewing log files by using the Configuration Manager Trace tool * Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. * Describe the Configuration Manager architecture. * Describe the management tools that you use to perform administrative functions for Configuration Manager. * Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. ANALYZING DATA USING QUERIES AND REPORTS * Introduction to queries * Configuring Microsoft SQL Server Reporting Services (SSRS) * Lab : Creating and running queriesConfiguring boundaries and resource discovery * Creating data queries * Creating subselect queries * Creating status message queries * Lab : Configuring SSRS * Configuring a reporting services point * Creating a report by using Report Builder * Create and configure data and status message queries. * Configure and manage SSRS and the reporting services point. PREPARING THE MANAGEMENT INFRASTRUCTURE TO SUPPORT PCS AND MOBILE DEVICES * Configuring site boundaries and boundary groups * Configuring resource discovery * Configuring the Exchange Server Connector for mobile device management * Configuring user and device collections * Lab : Configuring boundaries and resource discovery * Configuring boundaries, boundary groups, and fallback relationships * Configuring Active Directory discovery methods * Lab : Configuring user and device collections * Creating a device collection * Creating a user collection * Configuring a maintenance window * Configure boundaries and boundary groups. * Configure resource discovery. * Configure the Exchange Server connector mobile device management. * Organize resources using device and user collections. DEPLOYING AND MANAGING CLIENTS * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings in Configuration Manager * Lab : Deploying the Microsoft System Center Configuration Manager client software * Preparing the site for client installation * Deploying the Configuration Manager client software by using client push installation * Lab : Configuring and monitoring client status * Configuring and monitoring client health status * Lab : Managing client settings * Configuring client settings * Describe the requirements and considerations for installing the Configuration Manager client software. * Deploy the Configuration Manager client software. * Configure and monitor client status. * Manage Configuration Manager client settings. MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Configuring and managing hardware inventory * Lab : Configuring software metering * Configuring software metering * Lab : Configuring and managing Asset Intelligence * Preparing the site for Asset Intelligence * Configuring Asset Intelligence * Monitoring license agreements by using Asset Intelligence * Viewing Asset Intelligence reports * Describe inventory collection. * Configure and collect hardware and software inventory. * Manage inventory collection. * Configure software metering. * Configure Asset Intelligence. DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments * Installing a new distribution point * Managing content distribution * Prepare the infrastructure for content management. * Distribute and manage content on distribution points. DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Installing and configuring the Application Catalog roles * Creating applications with requirements * Deploying applications * Lab : Managing application supersedence and removal * Managing application supersedence * Uninstalling the Excel Viewer application * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Configuring support for App-V * Deploying virtual applications * Lab : Using Configuration Manager to deploy Windows Store apps * Configuring support for sideloading Windows Store apps * Configuring a Windows Store app * Deploying Windows 10 apps to users * Describe the application management features of Configuration Manager. * Create applications. * Deploy applications. * Manage applications. * Configure and deploy virtual applications. * Configure and deploy Windows Store apps. MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Lab : Configuring the site for software updates * Configuring and synchronizing the software update point * Lab : Deploying and managing software updates * Determining software update compliance * Deploying software updates to clients * Configuring automatic deployment rules * Describe how the software updates feature integrates with Configuration Manager. * Prepare the Configuration Manager site for software updates. * Manage the evaluation and deployment of software updates. * Configure automatic deployment rules. * Monitor and troubleshoot software updates. IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Lab : Implementing Microsoft System Center Endpoint Protection * Configuring the System Center Endpoint Protection point and client settings * Configuring and deploying Endpoint Protection policies * Monitoring Endpoint Protection * Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. * Configure, deploy, and manage Endpoint Protection policies. MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Discuss the requirements for deploying Horizon Cloud Service on Microsoft Azure Demonstrate how to deploy or upgrade Horizon Cloud Service on Microsoft Azure Identify the Horizon Cloud Service console controls that are available to administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image List the steps to install the user software on the primary VM Describe pools and pool groups Explain the creation process and configuration options for single-session and multisession pools and pool groups Create single-session and multisession assignments and entitlements Explain power management options in the multisession pool groups Manage assignable images on Horizon Cloud Service on Microsoft Azure Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Describe the integration of VMware Dynamic Environment Manager with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the VMware Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to successfully deploy and manage VMware Horizon© Cloud Service? on Microsoft Azure. This training also teaches you how to use the VMware Horizon Cloud administration console and Microsoft Azure portal. Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for single and multisession assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, VMware Workspace ONE© Access?, and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. COURSE INTRODUCTION * Introduction and course logistics * Course objectives INTRODUCTION TO HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Discuss the features and benefits of Horizon Cloud Service on Microsoft Azure * Identify the available Horizon Cloud and Microsoft licensing options * Identify the system architecture components of Horizon Cloud Service on Microsoft Azure * Explain how VMware Dynamic Environment Manager is used in Horizon Cloud profile management * Describe Horizon Cloud application management using App Volumes * Identify the Microsoft Azure configuration prerequisites for a Horizon Cloud integration * Identify the main Microsoft Azure components required for a Horizon Cloud deployment * Review the virtual machines supported in Horizon Cloud Service on Microsoft Azure MICROSOFT AZURE NETWORKING REQUIREMENTS * Discuss Horizon Cloud connectivity considerations and tasks * Explain the networking concepts for Horizon Cloud Service on Microsoft Azure * Identify the ports required for local connections, remote connections, and endpoint OS firewall rules IDENTITY MANAGEMENT * Explain computer identity type and user identity type * Discuss the best practices for Horizon Cloud Service on Microsoft Azure AD integrations * Determine the requirements for Horizon Cloud Service on Microsoft Azure AD * Describe the benefits of integrating Horizon Cloud with Workspace ONE Access * Explain how a user obtains access to an entitled virtual desktop or application from the VMware Workspace ONE© Intelligent Hub catalog * Discuss the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization * Discuss the importance of configuring the Remote App Access client in Workspace ONE Access * Demonstrate how to access an entitled Horizon virtual desktop or application in the Workspace ONE Intelligent Hub catalog DEPLOYMENT AND UPGRADES * Explain the steps and requirements for deploying Horizon Cloud Service on Microsoft Azure * Describe the features and benefits of Horizon Edge * Describe the differences between internal and external gateways * Outline the Horizon Universal Console controls available for administrators * Identify the features and benefits of the Horizon Cloud upgrades CREATING IMAGES * Outline the process and configuration choices for setting up primary VMs * Identify the configuration choices for importing primary VMs * List the steps to install the user software on the primary VM * Explain how to convert a configured primary VM to an assignable image * Describe pools and pool groups * List the steps for configuring an image to a pool * List the steps for configuring an image to a pool group POOL GROUPS * Compare dedicated assignments to floating assignments * Outline the steps for creating single-session and multisession assignment * Explain the entitlement of pool groups * Outline the creation process and configuration options for multisession pools and pool groups * Explain the power management selections in the multisession pool groups * Compare the rolling maintenance and loadbalancing options * Identify the actions related to the multisession groups page * Identify the actions to add and assign applications to a user or group * Outline the prerequisites for entitling a multisession assignment ACCESS DESKTOPS AND APPLICATIONS * Identify the different versions of Horizon Client * Describe how to access desktops and remote applications with Horizon Client * Describe how to access desktops and remote applications with a browser * Compare the remote display protocols that are available for Horizon Cloud * Describe the Blast Extreme display protocol codecs * List the ideal applications for each Blast Extreme codec * Describe the Blast Extreme policy configurations MANAGING IMAGES * Describe images * Explain how to manage images VMWARE DYNAMIC ENVIRONMENT MANAGER ON HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Identify the functional areas of VMware Dynamic Environment Manager and their benefits * Explain how to use the VMware Dynamic Environment Manager console and application profiler to manage user personalization and application configurations APP VOLUMES FOR HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure * Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure * Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure * Demonstrate how to configure App Volumes in Horizon Cloud Service on Microsoft Azure SCALABILITY CONSIDERATIONS * Recognize the scalability settings for Horizon Cloud Service on Microsoft Azure TROUBLESHOOTING HORIZON CLOUD SERVICE ON MICROSOFT AZURE * Explain the troubleshooting basics for Horizon Cloud Service on Microsoft Azure * Identify the analytics and monitoring capabilities of Horizon Cloud Service on Microsoft Azure * Explain the troubleshooting basics for Horizon Cloud ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage
Delivered on-request, onlineDelivered Online
Price on Enquiry