• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

150 Powershell courses

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Deploy and manage Virtual Delivery Agent machines to on-premises resource locations as well as in Microsoft Azure using MCS. Integrate Citrix Cloud and Citrix Virtual Apps and Desktops 2203 LTSR with Microsoft Azure Active Directory. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you will learn how to create a new Citrix DaaS deployment on Citrix Cloud, with a resource location on Microsoft Azure. You will also learn how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and a Microsoft Azure resource location that will host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. MODULE 1: INTRODUCTION TO CITRIX DAAS * New Citrix Workspace Packaging * Citrix Virtual Apps and Desktops - On-Premises Site * What is Citrix Cloud? * Why Citrix DaaS? * What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? * Citrix Cloud Administration MODULE 2: PLANNING - CITRIX DAAS ARCHITECTURE, SECURITY, AND OPERATIONS * Architecture and Deployment Options * Citrix DaaS Security * Citrix DaaS Operations MODULE 3: PLANNING - CITRIX CLOUD CONNECTORS * Cloud Connector Architecture * Cloud Connector Services and Communications Overview * Cloud Connector Operations in a Resource Location * Cloud Connector Resiliency * Installing, Updating, and Removing Cloud Connectors * Supported Domain Scenarios for Cloud Connectors * Securing Cloud Connector Communications * Local Host Cache (LHC) * Citrix Cloud Connector vs Delivery Controller Operations MODULE 4: PLANNING - CITRIX DAAS RESOURCE LOCATIONS * Citrix DaaS Resource Locations * Citrix DaaS Hosting Connections * Zones MODULE 5: ACTIVE DIRECTORY, AUTHENTICATION, AND AUTHORIZATION * Active Directory Design Options * Desktops from Non-Domain Joined VDAs * Citrix Federated Authentication Service and Identity Provider Services MODULE 6: PLANNING - PROVISIONING VDA WORKLOADS AND DELIVERING RESOURCES * Master Images * Machine Creation Services (MCS) in Citrix DaaS * Citrix Provisioning in Citrix DaaS * Machine Catalogs * Delivery Groups * Citrix Cloud Library MODULE 7: PLANNING - PROVIDE ACCESS IN CITRIX CLOUD * Selecting Between Citrix digital workspace experience and StoreFront * Citrix StoreFront and Citrix digital workspace experience Communications * Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway * Access Layer Communications * User Authentication MODULE 8: PLANNING - CITRIX DAAS ADMINISTRATION * Citrix Cloud Manage and Monitor * Delegated Administration * Citrix DaaS Remote PowerShell Software Development Kit * Manage Multiple Resource Locations MODULE 9: PLANNING - PUBLIC CLOUD CONSIDERATIONS * General Public Cloud Considerations * Using Autoscale to Power Manage Machines in a Public Cloud * Microsoft Azure as a Citrix DaaS Resource Location * Amazon Web Services as a Citrix DaaS Resource Location * Google Cloud as a Citrix DaaS Resource Location MODULE 10: PLANNING - MIGRATING TO CITRIX DAAS FROM CITRIX VIRTUAL APPS AND DESKTOPS * Citrix Cloud Migration Options and Considerations * Citrix Automated Configuration Tool * Citrix Image Portability Service MODULE 11: MANAGE - OPERATIONS AND SUPPORT IN CITRIX CLOUD * Citrix Cloud Connector Support * Updating and Rolling Back Machine Catalogs * VDA Restore * Citrix Self-Help Strategy * Monitor Your Environment MODULE 12: INTRODUCTION TO CITRIX DAAS ON MICROSOFT AZURE * Partnering for Success MODULE 13: PLANNING - CITRIX DAAS RESOURCE LOCATION ON MICROSOFT AZURE * Overview of Citrix DaaS Components * Creating a Citrix DaaS Deployment Overview MODULE 14: PLANNING - MICROSOFT AZURE OVERVIEW * Azure Virtual Network Structure * Azure Virtual Network Connectivity * Azure Virtual Resources * Azure Active Directory Identity and Access Management * Azure Active Directory Options and Considerations MODULE 15: PLANNING - DEPLOYING CITRIX DAAS ON MICROSOFT AZURE * Citrix DaaS Resource Locations in Azure * Citrix DaaS Components in Azure * Creating and Managing Workloads in an Azure Resource Location MODULE 16: PLANNING - PROVIDE ACCESS TO END USERS * Providing Access to Resources in Citrix Cloud * Citrix Gateway Deployment Options * Deploying Citrix Gateway or ADC in Azure * GSLB and StoreFront Optimal Gateway in Hybrid Environments MODULE 17: ROLLOUT - CITRIX DAAS DEPLOYMENT ON MICROSOFT AZURE * Citrix Workspace App Rollout * Preparing Migration of * End-Users to Workspace Platform MODULE 18: MANAGING - CITRIX DAAS WORKLOADS ON MICROSOFT AZURE * Maintaining Citrix Gateway * Backup and Monitoring in Azure * Maintaining Master Images in Azure * Monitoring VDAs in Manage Console and Azure MODULE 19: OPTIMIZE - CITRIX DAAS ON MICROSOFT AZURE * Managing Azure Costs * Using Azure Pricing Calculator - Instructor Demo ADDITIONAL COURSE DETAILS: Nexus Humans CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure
Delivered on-request, onlineDelivered Online
Price on Enquiry

Windows 10 Modern Desktop Administrator Associate Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Overview After completing this course, learners should be able to: Prepare to install Windows 10. Install Windows 10. Configure Updates for Windows. Perform post-installation configuration tasks. Configure devices and drivers for Windows. Configure storage for Windows. Configure network settings in Windows. Configure remote management of Windows. Configure and manage applications in Windows. Configure Internet Explorer. Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them. Use Windows troubleshooting and monitoring tools. Troubleshoot Windows installations. Troubleshoot application installation issues. Troubleshoot web browser settings. Troubleshoot Windows authentication. Troubleshoot hardware issues related to Windows machines. Develop an Operating System deployment and upgrade strategy. Understand the different methods of deployment. Understand on-premise and cloud-based solutions. Deploy and migrate desktops to Windows 10. Plan and configure Windows Update policies. Describe the benefits and capabilities of Azure AD. Manage users using Azure AD with Active Directory DS. Implement Windows Hello for Business. Configure conditional access rules based on compliance policies. Describe the various tools used to secure devices and data. Implement Windows Defender Advanced Threat Protection. This five day accelerated course will cover topics necessary to prepare attendees with the baseline knowledge to take the MD-100 and MD-101 exams for the Modern Desktop Administrator Associate certification. INSTALLING WINDOWS * Introducing Windows 10 * Installation Options * Requirements for Windows Features * Installation Process and Media * Upgrading to Windows 10 * UPDATING WINDOWS * Windows Servicing Model * Updating Windows * Applying Applications and Windows Updates * POST-INSTALATION CONFIGURATION AND PERSONALIZATION * Customize the Windows 10 UI * Configure device specific settings such as power plans and mobile device options * Use the Windows control panel and setting app to configure settings * Describe using Windows PowerShell * CONFIGURING PERIPHERALS AND DRIVERS * Managing Devices and Drivers * Managing Printers * CONFIGURING NETWORKING * Configure IP Network Connectivity * Implement Name Resolution * Implement Wireless Network Connectivity * Remote Access Overview * Remote Management * CONFIGURING STORAGE * Overview of storage options * Using OneDrive * Managing Disks, Partitions, and Volumes * Maintaining Disks and Volumes * Managing Storage Spaces * MANAGING APPS IN WINDOWS 10 * Providing Apps to Users * Managing Universal Windows Apps * The Windows Store * Web browsers in Windows 10 * CONFIGURING AUTHORIZATION AND AUTHENTICATION * Using Security Settings to Mitigate Threats * Configuring User Account Control * Implementing Device Registration * Authentication * CONFIGURING DATA ACCESS AND USAGE * Overview of File Systems * Configuring and Managing File Access * Configuring and Managing Shared Folders * Managing Security with Policies * CONFIGURING ADVANCED MANAGEMENT TOOLS * Configuring Tenant Roles * Managing Tenant Health and Services * SUPPORTING THE WINDOWS 10 ENVIRONMENT * Troubleshooting Windows * Troubleshooting Tools * TROUBLESHOOTING THE WINDOWS OS * Troubleshooting Windows Startup * Troubleshooting Operating System Service Issues * Troubleshooting Sign-In Issues * TROUBLESHOOTING FILES AND APPLICATIONS * File Recovery in Windows 10 * Application Troubleshooting * TROUBLESHOOTING HARDWARE AND DRIVERS * Troubleshooting Device Driver Failures * Overview of Hardware Troubleshooting * Troubleshooting Physical Failures * PLANNING AN OPERATING SYSTEM DEPLOYMENT STRATEGY * Overview of Windows as a service * Windows 10 Deployment options * Considerations for Windows 10 deployment * IMPLEMENTING WINDOWS 10 * Implementing Windows 10 by using dynamic deployment * Implementing Windows 10 by using Windows Autopilot * Upgrading devices to Windows 10 * MANAGING UPDATES FOR WINDOWS 10 * Implementing Windows 10 by using dynamic deployment * Implementing Windows 10 by using Windows Autopilot * Upgrading devices to Windows 10 * DEVICE ENROLLMENT * Device management options * Manage Intune device enrollment and inventory * CONFIGURING PROFILES * Configuring device profiles * Managing user profiles * Monitoring devices * APPLICATION MANAGEMENT * Implement Mobile Application Management (MAM) * Deploying and updating applications * Administering applications * MANAGING AUTHENTICATION IN AZURE AD * MANAGING AUTHENTICATION IN AZURE AD MANAGING DEVICES AND DEVICE POLICIES * Microsoft Intune Overview * Managing devices with Intune * Implement device compliance policies * MANAGING SECURITY * Implement device data protection * Managing Windows Defender ATP * Managing Windows Defender in Windows 10 * ADDITIONAL COURSE DETAILS: Nexus Humans Windows 10 Modern Desktop Administrator Associate Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Windows 10 Modern Desktop Administrator Associate Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Windows 10 Modern Desktop Administrator Associate Bootcamp
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Workspace ONE: UEM Bootcamp [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies for maintaining environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. You will also learn to investigate, analyze, and determine issues that might occur with all the different components of Workspace ONE UEM.By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. At the end of five days, you will have the foundational knowledge for effectively managing and conducting basic troubleshooting for Workspace ONE UEM. COURSE INTRODUCTION * Introductions and course logistics * Course objectives * Online resources and references PLATFORM ARCHITECTURE * Summarize the features and functionality of Workspace ONE UEM * Outline the benefits of leveraging Workspace ONE UEM * Recognize the core and productivity components that make up the Workspace ONE UEM platform * Summarize high availability and disaster recovery for the Workspace ONE solution ADMINISTRATION * Navigate and customize the Workspace ONE UEM console * Summarize the hierarchical management structure * Explain the features and functions of Workspace ONE Hub Services * Outline account options and permissions ENTERPRISE INTEGRATIONS * Outline the process and requirements to integrate with directory services * Explain certificate authentication and practical implementation with Workspace ONE * Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console * Describe VMware Dynamic Environment Manager? and its architecture ONBOARDING * Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management * Outline the steps for setting up autodiscovery in the Workspace ONE UEM console * Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app * Summarize platform onboarding options MANAGING ENDPOINTS * Explain the differences between device and user profiles * Describe policy management options for Windows and macOS * Describe the functions and benefits of using compliance policies * Explain the use case for Freestyle Orchestrator * Describe the capabilities that sensors and scripts enable ALTERNATIVE MANAGEMENT METHODS * Describe the function and benefits of device staging * Configure product provisioning in the Workspace ONE UEM console * Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices * List the system and device requirements for Linux device management in Workspace ONE UEM APPLICATIONS * Describe the features, benefits, and capabilities of application management in Workspace ONE UEM * Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console * Describe the benefits of using Apple Business Manager content integration * Describe the benefits of using server-to-client software distribution * List the functions and benefits of VMware Workspace ONE© SDK DEVICE EMAIL * List the email clients supported by Workspace ONE UEM * Configure an Exchange Active Sync profile in the Workspace ONE UEM console * Configure VMware Workspace ONE© Boxer settings * Summarize the available email infrastructure integration models and describe their workflows * Configure email compliance policies and notifications services CONTENT SHARING * Describe the benefits of using Content Gateway and the Content Gateway workflows * Describe the benefits of integrating content repositories with Workspace ONE UEM * Configure a repository in the Workspace ONE UEM console MAINTENANCE * Manage endpoints from the Device List View and the Device Details View pages * Analyze endpoint deployment and compliance data from Monitor Overview page FUNDAMENTALS OF TROUBLESHOOTING WORKSPACE ONE UEM * Outline software troubleshooting logic and support methods * Summarize the main process flows for the Workspace ONE UEM components * Explain the importance of Workspace ONE UEM process flows for troubleshooting * Identify different Workspace ONE UEM log files WORKSPACE ONE UEM CONSOLE TROUBLESHOOTING * Outline the best practices for troubleshooting Workspace ONE UEM console issues * Identify common group management and assignment-related issues * Outline common issues for Workspace ONE UEM console roles and system settings * Understand how analytic events can be used to identity platform errors * Summarize the steps for collecting and analyzing Workspace ONE UEM console logs INTEGRATION TROUBLESHOOTING * Outline the common enterprise integrations in Workspace ONE UEM * Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? * Troubleshoot issues related to Directory Services integration * Identify directory user and groups synchronization issues * Troubleshoot issues related to certificate authority integration * Explain VMware Workspace ONE© Access? integration and Workspace ONE Intelligent Hub troubleshooting techniques ENDPOINT TROUBLESHOOTING * Compare the endpoint connection topologies in Workspace ONE UEM * Outline useful tools and resources for endpoint troubleshooting * Summarize the best practices for device enrollment troubleshooting * Explain device connectivity troubleshooting techniques * Demonstrate how to identify and resolve profile-related issues * Identify common compliance policy issues and potential root causes APPLICATION TROUBLESHOOTING * Explain the different scoping questions for troubleshooting applications * Review application management configurations * Summarize the general tools and resources for application troubleshooting * Describe the general logic of troubleshooting public applications * Understand internal application issues and potential causes * Explain purchased application troubleshooting techniques UNIFIED ACCESS GATEWAY AND EDGE SERVICES TROUBLESHOOTING * Review Unified Access Gateway architecture and edge service workflows * Understand Unified Access Gateway general configurations * Explain how to utilize Unified Access Gateway related troubleshooting tools and resources * Identify and resolve common issues for Content Gateway on Unified Access Gateway * Summarize troubleshooting techniques for VMware Workspace ONE© Tunnel? on Unified Access Gateway EMAIL TROUBLESHOOTING * Review different email architecture and workflows * Summarize common errors associated with email profiles * Identify tools and resources for email troubleshooting * Discuss troubleshooting techniques for VMware AirWatch© Secure Email Gateway? on Unified Access Gateway * Outline PowerShell integration issues and techniques to address them ADDITIONAL TROUBLESHOOTING TOOLS * Describe how the Self-Service Portal helps administrators and empowers end users to resolve issues * Explain how Workspace ONE Assist can help with troubleshooting endpoints

VMware Workspace ONE: UEM Bootcamp [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

SA120 - Server Automation 10.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. COURSE OVERVIEW AND INTRODUCTION TO HP SERVER AUTOMATION * ? Discuss the IT organization?s preference for automation * ? Discuss the main features of HP SA * ? Discuss the benefits of using SA * ? Describe the distributed architecture of SA EXPLORING THE ARCHITECTURE AND INTERFACES * ? Define an SA core * ? Describe the functionality of each key component of SA * ? Describe SA users * ? Use the SA client to explore a managed server environment * ? Describe the SA core architecture and key components * ? Learn how to use the SA interfaces to explore the server environment AGENT FUNCTIONALITY AND SERVER INTEGRATION * ? Differentiate the agent types * ? Describe the SA agent functionality * ? Specify the requirements for installing an SA agent onto an unmanaged server * ? Install an agent onto an unmanaged server using the SA client and manual installation * ? Troubleshoot agent installation and communication failures * ? Explore the server inventory using the Device Explorer of the SA client * ? Describe the Agent Tools feature within SA * ? Integrate existing, unmanaged servers into the SA managed environment * ? Summarize what server information is collected by the agent * ? Explain the server module objects * ? Explain agent extensions PROVISIONING OPERATING SYSTEMS (OS) USING OS BUILD PLANS (OSBPS) * ? Describe the Operating System (OS) provisioning feature within SA * ? Describe the process of provisioning an OS on a server * ? Define and run an OS Build Plan (OSBP) DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) LESS OR STATIC IP PROVISIONING * ? Configure and run the Managed Boot Client(s) (MBC) * ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) MANAGING VIRTUALIZATION * ? Describe the supported virtualization management features in SA * ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 * ? Identify the relationship between the hypervisor and its virtual servers * ? Manage the lifecycle of VMware Virtual Machines (VMs) * ? Manage the lifecycle of Solaris zones * ? Integrate with VMware Virtual Center using Virtualization Service (VS) EXPLORING DEVICE GROUPS * ? Explain device groups and their characteristics * ? Describe the different types of device groups supported in SA * ? Create static and dynamic device groups using the SA client EXPLORING DEVICE GROUPS WITH SEARCH RESULTS * ? Describe the different types of search in the SA client * ? Discuss the process to save and retrieve search results * ? Create device groups from search results * ? Develop sample reports using advanced search MANAGING PACKAGES * ? Describe how to manage packages in SA * ? Discuss the supported package types * ? Explain how to organize the software library * ? Import and export packages into the software repository * ? Install and uninstall packages * ? Manage Red Hat Package Manager (RPM) packages SOFTWARE MANAGEMENT * ? Describe the use of policy-based software management in SA * ? Describe how to manage software policies in SA * ? List the software management setup tasks * ? Install and uninstall software using software policies * ? Manage software updates using software policies WORKING WITH APPLICATION DEPLOYMENT MANAGER (ADM) * ? Describe the Application Deployment Manager (ADM) and its functions * ? Manage the ADM * ? Set permissions for ADM * ? Define an application, a target, and a component * ? Deploy an application * ? Manage an Application Deployment job * ? Describe the rollback and undeploy process * ? Import and export Application Deployment data from SA APPLICATION CONFIGURATION MANAGEMENT * ? Describe how application configurations are managed in SA * ? Describe application configuration components * ? Control values using an application configuration inheritance model * ? Push application configuration values to servers MANAGING PATCHES * ? Describe the patch management feature in SA * ? View patch information * ? Describe UNIX patch management tasks * ? Install patches using patch policies on the Windows platform * ? Identify Microsoft patch administration tasks * ? Manage patches on Red Hat LINUX WORKING WITH AUDITS, SNAPSHOTS, AND REMEDIATION * ? Describe the audit and remediation feature in SA * ? Create and run audits * ? Configure file audit rules * ? Set audit rule exceptions * ? View audit results and remediate the differences * ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits ENFORCING COMPLIANCE * ? Define server compliance concepts * ? Describe the compliance management feature in SA * ? Scan and view the compliance status of servers * ? Remediate non-compliant servers EXPLORING SERVERS USING THE GLOBAL SHELL AND GLOBAL FILE SYSTEM * ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA * ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment * ? Describe how to navigate and filter data in the OGFS using the Global Shell * ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server * ? Use the SA remote terminal feature to access and manage servers in the managed environment SCRIPTING WITH SA * ? Describe the script management and execution feature in SA * ? Create scripts using the SA client * ? Execute ad hoc or saved scripts * ? View and download script results * ? Describe PowerShell integration with SA * ? Explain the Extensible Discovery server module * ? Introduce Automation Platform eXtensions (APX) scripting EXPLORING REPORTS IN SA * ? Explain SA reports * ? List the reports available in SA * ? Generate an SA report * ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS PROVISIONING WITH OS SEQUENCES * ? Describe the OS Provisioning feature within SA * ? Describe the process of provisioning an OS on a server * ? Define and run an OS Sequence

SA120 - Server Automation 10.x Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools * Searching in the Configuration Manager console * Using Windows PowerShell with Configuration Manager * Using Configuration Manager Service Manager to manage components * Monitoring site and component status * Reviewing log files by using the Configuration Manager Trace tool * Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. * Describe the Configuration Manager architecture. * Describe the management tools that you use to perform administrative functions for Configuration Manager. * Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. ANALYZING DATA USING QUERIES AND REPORTS * Introduction to queries * Configuring Microsoft SQL Server Reporting Services (SSRS) * Lab : Creating and running queriesConfiguring boundaries and resource discovery * Creating data queries * Creating subselect queries * Creating status message queries * Lab : Configuring SSRS * Configuring a reporting services point * Creating a report by using Report Builder * Create and configure data and status message queries. * Configure and manage SSRS and the reporting services point. PREPARING THE MANAGEMENT INFRASTRUCTURE TO SUPPORT PCS AND MOBILE DEVICES * Configuring site boundaries and boundary groups * Configuring resource discovery * Configuring the Exchange Server Connector for mobile device management * Configuring user and device collections * Lab : Configuring boundaries and resource discovery * Configuring boundaries, boundary groups, and fallback relationships * Configuring Active Directory discovery methods * Lab : Configuring user and device collections * Creating a device collection * Creating a user collection * Configuring a maintenance window * Configure boundaries and boundary groups. * Configure resource discovery. * Configure the Exchange Server connector mobile device management. * Organize resources using device and user collections. DEPLOYING AND MANAGING CLIENTS * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings in Configuration Manager * Lab : Deploying the Microsoft System Center Configuration Manager client software * Preparing the site for client installation * Deploying the Configuration Manager client software by using client push installation * Lab : Configuring and monitoring client status * Configuring and monitoring client health status * Lab : Managing client settings * Configuring client settings * Describe the requirements and considerations for installing the Configuration Manager client software. * Deploy the Configuration Manager client software. * Configure and monitor client status. * Manage Configuration Manager client settings. MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Configuring and managing hardware inventory * Lab : Configuring software metering * Configuring software metering * Lab : Configuring and managing Asset Intelligence * Preparing the site for Asset Intelligence * Configuring Asset Intelligence * Monitoring license agreements by using Asset Intelligence * Viewing Asset Intelligence reports * Describe inventory collection. * Configure and collect hardware and software inventory. * Manage inventory collection. * Configure software metering. * Configure Asset Intelligence. DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments * Installing a new distribution point * Managing content distribution * Prepare the infrastructure for content management. * Distribute and manage content on distribution points. DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Installing and configuring the Application Catalog roles * Creating applications with requirements * Deploying applications * Lab : Managing application supersedence and removal * Managing application supersedence * Uninstalling the Excel Viewer application * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Configuring support for App-V * Deploying virtual applications * Lab : Using Configuration Manager to deploy Windows Store apps * Configuring support for sideloading Windows Store apps * Configuring a Windows Store app * Deploying Windows 10 apps to users * Describe the application management features of Configuration Manager. * Create applications. * Deploy applications. * Manage applications. * Configure and deploy virtual applications. * Configure and deploy Windows Store apps. MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Lab : Configuring the site for software updates * Configuring and synchronizing the software update point * Lab : Deploying and managing software updates * Determining software update compliance * Deploying software updates to clients * Configuring automatic deployment rules * Describe how the software updates feature integrates with Configuration Manager. * Prepare the Configuration Manager site for software updates. * Manage the evaluation and deployment of software updates. * Configure automatic deployment rules. * Monitor and troubleshoot software updates. IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Lab : Implementing Microsoft System Center Endpoint Protection * Configuring the System Center Endpoint Protection point and client settings * Configuring and deploying Endpoint Protection policies * Monitoring Endpoint Protection * Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. * Configure, deploy, and manage Endpoint Protection policies. MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand
£26.99

AZ-900 | Microsoft Azure Fundamentals Full Course

4.3(43)

By John Academy

COURSE OVERVIEW Learn about the functions of Microsoft Azure from this AZ-900 | Microsoft Azure Fundamentals Full Course course. The course will give you a clear understanding of the basics of Microsoft Azure and how you can use this cloud platform to grow and strengthen your online existence. In this AZ-900 | Microsoft Azure Fundamentals Full Course course, you will learn about the tools and basic functions of Microsoft Azure. You will be familiarized with the core Azure services, security, privacy and compliance policies. This course will teach you how you can secure your website and account using multi-factor authentication and protect data from hackers. This course will also help you to understand the supports Azure can offer you and get the best suitable one for you. Microsoft Azure is one of the most popular and safe cloud platforms. This AZ-900 | Microsoft Azure Fundamentals Full Course course will teach you the functions of Microsoft Azure from scratch. You don't need any prior knowledge or technical background to understand the lessons of this course. LEARNING OUTCOMES * familiarize with the fundamentals of cloud services  * Understand the benefits of using cloud services  * Learn about the differences between capital expenditure and operational expenditure  * Be able to compare and contrast the IAAS, PAAS and SAAS service  * Learn about different cloud models and how they work  * Understand the core Azure architectural components  * Learn about the solutions you will get from Azure  * Learn about the management tools of Azure  * Get to know about the security and private privacy protocols of Microsoft Azure  * Understand how Azure identity services work * Familiarize with role-based access control system  * Understand the policies and compliance standards in Azure WHO IS THIS COURSE FOR? This comprehensive AZ-900 | Microsoft Azure Fundamentals Full Course is ideal for those who want to learn more about the functions of Microsoft Azure. You will learn about the application of Microsoft Azure and the career prospect from this course. ENTRY REQUIREMENT * This course is available to all learners, of all academic backgrounds. * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. CERTIFICATION * After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. * PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry-leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognized accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH AZ-900 | Microsoft Azure Fundamentals Full Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: * Managers  * Managing Directors  * Management Executives  * Data Security Officers  * Programmers  * Microsoft Azure Developers  * Technicians  * Computer Operators  * Cloud Engineers  * Cloud Data Consultants  * Azure Consultants  * Data Scientists Course Introduction Introduction 00:04:00 Module 1 : Cloud Concepts What is Cloud Computing - I 00:05:00 What is Cloud Computing - II 00:06:00 Benefits of Cloud Computing 00:09:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 CapEx Vs OpEx 00:03:00 Cloud Models : What is Public Cloud 00:02:00 Cloud Models : Characteristics of Public Cloud 00:02:00 Cloud Models : What is Private Cloud 00:01:00 Cloud Models : Characteristics of Private Cloud 00:01:00 Cloud Models : Hybrid Cloud 00:01:00 Cloud Models : Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is IAAS 00:04:00 Use Cases of IAAS 00:02:00 What is PAAS ? 00:02:00 Use Cases of PAAS 00:04:00 What is SAAS ? 00:02:00 Cloud Models : Shared Responsibility Model 00:09:00 Module 2 : Core Azure Services Introduction 00:01:00 Azure Regions 00:01:00 Special Azure regions 00:01:00 Region pairs 00:01:00 Feature Availability Region Wise 00:01:00 Availability Zones 00:01:00 Availability Sets 00:02:00 What are Resource Groups? 00:02:00 Azure Resource Manager 00:01:00 What Next!! - Azure Core Services and Products 00:02:00 What is Azure Compute 00:01:00 Azure Virtual Machines - Audiocast Only 00:01:00 Azure Virtual Machines I - LAB 00:15:00 Azure Virtual Machines II - LAB 00:01:00 Azure Virtual Machines III - LAB 00:02:00 Azure Virtual Machines IV - LAB 00:04:00 Azure Virtual Machines V - LAB 00:03:00 Azure Virtual Machines VI - LAB 00:03:00 What are Containers? 00:04:00 Containers ( LAB Activity ) 00:07:00 Containers VS Virtual Machines 00:04:00 What Are Virtual Networks 00:01:00 Virtual Networks - LAB 00:15:00 Azure Load Balancer 00:01:00 VPN Gateway 00:01:00 Azure Application Gateway - I 00:02:00 Azure Application Gateway - II 00:01:00 Azure Content Delivery Networks (CDN's) 00:02:00 How CDN works ? 00:03:00 Azure CDN - Lab Activity 00:07:00 Azure Storage Services 00:01:00 Structured Data 00:01:00 Semi Structured Data 00:01:00 Unstructured Data 00:01:00 Azure Storage Account - Types 00:03:00 Azure Storage Account - Blob - Lab Activity - I 00:07:00 Azure Storage Account - Blog - Lab Activity - II 00:07:00 Azure Storage Account - Blob - Lab Activity - III 00:16:00 Azure Storage Account - Blog - Lab Activity - IV 00:09:00 Azure Storage Account - Blob - Lab Activity - V 00:04:00 Azure Storage Account - Blob - Lab Activity - VI 00:07:00 Azure Database Services 00:02:00 Azure SQL - Lab Demo 00:09:00 Azure MarketPlace 00:02:00 What is Internet of Things ( IOT ) - Intro 00:01:00 IOT Hub 00:01:00 IOT Hub Demo 00:09:00 Azure Big Data and Analytics 00:01:00 Azure SQL Data Warehouse 00:01:00 Azure HDInsights 00:01:00 Azure Data Lake Analytics 00:01:00 Machine Learning 00:02:00 Azure Machine Learning Services and Studio 00:02:00 What is Server less Computing ? 00:02:00 The concept of DevOps 00:03:00 Azure Management Tools 00:01:00 Creating Resources with Powershell - Lab Activity 00:05:00 Creating Resources with Azure CLI - Lab Activity 00:07:00 Provision Resources using Cloud Shell - Lab Activity 00:05:00 Deployment with JSON - Lab Activity 00:08:00 Azure Advisor 00:01:00 Module 2 : What did we learn 00:01:00 Module 3 Security, Privacy, Compliance and Trust What to expect in Module 3 00:01:00 Azure Firewalls 00:02:00 Azure Firewall - Lab Activity - notes 00:02:00 Azure Firewall - Lab Activity 00:19:00 Azure DDOS 00:02:00 Network Security Groups 00:03:00 Application Security Groups 00:02:00 Which Network Security Solution to choose from ? 00:04:00 AuthZ and AuthN 00:01:00 Azure Active Directory 00:02:00 Multi Factor Authentication 00:03:00 Azure Security Center 00:02:00 Azure Security center - LAB activity 00:08:00 Azure Key Vault 00:02:00 Azure Information Protection 00:02:00 Azure Advanced Threat Protection 00:04:00 What is Azure Policy 00:03:00 Azure Policy - Lab Activity 00:06:00 Azure Role Based Access Control ( RBAC ) 00:02:00 Azure Role Based Access Control ( RBAC ) - Lab Activity 00:07:00 Azure Locks 00:01:00 Azure Locks - Lab Activity 00:02:00 Azure Blueprints 00:01:00 Subscription Governance 00:02:00 Azure Tags 00:03:00 Azure Monitoring 00:02:00 Azure Monitor- Lab Activity 00:03:00 Azure Service Health 00:01:00 Monitoring Applications and Services 00:04:00 Compliance Terms and Requirements 00:02:00 Microsoft Privacy Statement 00:01:00 Microsoft Trust Center 00:01:00 Service Trust Portal 00:01:00 Azure Government Services 00:02:00 Azure Germany Services 00:01:00 Azure China 21Vianet 00:02:00 Module 4 : Azure Pricing and Support Module 4 Introduction : What tÌ¥o expect in this module 00:02:00 Azure Subscriptions 00:06:00 What are Management Groups 00:01:00 Purchase Azure Product & Services : Available Options 00:01:00 Usage Metrics 00:01:00 Factors Affecting Costs 00:02:00 The concept of Zones for Billing 00:02:00 Azure Pricing Calculator 00:04:00 Azure Total Cost of Ownership ( TCO ) 00:02:00 Ways to Minimize Costs in Azure 00:04:00 Azure Cost Management 00:02:00 Azure Support Plans 00:03:00 Alternative Support Options 00:02:00 Service Level Agreements ( SLA's ) 00:03:00 Composite SLA's 00:03:00 Improving Application SLA's 00:04:00 Public and Preview Features 00:01:00 Providing Feedback 00:01:00 General Availability 00:01:00 Azure Updates , Announcements and Roadmaps 00:01:00 Course Conclusion Course Conclusion 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

AZ-900 | Microsoft Azure Fundamentals Full Course
Delivered Online On Demand
£18

SC-200: Microsoft Security Operations Analyst

By Packt

A carefully structured course loaded with lab exercises that will help you learn all about implementing Microsoft Defender for Endpoint platform the right way. The course's learning path aligns with the SC-200: Microsoft Security Operations Analyst Exam.

SC-200: Microsoft Security Operations Analyst
Delivered Online On Demand
£41.99

SC-300: Microsoft Identity and Access Administrator

By Packt

Learn all about Microsoft identity and Azure security the right way with tons of lab exercises. A course that aims to prepare students for the prestigious SC-300: Microsoft Identity and Access administrator exam. The course adheres to the new curriculum and objectives.

SC-300: Microsoft Identity and Access Administrator
Delivered Online On Demand
£41.99

CompTIA Security+

5.0(2)

By Studyhub UK

Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.  The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. LEARNING OUTCOMES 1. Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. 2. Acquire proficiency in various cryptographic methods and their importance in securing data. 3. Gain insights into effective identity and account management to enhance system security. 4. Learn to utilize essential security tools for safeguarding individual and network systems. 5. Master the skills to implement and manage security measures for both wired and wireless networks. WHY BUY THIS COMPTIA SECURITY+? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. CERTIFICATION After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? * Individuals aiming to start a career in cybersecurity. * IT professionals seeking to deepen their knowledge in network security. * System administrators wanting to enhance their security skills. * Students interested in acquiring a foundational understanding of cybersecurity principles. * Professionals aiming to achieve the CompTIA Security+ certification for career advancement. PREREQUISITES This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH * Cybersecurity Analyst: £30,000 - £60,000 annually * Information Security Manager: £40,000 - £75,000 annually * Network Security Engineer: £35,000 - £65,000 annually * Security Consultant: £35,000 - £70,000 annually * Systems Administrator (with security specialization): £25,000 - £50,000 annually * IT Security Coordinator: £28,000 - £55,000 annually COURSE CURRICULUM Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00

CompTIA Security+
Delivered Online On Demand
£10.99

Educators matching "Powershell"

Show all 6
Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.

iStudy UK

istudy uk

We understand more than anyone how important it is for you to get the right qualifications at the right time. We also understand that when you have a lot to do, you might not always have the time free to go to a place of study. That is why we created this site, so you can take all the time you need to learn more about your chosen topics as well as be able to do the whole thing from home. We believe in empowering people by offering them opportunities to expand and extend their knowledge and skill set as well as giving them the support they need to achieve great things. With thousands of courses available and a team who will do just about anything to help you, it is safe to say that you will not find a better course provider on the internet and so we would love to work with you to make sure that you get the best experience and best results out of your education. WHAT WE DO Here at iStudy we provide a range of online training courses for those who want to gain new skills, and qualifications and update their knowledge. iStudy training courses are delivered entirely online through our sophisticated student learning portal. The student learning portal is an online learning management system that allows students to study for their courses online. This innovative technology means there is no need to attend any classes or take time off work to study. Professionally accredited courses All our courses are delivered in partnership with nationally recognised awarding bodies so be assured that what you learn with us matters when it comes to achieving your career goals. Study that suits you You do not have to give up your job or your life to get a new qualification, you can learn anytime, anywhere.