• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10054 Professional Skills Course (PSC) courses delivered Online

Oracle 19c Database Backup and Recovery (TTOR21619)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This hands-on course is geared for experienced DBAs already working with Oracle. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll learn how to: Implement backup and recovery settings and perform backup operations to the media of your choice. Move data between databases and files Use Oracle Database recovery processes to recover from media and other failures. Diagnose and repair data failures Use flashback technologies and data duplication to complement backup and recovery procedures Secure the availability of their database using backup and recovery strategies Geared for DBAs and other technical support staff, Oracle Database 19c Backup and Recovery is a hands-on course that allows you to develop appropriate backup and recovery procedures to address their business model and requirements. Throughout the course you?ll explore how to implement basic backup and recovery procedures, move data between databases and files, and employ basic monitoring procedures. You?ll also learn how to secure the availability of a database by using appropriate backup and recovery strategies, how to how to perform backup and recovery operations using RMAN, and how to use Flashback features to recover from human error. This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you?ll learn how to:Implement backup and recovery settings and perform backup operations to the media of your choice.Move data between databases and filesUse Oracle Database recovery processes to recover from media and other failures.Diagnose and repair data failuresUse flashback technologies and data duplication to complement backup and recovery proceduresSecure the availability of their database using backup and recovery strategies BACKUP METHODS * User Managed Backups * Oracle Managed Backups Types of Failures * Types of Recoveries RECOVERY CONFIGURATION * Configuring the Database for Archivelog * Configuring the Database for No-Archivelog * Configuring the Flash Recovery Area CONFIGURING RMAN * RMAN Default Settings * Command Line * Enterprise Manager RMAN BACKUPS * Full RMAN Backup * Compressed Backups * Uncompressed Backups * Partial RMAN Backup * Incremental Backups * Change Tracking File MANAGING BACKUPS * Backup Reports * Backup Maintenance * Backup Catalog * Backup Crosscheck RMAN COMPLETE RECOVERY * RMAN Complete Recovery * Database Recovery * Tablespace Recovery * Datafile Recovery RMAN IN-COMPLETE RECOVERY * Time Based Recovery * Sequence Based Recovery * SCN Based Recovery NON-DATABASE FILE RECOVERY * Spfile Recovery * Controlfile Recovery * Incremental Recovery * Flash Recovery Area for a Fast Recovery USER MANAGED BACKUP * Configuring User Managed Backups * Perform a User Managed Backup USER MANAGED RECOVERY * User Managed Complete Recovery * User Managed Incomplete Recovery CONFIGURING FLASHBACK * Flashback Query * Flashback Drop * Flashback Database PERFORMING FLASHBACK RECOVERIES * Flashback Query * Flashback Drop * Flashback Transaction Query * Flashback Versions Query PERFORMING FLASHBACK DATABASE * Determining the FRA Size * FRA Retention * Performing a Flashback Database RMAN DUPLICATE COMMAND * Setting up for a Duplicate Database * Creating the Duplicate spfiles * Performing the Duplicate Command. RMAN RECOVERY CATALOG * Configuring for the Recovery Catalog * Creating the Recovery Catalog BACKUPS WITH THE RECOVERY CATALOG * Registering the Database with the Recovery Catalog * Performing Backups with the Recovery Catalog RECOVERIES WITH THE RECOVERY CATALOG * Identifying Type of Recoveries with the Recovery Catalog * Performing Recoveries with the Recovery Catalog RECOVERY CATALOG MAINTENANCE * Registering Additional Databases with the Recovery Catalog * Cataloging Additional Backups with the Recovery Catalog * Recovery Catalog Scripts DATAPUMP * Configuring Datapump * DataPump Exports * DataPump Imports TUNING RMAN * RMAN Sessions * RMAN Channels * RMAN Job Progress ADDITIONAL COURSE DETAILS: Nexus Humans Oracle 19c Database Backup and Recovery (TTOR21619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Backup and Recovery (TTOR21619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Backup and Recovery (TTOR21619)
Delivered on-request, onlineDelivered Online
Price on Enquiry

QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. INTRODUCTION TO PROMPT ENGINEERING * Understand the fundamentals of prompt engineering and its applications in the business world. * What is prompt engineering? * Importance of prompt engineering in business * Key concepts and terminology * Examples of prompt engineering in business scenarios * Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) * Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, * where they will experiment with different prompt engineering tools to answer a set of questions. DEVELOPING EFFECTIVE PROMPTS * Learn how to create and refine prompts for a variety of business applications. * Anatomy of a good prompt * Understanding context and user intent * Techniques for prompt iteration and optimization * Generating specific and creative responses * Handling sensitive information and biases * Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, * game-like environment, where they will compete to create the most effective prompts for given business scenarios. INTEGRATING PROMPT ENGINEERING INTO BUSINESS PROCESSES * Discover how to incorporate prompt engineering solutions into existing workflows. * Identifying business processes that can benefit from prompt engineering * Integrating prompt engineering with existing software and tools * Evaluating the success and impact of prompt engineering solutions * Ensuring data privacy and security * Scaling prompt engineering solutions across an organization * Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt * engineering solution into a simulated business process, with a focus on creativity and practicality. ADVANCED TECHNIQUES AND BEST PRACTICES * Gain insights into advanced techniques and best practices for prompt engineering in a business context. * Leveraging APIs for prompt engineering * Customizing and fine-tuning language models * Adapting to changing business requirements and trends * Collaborating with cross-functional teams * Staying up-to-date with prompt engineering advancements * Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced * techniques to solve complex business-related prompt engineering challenges. ADDITIONAL COURSE DETAILS: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

QuickStart to Prompt Engineering for Everyday Business Users  (TTAI2009)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Client Management Suite 7.6 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. INTRODUCTION * Course overview The classroom lab environment UNDERSTANDING THE SYMANTEC CLIENT MANAGEMENT SUITE * Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work THE SYMANTEC MANAGEMENT CONSOLE * Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views SYMANTEC MANAGEMENT PLATFORM BASICS * Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets DEPLOYING THE SYMANTEC MANAGEMENT AGENT * Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings GATHERING INVENTORY FROM MANAGED COMPUTERS * Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports MANAGING THE SOFTWARE CATALOG * Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products DELIVERING SOFTWARE TO MANAGED COMPUTERS * Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports MANAGING SOFTWARE WITH APPLICATION METERING * Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports MANAGING ORGANIZATIONAL VIEWS AND ORGANIZATIONAL GROUPS * Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups MANAGING RESOURCE FILTERS AND RESOURCE TARGETS * More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets MANAGING SOFTWARE UPDATES ON WINDOWS COMPUTERS * Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports MANAGING VIRTUALIZED SOFTWARE * Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software REMOTELY MANAGING COMPUTERS * Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports MANAGING POLICIES * Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules MANAGING JOBS AND TASKS * Overview of task management Creating and scheduling tasks and jobs OVERVIEW OF DEPLOYMENT SOLUTION * Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging REPORTING * Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution SITE MANAGEMENT * Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services SECURITY * Learning about security Managing user accounts, security roles, and privileges Managing permissions ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Client Management Suite 7.6 - Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI™) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System™ (Cisco UCS) Describe Cisco HyperFlex™ infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies This course helps you prepare for the CiscoÿCCNPÿData Center and CCIEÿData Center certifications. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center. IMPLEMENTING DATA CENTER SWITCHING PROTOCOLS* * Spanning Tree Protocol * Port Channels Overview IMPLEMENTING FIRST-HOP REDUNDANCY PROTOCOLS* * Hot Standby Router Protocol (HSRP) Overview * Virtual Router Redundancy Protocol (VRRP) Overview IMPLEMENTING ROUTING IN DATA CENTER* * Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 * Border Gateway Protocol IMPLEMENTING MULTICAST IN DATA CENTER* * IP Multicast in Data Center Networks * Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) IMPLEMENTING DATA CENTER OVERLAY PROTOCOLS * Cisco Overlay Transport Virtualization * Virtual Extensible LAN IMPLEMENTING NETWORK INFRASTRUCTURE SECURITY* * User Accounts and Role Based Access Control (RBAC) * Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS DESCRIBING CISCO APPLICATION-CENTRIC INFRASTRUCTURE * Cisco ACI Overview, Initialization, and Discovery * Cisco ACI Management DESCRIBING CISCO ACI BUILDING BLOCKS AND VMM DOMAIN INTEGRATION * Tenant-Based Components * Cisco ACI Endpoints and Endpoint Groups (EPG) DESCRIBING PACKET FLOW IN DATA CENTER NETWORK* * Data Center Traffic Flows * Packet Flow in Cisco Nexus Switches DESCRIBING CISCO CLOUD SERVICE AND DEPLOYMENT MODELS * Cloud Architectures * Cloud Deployment Models DESCRIBING DATA CENTER NETWORK INFRASTRUCTURE MANAGEMENT, MAINTENANCE, AND OPERATIONS* * Time Synchronization * Network Configuration Management EXPLAINING CISCO NETWORK ASSURANCE CONCEPTS* * Need for Network Assurance * Cisco Streaming Telemetry Overview IMPLEMENTING FIBRE CHANNEL FABRIC * Fibre Channel Basics * Virtual Storage Area Network (VSAN) Overview IMPLEMENTING STORAGE INFRASTRUCTURE SERVICES * Distributed Device Aliases * Zoning IMPLEMENTING FCOE UNIFIED FABRIC * Fibre Channel over Ethernet * Describing FCoE IMPLEMENTING STORAGE INFRASTRUCTURE SECURITY* * User Accounts and RBAC * Authentication, Authorization, and Accounting DESCRIBING DATA CENTER STORAGE INFRASTRUCTURE MAINTENANCE AND OPERATIONS* * Time Synchronization * Software Installation and Upgrade DESCRIBING CISCO UCS SERVER FORM FACTORS* * Cisco UCS B-Series Blade Servers * Cisco UCS C-Series Rack Servers IMPLEMENTING CISCO UNIFIED COMPUTING NETWORK CONNECTIVITY * Cisco UCS Fabric Interconnect * Cisco UCS B-Series Connectivity IMPLEMENTING CISCO UNIFIED COMPUTING SERVER ABSTRACTION * Identity Abstraction * Service Profile Templates IMPLEMENTING CISCO UNIFIED COMPUTING SAN CONNECTIVITY * iSCSI Overview * Fibre Channel Overview IMPLEMENTING UNIFIED COMPUTING SECURITY * User Accounts and RBAC * Options for Authentication INTRODUCING CISCO HYPERFLEX SYSTEMS* * Hyper converged and Integrated Systems Overview * Cisco HyperFlex Solution DESCRIBING DATA CENTER UNIFIED COMPUTING MANAGEMENT, MAINTENANCE, AND OPERATIONS* * Compute Configuration Management * Software Updates IMPLEMENTING CISCO DATA CENTER AUTOMATION AND SCRIPTING TOOLS* * Cisco NX-OS ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2
Delivered on-request, onlineDelivered Online
Price on Enquiry

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance * Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction * RESTORING FROM BACKUP * Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time * Using Secure Restore to prevent the restoration of malware * Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios BACKUP COPY JOBS * Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery * Utilizing tape jobs, how to create and modify REPLICATION * Identify and describe the options available for replication, the use cases and impacts of using * Create, modify and delete replication jobs, outline considerations to ensure success FAILOVER * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios ADVANCED REPOSITORY CAPABILITIES * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure * Ensure scalability by integrating off-site S3 storage * Ensure compatibility with existing deduplication appliances TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots * Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production VEEAM BACKUP ENTERPRISE MANAGER * Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. * Create user and group roles, delegate workloads whilst maintaining data control * Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords VEEAM ONE * Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available * Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage * Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business SUPPORT * Locate, migrate or restore backup configuration * Identify and locate appropriate support resources * Troubleshooting methodology to identify, isolate and remediate support issues ADDITIONAL COURSE DETAILS: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered on-request, onlineDelivered Online
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. FOUNDATIONS OF GCP SECURITY * Google Cloud's approach to security * The shared security responsibility model * Threats mitigated by Google and by GCP * Access Transparency CLOUD IDENTITY * Cloud Identity * Syncing with Microsoft Active Directory * Choosing between Google authentication and SAML-based SSO * GCP best practices IDENTITY AND ACCESS MANAGEMENT * GCP Resource Manager: projects, folders, and organizations * GCP IAM roles, including custom roles * GCP IAM policies, including organization policies * GCP IAM best practices CONFIGURING GOOGLE VIRTUAL PRIVATE CLOUD FOR ISOLATION AND SECURITY * Configuring VPC firewalls (both ingress and egress rules) * Load balancing and SSL policies * Private Google API access * SSL proxy use * Best practices for structuring VPC networks * Best security practices for VPNs * Security considerations for interconnect and peering options * Available security products from partners MONITORING, LOGGING, AUDITING, AND SCANNING * Stackdriver monitoring and logging * VPC flow logs * Cloud audit logging * Deploying and Using Forseti SECURING COMPUTE ENGINE: TECHNIQUES AND BEST PRACTICES * Compute Engine service accounts, default and customer-defined * IAM roles for VMs * API scopes for VMs * Managing SSH keys for Linux VMs * Managing RDP logins for Windows VMs * Organization policy controls: trusted images, public IP address, disabling serial port * Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys * Finding and remediating public access to VMs * VM best practices * Encrypting VM disks with customer-supplied encryption keys SECURING CLOUD DATA: TECHNIQUES AND BEST PRACTICES * Cloud Storage and IAM permissions * Cloud Storage and ACLs * Auditing cloud data, including finding and remediating publicly accessible data * Signed Cloud Storage URLs * Signed policy documents * Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys * Best practices, including deleting archived versions of objects after key rotation * BigQuery authorized views * BigQuery IAM roles * Best practices, including preferring IAM permissions over ACLs PROTECTING AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS: TECHNIQUES AND BEST PRACTICES * How DDoS attacks work * Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor * Types of complementary partner products APPLICATION SECURITY: TECHNIQUES AND BEST PRACTICES * Types of application security vulnerabilities * DoS protections in App Engine and Cloud Functions * Cloud Security Scanner * Threat: Identity and Oauth phishing * Identity Aware Proxy CONTENT-RELATED VULNERABILITIES: TECHNIQUES AND BEST PRACTICES * Threat: Ransomware * Mitigations: Backups, IAM, Data Loss Prevention API * Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content * Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API ADDITIONAL COURSE DETAILS: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere with Tanzu: Deploy and Manage [V7]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes Overview By the end of the course, you should be able to meet the following objectives: Describe vSphere with Kubernetes and use cases in on-premises environments Deploy vSphere with Kubernetes Describe the VMware NSX networking requirements for vSphere with Kubernetes. Create and manage vSphere with Kubernetes namespaces Deploy and run container applications on vSphere with Kubernetes Deploy and configure VMware Harbor Describe the VMware Tanzu™ Kubernetes Grid™ service Deploy a Tanzu Kubernetes Grid cluster Deploy and run container applications on a Tanzu Kubernetes Grid cluster Describe the vSphere with Kubernetes lifecycle Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes During this 3-day course, you focus on deploying and managing VMware vSphere© with Kubernetes. You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a VMware vSphere© environment. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO CONTAINERS AND KUBERNETES * Describe Virtual Machines and Containers * Describe Container Hosts * Describe Container Engines * Describe Dockerfile * Describe Container Images * Describe Image Registry * Describe the purpose and functionality of Kubernetes * Describe Manifest YAML files * Explain Pod YAML files * Explain ReplicaSets * Explain Services * Explain Deployments INTRODUCTION TO VSPHERE WITH KUBERNETES * Describe the purpose and functionality of vSphere with Kubernetes * Explain the integration with VMware Tanzu? Mission Control? * Describe the capabilities of vSphere with Kubernetes * Describe the components of vSphere with Kubernetes * Contrast vSphere with Kubernetes to traditional Kubernetes * Describe the requirements for vSphere with Kubernetes * Prepare a vSphere cluster for vSphere with Kubernetes * Describe the NSX components required for vSphere with Kubernetes * Describe the network topology of vSphere with Kubernetes * Explain the networking requirements of vSphere with Kubernetes * Compare NSX networking objects with Kubernetes networking objects VSPHERE WITH KUBERNETES CORE SERVICES * Explain the architecture of the vSphere with Kubernetes Core Services * Describe the Container Service * Describe the Volume Service * Describe the Network Service * Describe the Registry Service * Describe the use cases of vSphere with Kubernetes * Enable vSphere with Kubernetes * Deploy VMware Harbor Registry VSPHERE WITH KUBERNETES NAMESPACES * Describe a vSphere with Kubernetes namespace * Contrast a vSphere with Kubernetes namespace to a traditional Kubernetes namespace * Describe Resource Quotas * Explain Authentication and Authorization to vSphere with Kubernetes * Explain the use cases of namespaces * Create a namespace * Describe kubectl * Use kubectl to interact with vSphere with Kubernetes * Describe using kubectl pod deployment * Explain scaling a pod deployment * Explain managing pod lifecycle * Explain deleting pods * Use kubectl to deploy a pod * Use kubectl to scale a pod * Use kubectl to switch between namespaces VMWARE TANZU KUBERNETES GRID SERVICE * Explain Tanzu Kubernetes Grid service * Describe the use cases for Tanzu Kubernetes Grid clusters * Describe the integration with Tanzu Mission Control * Explain the lifecycle of Tanzu Kubernetes Grid clusters * Deploy Tanzu Kubernetes Grid cluster * Deploy pods to a Tanzu Kubernetes Grid cluster MONITORING AND TROUBLESHOOTING * Describe the monitoring tools for vSphere with Kubernetes * Describe the troubleshooting tools for vSphere with Kubernetes * Explain cluster, node, and namespace health * Explain usage and capacity monitoring * Describe vCenter Server events * Describe vSphere with Kubernetes events * Gather support information VSPHERE WITH KUBERNETES LIFECYCLE * Describe the vSphere with Kubernetes lifecycle * Describe the Tanzu Kubernetes Grid lifecycle * Describe scaling a vSphere with Kubernetes cluster * Update vSphere with Kubernetes * Update Tanzu Kubernetes Grid clusters * Remove vSphere with Kubernetes ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere with Tanzu: Deploy and Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere with Tanzu: Deploy and Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere with Tanzu: Deploy and Manage [V7]
Delivered on-request, onlineDelivered Online
Price on Enquiry

BA17 - Advanced Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA FOUNDATION CONCEPTS AND OBJECTIVES * Section Learning Objectives * Discuss Definitions ? IT Perspective * Discuss What is a problem and why do they exist? * Exercise 1a: Why is RCA important * What is Root Cause? * RCA Benefits and Approaches * Exercise 1b: Why are multiple approaches important? * Event and Casual Analysis * Exercise 1c: Apply Event and Causal Analysis * Event and Causal Analysis: Exercise 1c Worksheet * RCA Tools for each approach * Exercise 1D: Prepare for Case Study * Section Summary and Conclusions ENHANCE USE OF RCA TOOLS * Why use a Particular Method * Tool: Change Analysis * Change Analysis Examples * Exercise 2a: Apply Change Analysis * Exercise 2b: Change Analysis Worksheet * Tool: How to Resolve Conflict * Tool: 5 Why?s * Example Learning Management Problem * Exercise 2b: Apply 5 Why?s Sequence-of-Events * Exercise 2b: Worksheet * Tool: Cause and Effect * Exercise 2c: Apply Cause and Effect * Exercise 2c: Cause and Effect Worksheet * Tool: Fault Tree Analysis * Why do we use Fault Tree Analysis? * How does it work? * Fault Tree Diagram Symbols * Example #1 of FTA: Car Hits Object * Exercise 2D: Apply Fault Tree Analysis * Tool: Failure Modes and Effects Analysis (FMEA) * Example: Failure Modes and Effects Analysis * Exercise 2E: Apply FMEA * Tool: Design / Application Review * Exercise 2d: Apply Design/Application Review * Section summary & conclusions PROBLEM RESOLUTION & PREVENTION * Section Objectives * The Secret of Solving Problems * A Note about Statistical Control * A Note about Fire Fighting * Technique: Business Process Mapping * Example: IGOE * Exercise 3A: Problem as IGOE * Exercise 3A: IGOE Template * Technique: Lean Six Sigma and DMAIC * Lean Six Sigma Benefits * Exercise 3B: Apply Lean Six Sigma * Importance of Understanding the Business Process * The Business Process Mandate * Technique: Process Modeling * Graphical Notation Standard (BPMN) * What is Business Process Modeling Notation (BPMN)? * Benefits of BPMN * Basic Components of BPMN * Exercise 3C: Use BPMN to Document a Current State * Technique: Business Process Maturity Model * Five Levels of Maturity * Exercise 3D: Appraise Business Process Maturity Level * Section Summary and Conclusions CAPABILITY IMPROVEMENT FOR RCA * Section Learning Objectives * Steps in Disciplined Problem Solving * RCA as a RCA Process * Key RCA Role Considerations * Exercise 4A: Apply RCA to RCA Process * Sustainable RCA Improvement * Organizational Units * Process Area Goals, Practices * Specific and General Practices * Specific Practice Examples * Software Maturity Survey * Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA * SWOT Analysis Worksheet * Recognize the importance of the Change Management component in your RCA implementation * Using the ADKAR Model to Communicate Change * Review ADKAR© Model ? * Awareness of the need for change * Desire to participate and support the change * Knowledge on how to change * Ability to implement required skills and behaviors * Reinforcement to sustain the change * Exercise 4C: Create an Ability Checklist * The ADKAR Model: Reinforcement * Exercise 4D: Find two examples of how ADKAR will be different * Section Summary and Conclusions COURSE SUMMARY & CONCLUSIONS * Plan the Proposal and Business Case * Example: 1 Page Business Case * Exercise 5A: Creating Action Plans * Resource Guide * Questions ADDITIONAL COURSE DETAILS: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA17 - Advanced Root Cause Analysis
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to Premiere Pro CC

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Anyone who'd like to learn Adobe Premiere Pro CC Those that plan to take the Adobe Certfied Expert (ACE) exam Overview Introduction to Premiere Pro CC will allow you to learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. In this three-day course, you?ll get a thorough overview of the interface, tools, features, and production flow for Premiere Pro CC. The course is an ideal combination of instructor-led demonstration and hands-on practice to introduce you to Adobe Premiere Pro software, a revolutionary 64-bit nonlinear video-editing application. You will learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. TOURING ADOBE PREMIERE PRO CC * Nonlinear editing in Adobe Premiere Pro * Expanding the workflow * Touring the Adobe Premiere Pro interface SETTING UP A PROJECT * Setting up a project * Setting up a sequence IMPORTING MEDIA * Importing assets * Working with the Media Browser * Importing images * The media cache * Capturing the videotape ORGANIZING MEDIA * The Project panel * Working with bins * Organizing media with content analysis * Monitoring footage * Modifying clips ESSENTIALS OF VIDEO EDITING * Using the Source Monitor * Navigating the Timeline * Essential editing commands WORKING WITH CLIPS AND MARKERS * Program Monitor controls * Controlling resolution * Using markers * Using Sync Lock and Track Lock * Finding gaps in the Timeline * Moving clips * Extracting and deleting segments ADDING TRANSITIONS * What are transitions? * Edit points and handles * Adding video transitions * Using A/B mode to fine-tune a transition * Adding audio transitions ADVANCED EDITING TECHNIQUES * Four-point editing * Retiming clips * Replacing clips and footage * Nesting sequences * Regular trimming * Advanced trimming * Trimming in the Program Monitor panel PUTTING CLIPS IN MOTION * Adjusting the Motion effect * Changing clip position, size, and rotation * Working with keyframe interpolation * Using other motion-related effects MULTI-CAMERA EDITING * The multi-camera process * Creating a multi-camera sequence * Switching multiple cameras * Finalizing multi-camera editing * Additional multi-camera editing tips EDITING AND MIXING AUDIO * Setting up the interface to work with audio * Examining audio characteristics * Adjusting audio volume * Adjusting audio gain * Normalizing audio * Creating a split edit * Adjusting audio levels in a sequence * Working with the Audio Mixer SWEETENING SOUND * Sweetening sound with audio effects * Adjusting EQ * Applying effects in the Audio Mixer * Cleaning up noisy audio ADDING VIDEO EFFECTS * Working with effects * Keyframing effects * Effects presets * Frequently used effects COLOR CORRECTION AND GRADING * Color-oriented workflow * An overview of color-oriented effects * Fixing exposure problems * Fixing color balance * Specials color effects * Creating a look EXPLORING COMPOSITING TECHNIQUES * What is an alpha channel? * Using compositing in your projects * Working with the Opacity effect * Working with alpha-channel transparencies * Color keying a greenscreen shot * Using mattes CREATING TITLES * An overview of the Titler window * Video typography essentials * Creating titles * Stylizing text * Working with shapes and logos * Making text roll and crawl MANAGING YOUR PROJECTS * The File menu * Using the Project Manager * Final project managment steps * Importing projects or sequences * Managing collaboration * Managing your hard drives EXPORTING FRAMES, CLIPS, AND SEQUENCES * Overview of export options * Exporting single frames * Exporting a master copy * Working with Adobe Media Encoder * Exchanging with other editing applications * Recording to tape ADDITIONAL COURSE DETAILS: Nexus Humans Introduction to Premiere Pro CC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Premiere Pro CC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Premiere Pro CC
Delivered on-request, onlineDelivered Online
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: JUNOS LAYER 2 PACKET HANDLING AND SECURITY FEATURES * Transparent Mode Security * Secure Wire * Layer 2 Next Generation Ethernet Switching * MACsec * Lab 1: Implementing Layer 2 Security CHAPTER 3: FIREWALL FILTERS * Using Firewall Filters to Troubleshoot * Routing Instances * Filter-Based Forwarding * Lab 2: Implementing Firewall Filters CHAPTER 4: TROUBLESHOOTING ZONES AND POLICIES * General Troubleshooting for Junos Devices * Troubleshooting Tools * Troubleshooting Zones and Policies * Zone and Policy Case Studies * Lab 3: Troubleshooting Zones and Policies CHAPTER 5: HUB-AND-SPOKE VPN * Overview * Configuration and Monitoring * Lab 4: Implementing Hub-and-Spoke VPNs CHAPTER 6: ADVANCED NAT * Configuring Persistent NAT * Demonstrate DNS doctoring * Configure IPv6 NAT operations * Troubleshooting NAT * Lab 5: Implementing Advanced NAT Features CHAPTER 7: LOGICAL AND TENANT SYSTEMS * Overview * Administrative Roles * Differences Between LSYS and TSYS * Configuring LSYS * Configuring TSYS * Lab 6: Implementing TSYS CHAPTER 8: PKI AND ADVPNS * PKI Overview * PKI Configuration * ADVPN Overview * ADVPN Configuration and Monitoring * Lab 7: Implementing ADVPNs CHAPTER 9: ADVANCED IPSEC * NAT with IPsec * Class of Service with IPsec * Best Practices * Routing OSPF over VPNs * Lab 8: Implementing Advanced IPsec Solutions CHAPTER 10: TROUBLESHOOTING IPSEC * IPsec Troubleshooting Overview * Troubleshooting IKE Phase 1 and 2 * IPsec Logging * IPsec Case Studies * Lab 9: Troubleshooting IPsec CHAPTER 11: JUNIPER CONNECTED SECURITY * Security Models * Enforcement on Every Network Device CHAPTER 12: SECINTEL * Security Feed * Encrypted Traffic Analysis * Use Cases for SecIntel * Lab 10: Implementing SecIntel * CHAPTER 13:ADVANCED JUNIPER ATP ON-PREM * Collectors * Private Mode * Incident Response * Deployment Models * Lab 11: Implementing Advanced ATP On-Prem CHAPTER 14: AUTOMATED THREAT MITIGATION * Identify and Mitigate Malware Threats * Automate Security Mitigation * Lab 12: Identifying and Mitigation of Threats ADDITIONAL COURSE DETAILS: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered on-request, onlineDelivered Online
Price on Enquiry