• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1156 Courses

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. CRYPTOGRAPHY ESSENTIALS * Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP PRODUCT INFORMATION * PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer INSTALLING PGP UNIVERSAL SERVER * PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant ADMINISTRATIVE KEYS * A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features CONSUMERS AND GROUPS * Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together SERVER MESSAGING * Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations MONITORING AND REPORTING * Server monitoring and logging Updates, backups, and restoring MAIL POLICY * Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries KEY NOT FOUND * Problems that require a Key Not Found policy Introduction to Key Not Found configuration WEB MESSENGER * Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization KEYS * Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services INSTALLING PGP DESKTOP * System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components CONFIGURING CLIENT ENROLLMENT * Definition of enrollment Email, LDA P, and Silent enrollment type overview GENERAL PGP DESKTOP POLICY * General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing CONFIGURING PGP WHOLE DISK ENCRYPTION * What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP WHOLE DISK ENCRYPTION MANAGEMENT AND RECOVER * The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NETSHARE * Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations OTHER PGP DESKTOP UTILITIES * PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition CLUSTERING * How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: JUNOS LAYER 2 PACKET HANDLING AND SECURITY FEATURES * Transparent Mode Security * Secure Wire * Layer 2 Next Generation Ethernet Switching * MACsec * Lab 1: Implementing Layer 2 Security CHAPTER 3: FIREWALL FILTERS * Using Firewall Filters to Troubleshoot * Routing Instances * Filter-Based Forwarding * Lab 2: Implementing Firewall Filters CHAPTER 4: TROUBLESHOOTING ZONES AND POLICIES * General Troubleshooting for Junos Devices * Troubleshooting Tools * Troubleshooting Zones and Policies * Zone and Policy Case Studies * Lab 3: Troubleshooting Zones and Policies CHAPTER 5: HUB-AND-SPOKE VPN * Overview * Configuration and Monitoring * Lab 4: Implementing Hub-and-Spoke VPNs CHAPTER 6: ADVANCED NAT * Configuring Persistent NAT * Demonstrate DNS doctoring * Configure IPv6 NAT operations * Troubleshooting NAT * Lab 5: Implementing Advanced NAT Features CHAPTER 7: LOGICAL AND TENANT SYSTEMS * Overview * Administrative Roles * Differences Between LSYS and TSYS * Configuring LSYS * Configuring TSYS * Lab 6: Implementing TSYS CHAPTER 8: PKI AND ADVPNS * PKI Overview * PKI Configuration * ADVPN Overview * ADVPN Configuration and Monitoring * Lab 7: Implementing ADVPNs CHAPTER 9: ADVANCED IPSEC * NAT with IPsec * Class of Service with IPsec * Best Practices * Routing OSPF over VPNs * Lab 8: Implementing Advanced IPsec Solutions CHAPTER 10: TROUBLESHOOTING IPSEC * IPsec Troubleshooting Overview * Troubleshooting IKE Phase 1 and 2 * IPsec Logging * IPsec Case Studies * Lab 9: Troubleshooting IPsec CHAPTER 11: JUNIPER CONNECTED SECURITY * Security Models * Enforcement on Every Network Device CHAPTER 12: SECINTEL * Security Feed * Encrypted Traffic Analysis * Use Cases for SecIntel * Lab 10: Implementing SecIntel * CHAPTER 13:ADVANCED JUNIPER ATP ON-PREM * Collectors * Private Mode * Incident Response * Deployment Models * Lab 11: Implementing Advanced ATP On-Prem CHAPTER 14: AUTOMATED THREAT MITIGATION * Identify and Mitigate Malware Threats * Automate Security Mitigation * Lab 12: Identifying and Mitigation of Threats ADDITIONAL COURSE DETAILS: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered on-request, onlineDelivered Online
Price on Enquiry

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM MAXIMO ASSET MANAGEMENT OVERVIEW * This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. TIVOLI PROCESS AUTOMATION ENGINE * This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. ARCHITECTURE AND COMPONENTS * This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. FOUNDATION DATA * This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. SECURITY * Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. DATABASE ARCHITECTURE * This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. WORK MANAGEMENT * Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. CUSTOMIZING AN APPLICATION * This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. AUTOMATION * This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. WORKFLOW * This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. REPORTING * This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. * INTEGRATION FRAMEWORK * In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. * BUDGET MONITORING * This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. INSPECTION TOOLS AND TASKS * This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. TROUBLESHOOTING * This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. ADDITIONAL COURSE DETAILS: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Telco Cloud: Day 2 Operate and Scale [V2.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. COURSE INTRODUCTION * Introductions and course logistics * Course objectives OVERVIEW OF NETWORK TRANSFORMATION * Reviews the technologies that enable modern networks * Lists the components of modern service provider networks * Outlines characteristics of modern service provider networks in meeting customer application needs SERVICE DELIVERY WITH VMWARE TELCO CLOUD * Outlines the components of the VMware Telco Cloud portfolio * Reviews the role each VMware Telco Cloud product plays in delivering telco services * Specifies the dependencies each product has on underlying technologies SUPPORTING VMWARE TELCO CLOUD SERVICE DELIVERY * Reviews the products that implements the virtualization, management, platform, and orchestration layers * Outlines the role played by other VMware products such as NSX in delivering cloud services * Outline opensource integration options with VMware Telco Cloud products SECURING VMWARE TELCO CLOUD * Reviews security threats that affect telco services * Identifies the critical telco assets that are prone to attack * Outlines best practice for securing VMware Telco Cloud products and underlying technology * Provides overview of appropriate security controls for VMware Telco Cloud products ASSESSING SERVICE PROVISION * Reviews tools and methodologies used to gather requirements * Outlines how to assess cloud-native capabilities * Documenting findings * Identifying security vulnerabilities with Helm. * Reviews VMware?s Customer Engagement process * Capturing infrastructure requirements from TCA DESIGNING A VMWARE TELCO CLOUD SOLUTION * Selecting appropriate deployment topology * Pros and cons of design choices * How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture * Outlines typical scenarios where specific products align with identified requirements * Documenting a design * Designing for availability * Ensuring a design aligns with best practice * Specifying monitoring options IMPLEMENTING VMWARE TELCO CLOUD PRODUCTS * Review deployment options for VMware products * Integrating new products with existing ones * Outline post-installation tasks * Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight * Ensuring products meet security requirements * Configuring monitoring software * Outlines the xNF onboarding process in TCA MAINTAINING TELCO SERVICES * Outlines typical administrative tasks in ensuring services are maintained * Use of native and other VMware performance monitoring tools * Reviewing performance data * Role of SLAs in service maintenance * Reviews scenarios where known behaviors indicate problems TROUBLESHOOTING DEPLOYED TELCO SERVICES * Reviews the troubleshooting tools available * Using tools to gather useful data * Outlines how event correlation can be used to isolate problems * Using a methodology to determine the root cause of a problem * Steps to identify and resolve a problem * Reviews scenarios where known problems are isolated and resolution steps identified SCALING VMWARE TELCO CLOUD PRODUCTS * Assessing if operations are impacted by lack of resources now or will be in the future * Reviews performance optimization options * Identifies implications for other products if you scale VMware Telco Cloud products * Reviews VMware sizing guidelines ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Telco Cloud: Day 2 Operate and Scale [V2.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. MODULE 1: METHODOLOGY & ASSESSMENT * The Citrix Consulting Methodology * Citrix Consulting Methodology Use * Business Drivers * Prioritize Business Drivers * User Segmentation * User Segmentation Process * App Assessment Introduction * App Assessment Analysis * Why Perform a Capabilities Assessment? * Common Capabilities Assessment Risks MODULE 2: USER LAYER * Endpoint Considerations * Peripherals Considerations * Citrix Workspace App Version Considerations * Citrix Workspace App Multiple Version Considerations * Network Connectivity and the User Experience * Bandwidth and Latency Considerations * Graphics Mode Design Considerations * HDX Transport Protocols Considerations * Media Content Redirection Considerations * Session Interruption Management Session Reliability Feature Considerations * Session Interruption Management Auto-Client Reconnect Feature Considerations * Session Interruption Management ICA Keep-Alive Feature Considerations MODULE 3: ACCESS LAYER * Access Matrix * Access Layer * Access Layer Communications * Double-Hop Access Layer Considerations * Citrix Cloud Access Layer Considerations * Use Cases for Multiple Stores * Define Access Paths per User Group * Define Number of URLs * Configuration and Prerequisites for Access Paths * Citrix Gateway Scalability * Citrix Gateway High Availability * StoreFront Server Scalability * StoreFront Server High Availability MODULE 4: RESOURCE LAYER - IMAGES * Flexcast Models * VDA Machine Scalability * VDA Machine Sizing with NUMA * VDA Machine Sizing * VDA Machine Scalability Cloud Considerations * Scalability Testing and Monitoring * Secure VDA Machines Network Traffic * Secure VDA Machines Prevent Breakouts * Secure VDA Machines Implement Hardening * Secure VDA Machines Anti-Virus * Review of Image Methods * Citrix Provisioning Overall Benefits and Considerations * Citrix Provisioning Target Device Boot Methods * Citrix Provisioning Read Cache and Sizing * Citrix Provisioning Write Cache Type * Citrix Provisioning vDisk Store Location * Citrix Provisioning Network Design * Citrix Provisioning Scalability Considerations * Citrix Machine Creation Services Overall Benefits and Considerations * Citrix Machine Creation Services Cloning Types * Citrix Machine Creation Services Storage Locations & Sizing * Citrix Machine Services Read and Write Cache * App Layering Considerations * Image Management Methods MODULE 5: RESOURCE LAYER - APPLICATIONS AND PERSONALIZATION * Application Delivery Option * Determine the Optimal Deployment Method for an App * General Application Concerns * Profile Strategy Profile Types Review * Citrix Profile Management Design Considerations * Citrix Profile Management Scaling * Citrix Profile Management Permissions * Policies Review * Optimize Logon Performance with Policies * Printing Considerations MODULE 6: CONTROL LAYER * Pod Architecture Introduction * Pod Architecture Considerations * Citrix Virtual Apps and Desktops Service Design Considerations * Implement User Acceptance Testing * Load Balancing the Machine Running the VDA * Citrix Director Design Considerations * Management Console Considerations * Change Control * Delivery Controller Scalability and High Availability * Control Layer Security * Configuration Logging Considerations * Session Recording MODULE 7: HARDWARE/COMPUTE LAYER * Hypervisor Host Hardware Considerations * Separating Workloads Considerations * Workload Considerations * VMs Per Host and Hosts Per Pool * Citrix Hypervisor Scalability * VM Considerations in Azure and Amazon Web Services * Storage Tier Considerations * Storage I/O Considerations * Storage Architecture * Storage RAID & Disk Type * Storage Sizing LUNs * Storage Bandwidth * Storage in Public Cloud * Datacenter Networking Considerations * Securing Hypervisor Administrative Access * Secure the Physical Datacenter * Secure the Virtual Datacenter MODULE 8: MODULE 8: HIGH AVAILABILITY AND MULTIPLE LOCATION ENVIRONMENTS * Redundancy vs. Fault Tolerance vs. High Availability * Multi-Location Architecture Considerations * Multi-Site Architecture Considerations * Global Server Load Balancing * Optimal Gateway Routing * Zone Preference and Failover * StoreFront Resource Aggregation * StoreFront Subscription Sync * Hybrid Environment Options * Citrix Provisioning Across Site * Site Database Scalability and High Availability * Citrix Provisioning Across Sites Considerations * Citrix Machine Creation Across Sites * App Layering Across Sites * Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices * Profile Management Multi-Site Replication Considerations * Folder Redirections and Other User Data in a Multi-Location Environment * Application Data Considerations * Cloud-Based Storage Replication Options * Multi-Location Printing Considerations * Zone Considerations * Active Directory Considerations MODULE 9: DISASTER RECOVERY * Tiers of Disaster Recovery * Disaster Recovery Considerations * Business Continuity Planning and Testing * Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered on-request, onlineDelivered Online
Price on Enquiry

First Aid at Work (FAAW):

By Total Compliance

Equip yourself and your team with the skills to act confidently in an emergency! Course Overview: This three days (6 hours)First Aid at Work (FAW) course provides learners with the essential knowledge and skills to respond effectively to first aid emergencies in low-risk workplaces. Our FAIB-approved course is delivered by experienced instructors who use a hands-on approach to ensure comprehensive learning. Benefits: * Industry-standard training: Meets all UK regulations and is recognised nationwide. * Qualified instructors: Learn from experienced professionals who share valuable insights and practical skills. * Confidence in emergencies: Gain the knowledge to act calmly and effectively in unexpected situations. * Peace of mind: Ensure your workplace meets health and safety requirements. Who should attend? This course is ideal for employees in low-risk workplaces such as offices, retail stores, and administrative environments who are designated as first aiders. Course Content: * Role and responsibilities of a first aid responder * Assessing an incident scene * Unresponsive casualties and CPR * AED (Automated External Defibrillator) awareness * Managing seizures * Choking emergencies * External bleeding control * Shock management * Burns and scalds * Minor injuries (cuts, bruises, splinters) Certification: Upon successful completion of the course, participants will receive a recognised FAW certificate valid for three years.

First Aid at Work (FAAW):
Delivered In-Person
Dates arranged on request
FREE

Aruba OS-CX Switching Fundamentals, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain Networking Fundamentals Describe and review the Aruba Switching portfolio with customers Install and configure devices running the ArubaOS-CX Network Operating System Describe and configure VLANs Explain, describe and configure Spanning Tree Protocol Understand when to use VRRP and how to configure it Explain and configure Link Aggregation Understand and configure IP Routing Explain IP Subnetting Understand and configure OSPFv2 - Single Area Describe and configure Switch Stacking using VSF Configuration of Aruba solutions using Secure Management and Maintenance methodologies Manage, monitor, administer and operate Aruba solutions using Aruba's NetEdit tool This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. This course consists of approximately 60% lecture and 40% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 5-day course prepares candidates for the Aruba Certified Switching Associate exam.In this course, participants learn about ArubaOS-CX switch technologies including multi-layer switches. You will also learn about broadcast domains and Virtual Local Area Networks (VLANs); secure management protocols such as AAA, SSH, HTTPS, and Dynamic Segmentation using Aruba's Role-Based Access Control (RBAC); availability technologies such as Multiple Spanning Tree Protocol (MSTP); link aggregation techniques including Link Aggregation Control Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Framework (VSF). Static and dynamic IP routing protocols such as Open Shortest Path First (OSPF) are also covered. NETWORK FUNDAMENTALS * What is a network? * What is a Protocol? * OSI Reference Model * Encapsulation, frames, packets, segments * Layer 2 to Layer 7 headers * Media, cabling, Ethernet/wifi headers * Binary/Hex/Decimal theory and conversion * TCP/IP Stack (IP addressing & Transport Protocols TCP/UDP) * Types of traffic: Unicast, Broadcast, Multicast TCP/IP STACK * Overview * Ethernet frames * IPv4 Header * TCP Header ? Three-way Handshake * TCP Header ? Sequence Numbers * TCP Header ? Port Numbers * TCP Header * UPD Header BASIC NETWORKING WITH ARUBA SOLUTIONS * Networking devices: Switches, Routers, Multilayer Switches, APs, Mobility Controllers, Firewalls, Servers (HTTP, DHCP, DNS, Telnet, FTP) * 2-Tier vs 3-Tier hierarchy * Switching Portfolio (AOS switches & AOS-CX switches) is this introducing both portfolio on a couple of slide and few slides on AOS-CX hardware architecture, software architecture and intro to NAE high level. * Introduction to AOS-CX and feature set * Port numbering * Accessing Aruba OS-CX CLI * Prompt modes/levels and navigation * Context sensitive help * Show logs, configuration, interfaces, transceivers, flash, version * Hostname/interface name, enabling interfaces * Link Layer Discovery Protocol * ICMP and reachability testing tools: Ping and Traceroute * PoE (standards one slide and what we support and one or two slide on configuration and verifications.) VLANS * Broadcast/collision domains * VLAN benefits * VLAN creation * DHCP server configuration in switches (optional) * 802.1Q tagging * Switchports vs. Routed ports * MAC address table * ARP table * Packet Delivery part 1 SPANNING TREE PROTOCOL * Redundant network * L2 loops * 802.1D * Common Spanning Tree * 802.1s * 802.1w overview * 802.1w load balancing * 802.1w region configuration LINK AGGREGATION * Static Aggregation * LACP * Load Balancing IP ROUTING - PART 1 * Default Gateway * DHCP IP Helper Address * IP Routing Service * Inter-VLAN routing * Packet Delivery Part 2 * Need for layer 3 redundancy * Introduction to VRF VRRP * VRRP overview * VRRP basic operation * VRRP failover and preempt * VRRP and MSTP coordination IP ROUTING - PART 2 * Subnetting * CIDR * Static routes * Administrative Distance * Floating routes * Scalability issues * IP ROUTING - PART 3 * IGP vs EGP * Distance Vector vs Link State * OSPF Router-ID and Hello Messages * Passive interfaces * States * DR and BDR * LSDB: LSA 1 and 2 * Path selection and convergence * Using cost to manipulate routes STACKING * Control Plane, Management Plane, and Data Plane * Introduction to Stacking technologies * Stacking Benefits * Centralized control and management plane * Distributed Data Plane and Distributed Link Aggregation * VSF * VSF requirements * VSF Link and member roles * VSF member IDs and port numbers * VSF Configuration * VSF Provisioning use cases * Tracing Layer 2 traffic: Unicast * Tracing Layer 2 traffic: Broadcast, Multicast, and Unknown Unicast * VSF Failover and OSFP Graceful-Restart * VSF Link failure without MAD * MAD * VSX Introduction SECURE MANAGEMENT AND MAINTENANCE * OOBM port * Management VRF * Secure Management Protocols: AAA, SSH, HTTPS, RBAC * Radius-based management auth (VSA) * SNMP * Web interface * Configuration file management (Backup, restore, checkpoint and roll back) * Operating System image management (backup and restore) * Factory default/password recovery AOS-CX MANAGEMENT TOOLS * Intro to NetEdit * NetEdit installation * Basic monitoring with NetEdit * AOS-CX Mobile App ADDITIONAL COURSE DETAILS: Nexus Humans Aruba OS-CX Switching Fundamentals, Rev. 20.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba OS-CX Switching Fundamentals, Rev. 20.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba OS-CX Switching Fundamentals, Rev. 20.21
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). DESCRIBING THE CISCO EMAIL SECURITY APPLIANCE * Cisco Email Security Appliance Overview * Technology Use Case * Cisco Email Security Appliance Data Sheet * SMTP Overview * Email Pipeline Overview * Installation Scenarios * Initial Cisco Email Security Appliance Configuration * Centralizing Services on a Cisco ADMINISTERING THE CISCO EMAIL SECURITY APPLIANCE * Distributing Administrative Tasks * System Administration Managing and Monitoring Using the Command Line Interface (CLI) * Other Tasks in the GUI * Advanced Network Configuration * Using Email Security Monitor * Tracking Messages * Logging CONTROLLING SENDER AND RECIPIENT DOMAINS * Public and Private Listeners * Configuring the Gateway to Receive Email * Host Access Table Overview * Recipient Access Table Overview * Configuring Routing and Delivery Features CONTROLLING SPAM WITH TALOS SENDERBASE AND ANTI-SPAM * SenderBase Overview * Anti-Spam * Managing Graymail * Protecting Against Malicious or Undesirable URLs * File Reputation Filtering and File Analysis * Bounce Verification USING ANTI-VIRUS AND OUTBREAK FILTERS * Anti-Virus Scanning Overview * Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering * Configuring the Appliance to Scan for Viruses * Outbreak Filters * How the Outbreak Filters Feature Works Managing Outbreak Filters USING MAIL POLICIES * Email Security Manager Overview * Mail Policies Overview * Handling Incoming and Outgoing Messages Differently * Matching Users to a Mail Policy Message Splintering * Configuring Mail Policies USING CONTENT FILTERS * Content Filters Overview * Content Filter Conditions * Content Filter Actions * Filter Messages Based on Content * Text Resources Overview * Using and Testing the Content Dictionaries Filter Rules * Understanding Text Resources * Text Resource Management * Using Text Resources USING MESSAGE FILTERS TO ENFORCE EMAIL POLICIES * Message Filters Overview * Components of a Message Filter * Message Filter Processing * Message Filter Rules * Message Filter Actions * Attachment Scanning * Examples of Attachment Scanning Message Filters * Using the CLI to Manage Message Filters * Message Filter Examples * Configuring Scan Behavior PREVENTING DATA LOSS * Overview of the Data Loss Prevention (DLP) Scanning Process * Setting Up Data Loss Prevention * Policies for Data Loss Prevention * Message Actions * Updating the DLP Engine and Content Matching Classifiers USING LDAP * Overview of LDAP * Working with LDAP * Using LDAP Queries * Authenticating End-Users of the Spam Quarantine * Configuring External LDAP Authentication for Users * Testing Servers and Queries * Using LDAP for Directory Harvest Attack Prevention * Spam Quarantine Alias Consolidation Queries * Validating Recipients Using an SMTP Server SMTP SESSION AUTHENTICATION * Configuring AsyncOS for SMTP Authentication * Authenticating SMTP Sessions Using Client Certificates * Checking the Validity of a Client Certificate * Authenticating User Using LDAP Directory * Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate * Establishing a TLS Connection from the Appliance * Updating a List of Revoked Certificates EMAIL AUTHENTICATION * Email Authentication Overview * Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing * Verifying Incoming Messages Using DKIM * Overview of Sender Policy Framework (SPF) and SIDF Veri?cation * Domain-based Message Authentication Reporting and Conformance (DMARC) Verification * Forged Email Detection EMAIL ENCRYPTION * Overview of Cisco Email Encryption * Encrypting Messages * Determining Which Messages to Encrypt * Inserting Encryption Headers into Messages * Encrypting Communication with Other Message Transfer Agents (MTAs) * Working with Certificates * Managing Lists of Certificate Authorities * Enabling TLS on a Listener?s Host Access Table (HAT) * Enabling TLS and Certi?cate Verification on Delivery * Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services USING SYSTEM QUARANTINES AND DELIVERY METHODS * Describing Quarantines * Spam Quarantine * Setting Up the Centralized Spam Quarantine * Using Safelists and Blocklists to Control Email Delivery Based on Sender * Configuring Spam Management Features for End Users * Managing Messages in the Spam Quarantine * Policy, Virus, and Outbreak Quarantines * Managing Policy, Virus, and Outbreak Quarantines * Working with Messages in Policy, Virus, or Outbreak Quarantines * Delivery Methods CENTRALIZED MANAGEMENT USING CLUSTERS * Overview of Centralized Management Using Clusters * Cluster Organization * Creating and Joining a Cluster * Managing Clusters * Cluster Communication * Loading a Configuration in Clustered Appliances * Best Practices TESTING AND TROUBLESHOOTING * Debugging Mail Flow Using Test Messages: Trace * Using the Listener to Test the Appliance * Troubleshooting the Network * Troubleshooting the Listener * Troubleshooting Email Delivery * Troubleshooting Performance * Web Interface Appearance and Rendering Issues * Responding to Alerts * Troubleshooting Hardware Issues * Working with Technical Support REFERENCES * Model Specifications for Large Enterprises * Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces * Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot * Lab : Creating and running queries * Lab : Configuring SSRS * Lab : Analyzing the real-time state of a device by using CMPivot PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections * Lab : Configuring boundaries and resource discovery * Lab: Configuring user and device collections DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations * Lab : Deploying the Microsoft System Center Configuration Manager client software * Lab: Configuring and monitoring client status * Lab : Managing client settings MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Lab : Configuring software metering * Lab : Configuring and managing Asset Intelligence DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Lab : Managing application supersedence and removal * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Lab : Using Configuration Manager to deploy Windows Store apps MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates * Lab : Configuring the site for software updates * Lab : Deploying and managing software updates IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies * Lab : Implementing Microsoft System Center Endpoint Protection * Lab : Implementing advanced threat policies MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access * Lab : Managing compliance settings MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service * Lab : Preparing the site for operating -system deployment * Lab : Deploying operating -system images for bare-metal installations MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance * Backing up and recovering a Configuration Manager site * Lab : Configuring role-based administration * Lab : Configuring Remote Tools * Lab : Maintaining a Configuration Manager site ADDITIONAL COURSE DETAILS: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. SYSTEM ADMINISTRATION OVERVIEW * UNIX, Linux and Open Source * Duties of the System Administrator * Superusers and the Root Login * Sharing Superuser Privileges with Others (su and sudo Commands) * TCP/IP Networking Fundamentals * Online Help INSTALLATION AND CONFIGURATION * Planning: Hardware and Software Considerations * Site Planning * Installation Methods and Types * Installation Classes * Partitions * Logical Volume Manager - LVM * File System Overview * Swap Partition Considerations * Other Partition Considerations * The Linux Boot Loader: grub * Software Package Selection * Adding and Configuring Peripherals * Printers * Graphics Controllers * Basic Networking Configuration * Booting to Recovery Mode BOOTING AND SHUTTING DOWN LINUX * Boot Sequence * The systemd Daemon * The systemctl Command * Targets vs. Run Levels * Modifying a Target * Service Unit Scripts * Changing System States * Booting into Rescue Mode * Shutdown Commands MANAGING SOFTWARE AND DEVICES * Identifying Software Packages * Using rpm to Manage Software * Using yum to Manage Software * Installing and Removing Software * Identifying Devices * Displaying Device and System Information (PCI, USB) * Plug and Play Devices * Device Configuration Tools MANAGING USERS AND GROUPS * Setting Policies * User File Management * The /etc/passwd file * The /etc/shadow file * The /etc/group file * The /etc/gshadow file * Adding Users * Modifying User Accounts * Deleting User Accounts * Working with Groups * Setting User Environments * Login Configuration Files THE LINUX FILE SYSTEM * Filesystem Types * Conventional Directory Structure * Mounting a File System * The /etc/fstab File * Special Files (Device Files) * Inodes * Hard File Links * Soft File Links * Creating New File Systems with mkfs * The lost+found Directory * Repairing File Systems with fsck * The Journaling Attribute * File and Disk Management Tools LINUX FILE SECURITY * File Permissions * Directory Permissions * Octal Representation * Changing Permissions * Setting Default Permissions * Access Control Lists (ACLs) * The getfacl and setfacl commands * SUID Bit * SGID Bit * The Sticky Bit CONTROLLING PROCESSES * Characteristics of Processes * Parent-Child Relationship * Examining Running Processes * Background Processes * Controlling Processes * Signaling Processes * Killing Processes * Automating Processes * cron and crontab * at and batch * System Processes (Daemons) WORKING WITH THE LINUX KERNEL * Linux Kernel Components * Types of Kernels * Kernel Configuration Options * Recompiling the Kernel SHELL SCRIPTING OVERVIEW * Shell Script Fundamentals * Bash Shell Syntax Overview * Shell Script Examples SYSTEM BACKUPS * Backup Concepts and Strategies * User Backups with the tar Command * System Backup Options * The xfsdump and xfsrestore Commands TROUBLESHOOTING THE SYSTEM * Common Problems and Symptoms * Troubleshooting Steps * Repairing General Boot Problems * Repairing the GRUB 2 Boot Loader * Hard Drive Problems * Restoring Shared Libraries * System Logs and rsyslogd BASIC NETWORKING * Networking Services Overview * NetworkManager Introduction * Network Configuration Files Locations and Formats * Enabling and Restarting Network Services with systemtcl * Configuring Basic Networking Manually * Configuring Basic Networking with NetworkManager LAMP SERVER BASICS * LAMP Overview * Configuring the Apache Web Server * Common Directives * Apache Virtual Hosting * Configuring an Open Source Database * MySQL * MariaDB * PHP Basics * Perl CGI Scripting INTRODUCTION TO SYSTEM SECURITY * Security Overview * Maintaining System Security * Server Access * Physical Security * Network Security * Security Tools * Port Probing with nmap * Intrusion Detection and Prevention * PAM Security Modules * Scanning the System * Maintaining File Integrity * Using Firewalls * Introduction to firewalld THE SAMBA FILE SHARING FACILITY * Configure Samba for Linux to Linux/UNIX File Sharing * Configure Samba for Linux to Windows File Sharing * Use the smbclient Utility to Transfer Files * Mount/Connect Samba Shares to Linux and Windows Clients NETWORKED FILE SYSTEMS (NFS) * Using NFS to Access Remote File Systems * Configuring the NFS Server * Configuring the NFS Client * Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered on-request, onlineDelivered Online
Price on Enquiry