• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1333 Courses

Ethical Hacking with Kali Linux

By Apex Learning

OVERVIEW This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. COURSE CURRICULUM 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand
£12

Zoology

5.0(1)

By Course Gate

The life of every animal is priceless. Enhance your ability to deliver a better quality of life for animals by taking this Zoology course. This Zoology course will teach you about the mating process of animals. It will educate you on animal behaviour and diversity of life and genetics and breeding. In addition, the course will give you deep insights into vertebrates and invertebrates zoology. You'll also learn about the different types of animal diseases and explore how to create excellent recovery plans. This training is the most effective approach to kickstart your career in the relevant field. Enrol now and learn the skills required to monitor wildlife health! Please note that this course only gives you the theoretical knowledge to succeed in this industry. Our Zoology Course doesn't entitle you to practise as a professional in this specific sector. LEARNING OBJECTIVES * Understand the animal mating process * Enrich your knowledge of animal behaviour and diversity of life * Get broad ideas on genetics and breeding * Know about vertebrate and invertebrate zoology * Familiarise yourself with the various animal diseases * Gain an excellent understanding of animal health care WHO IS THIS COURSE FOR? This Zoology course is ideal for aspiring professionals who wish to gain the relevant skills and knowledge to fast track their careers. It is for those who have little or no knowledge of zoology or those who are new to the field and want to test their skills and knowledge. There are no entry requirements for this course. However, an eye for detail and a creative mind is essential. ENTRY REQUIREMENT Anyone interested in learning more about this subject should take this Zoology course. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. The course is open to students from any academic background, as there is no prerequisites to enrol on this course. The course materials are accessible from an internet enabled device at anytime of the day. CPD CERTIFICATE FROM COURSE GATE At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £4.99 and the hard copy for £9.99. Also, you can order both PDF and hardcopy certificates for £12.99. CAREER PATH On successful completion of the Zoology course, learners can progress to a more advanced program from our course list. Career opportunities in this field include freelancing or working in-house, within a range of professional settings, with the opportunity to earn a high salary. Related professions in this industry include: * Zookeeper * Toxicologist * Zoologist * Teacher * Veterinary Nurse * Animal nutritionist * Farm Manager * Stable Worker COURSE CURRICULUM Module 01: Zoology Zoology 00:12:00 Module 02: Animal Behaviours And Diversity of Life Animal Behaviours and Diversity of Life 00:21:00 Module 03: Genetics and Breeding Genetics and Breeding 00:14:00 Module 04: Vertebrate Zoology Vertebrate Zoology 00:17:00 Module 05: Invertebrate Zoology Invertebrate Zoology 00:24:00 Module 06: Animal Diseases Animal Diseases 00:24:00 Module 07: Animal Health Care Animal Health Care 00:19:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Zoology
Delivered Online On Demand
£11.99

Microsoft Azure Storage

5.0(1)

By Course Gate

Do you want to learn how to function with Azure Storage, a cloud storage solution, in order to make highly scalable and available applications? Are you interested to create a strong storage foundation for an Azure machine? If so, take a look at our precise Microsoft Azure Storage course. The contents of the course teach you all the relevant aspects to become efficient in this field. First and foremost, the course teaches you how to create a practical application in different circumstances using Azure storage services such as queue, blob, table and, file. Following that, it teaches you how to design applications and measure these applications considering the amount of data. After that, it guides you how to backup data automatically, deploy your solution, recover data, store, scale, and monitor data with Azure Storage. WHO IS THIS COURSE FOR? Microsoft Azure Storage is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. REQUIREMENTS Our Microsoft Azure Storage is open to all from all academic backgrounds and there is no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD CERTIFICATE FROM COURSE GATE  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. CAREER PATH This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. COURSE CURRICULUM Introduction Introduction FREE 00:03:00 Working with Storage Azure Storage Overview 00:03:00 Working with Azure Storage Accounts 00:09:00 Storage Access 00:05:00 Using Azure Blob Storage 00:06:00 Using Azure File Storage 00:04:00 Azure File Sync 00:10:00 Monitoring Storage 00:03:00 Content Delivery Network 00:03:00 CDN Profile 00:06:00 Azure Backup Vault 00:04:00 Azure Site Recovery 00:03:00 Conclusion Course Recap 00:03:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Microsoft Azure Storage
Delivered Online On Demand
£11.99

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW CISCO SD-WAN OVERVIEW * Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN ADVANCED SETTINGS * Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN HIGH AVAILABILITY * Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN TEMPLATES * Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates BRIDGING * Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging ROUTING PROTOCOLS * Static Routes Dynamic Routing Protocols MULTICAST * Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP NETWORK OPTIMIZATION * Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS DIRECT INTERNET ACCESS (DIA) OVERVIEW * SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring UNIFIED COMMUNICATIONS * Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN SECURITY POLICY * Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN LOCAL POLICY * Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN CENTRAL POLICY * Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN MIGRATION * Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration ADDITIONAL COURSE DETAILS: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cloudera Administrator Training for Apache Hadoop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is best suited to systems administrators and IT managers. Overview Skills gained in this training include:Determining the correct hardware and infrastructure for your clusterProper cluster configuration and deployment to integrate with the data centerConfiguring the FairScheduler to provide service-level agreements for multiple users of a clusterBest practices for preparing and maintaining Apache Hadoop in productionTroubleshooting, diagnosing, tuning, and solving Hadoop issues Cloudera University?s four-day administrator training course for Apache Hadoop provides participants with a comprehensive understanding of all the steps necessary to operate and maintain a Hadoop cluster. THE CASE FOR APACHE HADOOP * Why Hadoop? * Core Hadoop Components * Fundamental Concepts HDFS * HDFS Features * Writing and Reading Files * NameNode Memory Considerations * Overview of HDFS Security * Using the Namenode Web UI * Using the Hadoop File Shell GETTING DATA INTO HDFS * Ingesting Data from External Sources with Flume * Ingesting Data from Relational Databases with Sqoop * REST Interfaces * Best Practices for Importing Data YARN & MAPREDUCE * What Is MapReduce? * Basic MapReduce Concepts * YARN Cluster Architecture * Resource Allocation * Failure Recovery * Using the YARN Web UI * MapReduce Version 1 PLANNING YOUR HADOOP CLUSTER * General Planning Considerations * Choosing the Right Hardware * Network Considerations * Configuring Nodes * Planning for Cluster Management HADOOP INSTALLATION AND INITIAL CONFIGURATION * Deployment Types * Installing Hadoop * Specifying the Hadoop Configuration * Performing Initial HDFS Configuration * Performing Initial YARN and MapReduce Configuration * Hadoop Logging INSTALLING AND CONFIGURING HIVE, IMPALA, AND PIG * Hive * Impala * Pig HADOOP CLIENTS * What is a Hadoop Client? * Installing and Configuring Hadoop Clients * Installing and Configuring Hue * Hue Authentication and Authorization CLOUDERA MANAGER * The Motivation for Cloudera Manager * Cloudera Manager Features * Express and Enterprise Versions * Cloudera Manager Topology * Installing Cloudera Manager * Installing Hadoop Using Cloudera Manager * Performing Basic Administration Tasks Using Cloudera Manager ADVANCED CLUSTER CONFIGURATION * Advanced Configuration Parameters * Configuring Hadoop Ports * Explicitly Including and Excluding Hosts * Configuring HDFS for Rack Awareness * Configuring HDFS High Availability HADOOP SECURITY * Why Hadoop Security Is Important * Hadoop?s Security System Concepts * What Kerberos Is and How it Works * Securing a Hadoop Cluster with Kerberos MANAGING AND SCHEDULING JOBS * Managing Running Jobs * Scheduling Hadoop Jobs * Configuring the FairScheduler * Impala Query Scheduling CLUSTER MAINTAINENCE * Checking HDFS Status * Copying Data Between Clusters * Adding and Removing Cluster Nodes * Rebalancing the Cluster * Cluster Upgrading CLUSTER MONITORING & TROUBLESHOOTING * General System Monitoring * Monitoring Hadoop Clusters * Common Troubleshooting Hadoop Clusters * Common Misconfigurations ADDITIONAL COURSE DETAILS: Nexus Humans Cloudera Administrator Training for Apache Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Administrator Training for Apache Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloudera Administrator Training for Apache Hadoop
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Workspace ONE: Skills for UEM [V22.x]

By Nexus Human

Duration 3 Days 18 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares In this three-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the three days, you will have the foundational knowledge for effectively implementing Workspace ONE UEM. COURSE INTRODUCTION * Introductions and course logistics * Course objectives PLATFORM ARCHITECTURE * Summarize the features and functionality of Workspace ONE UEM * Outline the benefits of leveraging Workspace ONE UEM * Recognize the core and productivity components that make up the Workspace ONE UEM platform * Summarize high availability and disaster recovery for Workspace ONE Solution ADMINISTRATION * Navigate and customize the Workspace ONE UEM console * Summarize the hierarchical management structure * Explain the features and functions of Workspace ONE Hub Services * Outline account options and permissions ENTERPRISE INTEGRATIONS * Outline the process and needs to integrate with directory services * Explain certificate authentication and practical implementation with Workspace ONE * Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console * Describe VMware Dynamic Environment Manager and its architecture ONBOARDING * Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management * Outline the steps for setting up autodiscovery in the Workspace ONE UEM console * Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app * Summarize platform onboarding options MANAGING ENDPOINTS * Explain the differences between device and user profiles * Describe policy management options for Windows 10 and macOS * Describe the functions and benefits of using compliance policies * Explain the use case for Freestyle Orchestrator * Describe the capabilities that sensor and scripts enable. ALTERNATIVE MANAGEMENT METHODS * Describe the function and benefits of device staging * Configure product provisioning in the Workspace ONE UEM console * Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices * List the system and device requirements for Linux device management in Workspace ONE UEM APPLICATIONS * Describe the features, benefits, and capabilities of application management in Workspace ONE UEM * Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console * Describe the benefits of using Apple Business Manager content integration * Describe the benefits of using server-to-client software distribution * List the functions and benefits of VMware Workspace ONE© SDK DEVICE EMAIL * List email clients supported by Workspace ONE UEM * Configure an Exchange Active Sync profile in the Workspace ONE UEM console * Configure VMware Workspace ONE© Boxer settings * Summarize the available email infrastructure integration models and describe their workflows * Configure email compliance policies and notifications services CONTENT SHARING * Describe the benefits of using Content Gateway and the Content Gateway workflows * Describe the benefits of integrating content repositories with Workspace ONE UEM * Configure a repository in the Workspace ONE UEM console MAINTENANCE * Manage endpoints from the Device List view and the Details view. * Analyze endpoint deployment and compliance data from Workspace ONE UEM Monitor page.

VMware Workspace ONE: Skills for UEM [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere: What's New [V8]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. COURSE INTRODUCTION * Introductions and course logistics * Course objectives ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING * Describe how device groups support AI and ML in vSphere 8 * Describe how device virtualization extensions support AI and ML in vSphere 8 VSPHERE DISTRIBUTED SERVICES ENGINE * Describe the benefits of Distributed Services Engine * Explain how Distributed Services Engine works * Recognize use cases for Distributed Services Engine * Install ESXi on a host equipped with a DPU * View DPU information in vSphere Client * Add an ESXi host equipped with a DPU to a cluster * Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager * Create a vSphere Distributed Switch for network offloads * Add a host with a DPU to the vSphere Distributed Switch * Configure a VM to use Uniform Passthrough Mode VSPHERE AND VCENTER MANAGEMENT * Review the improvements to the communication between vCenter and ESXi hosts * Review the enhancements to the vCenter recovery process ESXI ENHANCEMENTS * Describe the function of the central configuration store in ESXi * Explain how ConfigStore affects your interaction with ESXi configuration files * Recognize the supported system storage partition configuration on ESXi 8.0 * Identify devices supported for system storage on ESXi 8.0 * Configure an RDMA host local device on ESXi VSPHERE STORAGE * Describe the vSAN Express Storage Architecture * Recognize the benefits of using vSAN Express Storage Architecture * Describe the benefits of using NVMe * Recognize the support for NVMe devices in vSphere GUEST OS AND WORKLOADS * Review the enhancements of the latest virtual hardware versions * Describe the features introduced with virtual hardware version 20 * Create a snapshot of a VM with an NVDIMM device RESOURCE MANAGEMENT * View energy and carbon emission metrics in vRealize Operations Manager * Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality * Describe how vMMR enhances the performance of vSphere DRS SECURITY AND COMPLIANCE * Describe how to handle vTPM secrets when cloning a VM * Manage OVF templates for VMs that are configured with vTPM * Deploy an OVF template with vTPM * Describe the enhancements to trusted binary enforcement in ESXi * Describe ESXi 8 enhanced security features VSPHERE LIFECYCLE MANAGER * Describe the enhancements to life cycle management of standalone ESXi hosts * Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager * Use Auto Deploy to boot a host with the desired image and configuration specifications * Upgrade multiple ESXi hosts in a cluster in parallel * Stage an ESXi host image prior to remediation AUTO DEPLOY * Manage custom host certificates using Auto Deploy VSPHERE WITH TANZU * Describe the features of the Tanzu Kubernetes Grid 2.0 offering ANNOUNCING VSPHERE+ * Describe the functionality and benefits of vSphere+

VMware vSphere: What's New [V8]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. OVERVIEW OF ENDPOINT LIFECYCLE MANAGEMENT * Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview IMPLEMENTATION ASSESSMENT * ELM Requirements Gathering Solution Analysis of ELM Requirements IMPLEMENTATION DESIGN * GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration INSTALLATION AND CONFIGURATION OF THE ELM SOLUTION * Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment ENDPOINT IDENTIFICATION & GATHERING * IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements ENDPOINT CONFIGURATION STANDARDS * Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards ENDPOINT PROVISIONING * Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology ENDPOINT DEPLOYMENT & STAGING * Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images SOFTWARE DISTRIBUTION * Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks IMAGE AND BUILD MAINTENANCE * Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs MANAGING SOFTWARE UPGRADES * Software Upgrade Process Overview Distribution of Software Updates SUPPORTING THE BUSINESS * Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management HARDWARE REFRESH & MIGRATION * Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process ENDPOINT RETIREMENT/DISPOSAL * Ensuring Compliant Disposal Methods and Procedures END TO END ENDPOINT LIFECYCLE USE CASE * Endpoint Management Lifecycle Use Case for GSS ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Microsoft Windows Server 2019 - Hands-on Training Part I

By Study Plex

HIGHLIGHTS OF THE COURSE * Course Type: Online Learning * Duration: 1 to 2 hours * Tutor Support: Tutor support is included * Customer Support: 24/7 customer support is available * Quality Training: The course is designed by an industry expert * Recognised Credential: Recognised and Valuable Certification * Completion Certificate: Free Course Completion Certificate Included * Instalment: 3 Installment Plan on checkout -------------------------------------------------------------------------------- WHAT YOU WILL LEARN FROM THIS COURSE? * Gain comprehensive knowledge about Microsoft Server 2019 * Understand the core competencies and principles of Microsoft Server 2019 * Explore the various areas of Microsoft Server 2019 * Know how to apply the skills you acquired from this course in a real-life context * Become a confident and expert Windows Server 2019 administrator -------------------------------------------------------------------------------- MICROSOFT WINDOWS SERVER 2019 - HANDS-ON TRAINING PART I COURSE Master the skills you need to propel your career forward in Microsoft Server 2019. This course will equip you with the essential knowledge and skillset that will make you a confident Windows Server 2019 administrator and take your career to the next level. This comprehensive Microsoft windows server course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this Microsoft Windows Server course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This Microsoft Windows Server 2019 - Hands-on Training Part I course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.  This comprehensive course will teach you the theory of effective Microsoft Server 2019 practice and equip you with the essential skills, confidence and competence to assist you in the Microsoft Server 2019 industry. You'll gain a solid understanding of the core competencies required to drive a successful career in Microsoft Server 2019. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for Windows Server 2019 administrator or for people who are aspiring to specialise in Microsoft Server 2019.This Microsoft Windows Server 2019 - Hands-on Training Part I course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.  Enrol in this Microsoft Windows Server course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. WHO IS THIS COURSE FOR? This comprehensive Microsoft Windows Server course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this Microsoft Server 2019 can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. ENTRY REQUIREMENTS This Microsoft Windows Server course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. ASSESSMENT This Microsoft Windows Server course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. ADVANCE YOUR CAREER This Microsoft Windows Server course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. RECOGNISED ACCREDITATION This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. WHAT IS CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. BENEFITS OF CPD * Improve your employment prospects * Boost your job satisfaction * Promotes career advancement * Enhances your CV * Provides you with a competitive edge in the job market * Demonstrate your dedication * Showcases your professional capabilities WHAT IS IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. BENEFITS OF IPHM * It will help you establish a positive reputation in your chosen field * You can join a network and community of successful therapists that are dedicated to providing excellent care to their client * You can flaunt this accreditation in your CV * It is a worldwide recognised accreditation WHAT IS QUALITY LICENCE SCHEME? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. BENEFITS OF QUALITY LICENSE SCHEME * Certificate is valuable * Provides a competitive edge in your career * It will make your CV stand out COURSE CURRICULUM Course Overview Course Overview Video 00:07:00 Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of Server 2019 Full GUI 00:12:00 Video and lab -Create a Virtual Install of Server 2019 Core Using VirtualBox 00:13:00 Video and Lab - Creating a Virtual Install Of Windows 10 Pro Using Virtualbox 00:16:00 Video - Taking A Snapshot Of Your Current Configuration 00:04:00 Building a Windows Server 2019 Domain Using Powershell Video and Lab - Preparing Your Network For Active Directory 00:08:00 Step 1: Rename Your Server Using Powershell 00:03:00 Step 2: Assign a Static IP address Using PowerShell 00:04:00 Step 3: Install the Active Directory Domain Services Role Using Powershell 00:03:00 Step 4: Promote Server 2019 as a Domain Controller Using PowerShell 00:05:00 Step 5: Promote Server Core to a Domain Controller 00:14:00 Step 6: Add a Windows 10 Client to the Domain 00:15:00 Active Directory Administration video - Create a User in Active Directory 00:04:00 Video - Limit Computers a User Can Log Onto 00:02:00 Video - Limit logon hours for a user in Windows Active Directory 00:02:00 Video - Reset a User's Password in Windows Active Directory 00:02:00 Video - Unlock or Enable An Account in Active Directory 00:02:00 Server 2019 Administration Video and Lab - Reset a Lost Administrator Password in Windows Server 00:13:00 Video - Create a shared folder Using Windows Server 00:04:00 Video - Create a Shared Folder Using Server Manager 00:06:00 Video - Rearm the 180-Day Evaluation Period For Windows Server 00:03:00 Video - Rearm the 30-day Evaluation for Windows 10 00:03:00 Video - Windows Server 2019 Updates Settings 00:04:00 video - Enable Remote Desktop for Server 2019 00:02:00 Video - Enable Remote Desktop Using PowerShell 00:06:00 Video - NTDSUTIL: Resetting the Directory Services Recovery Mode Password 00:03:00 Video - Create a Heads-Up Display Using BgInfo 00:08:00 Video - Manually Enabling Remote Management 00:05:00 Group Policy Video - Prevent Automatic Logoff Due To Inactivity 00:03:00 Video - How To Create And Link a Group Policy To An OU 00:04:00 Video - How To Edit Group Policy Objects To Affect a User 00:03:00 Video - How To Edit a Group Policy Object To Affect a Computer 00:04:00 Video - Backup And Restore Group Policy Objects In Active Directory 00:03:00 Video - Force Screensaver and Timeouts Using Group Policy 00:07:00 Video- Change Users Desktop Background Using Group Policy 00:09:00 Domain Naming System (DNS) Video - Installing the DNS Role Using Server Manager 00:05:00 Video - Create a Secondary Or Backup DNS Server 00:07:00 00:08:00 Video - Create a DNS Reverse Lookup Zone in Server 2019 00:02:00 Video - Create a New DNS Host Record 00:02:00 Video - Create a Host Record For a New Website In Microsoft DNS 00:04:00 Video - Creating a New MX Record For a Microsoft Exchange Server In DNS 00:04:00 DHCP Video - Install the DHCP Role Using PowerShell 00:09:00 Video - Installing the DHCP Server Role Using Server Manager 00:03:00 Video - How to Authorize/Unauthorize a DHCP Server 00:03:00 Video - How To Edit The Default Gateway Settings In DHCP 00:03:00 Video - How To Edit DNS Server List In DHCP 00:04:00 Video - Edit a DHCP Scope 00:03:00 video - How To Backup And Restore The DHCP Database 00:03:00 Video - Use Filters In DHCP To Deny Clients DHCP Services 00:02:00 Video - Create Predefined Options In DHCP 00:06:00 Video - Use DHCP User Classes to Assign Alternate DHCP Options 00:05:00 Disk Management Video - Adding Additional Virtual Hard Disks 00:06:00 Video - How to Shrink Or Extend a Volume In Windows Server 2019 00:04:00 Video - How To Format a Volume With ReFS in Windows Server 2019 00:04:00 Video - How To Format a Volume With FAT32 in Windows Server 2019 00:02:00 Firewall Administration Video -Turn The Windows Firewall On And Off 00:01:00 Video - Using Netsh To Manage the Windows Firewall 00:05:00 Video - Using Powershell to Gather Firewall Information 00:04:00 Troubleshooting Video - Allow PING between Windows Server and Windows 10 00:05:00 Video and Lab - Troubleshooting Internet Connectivity 00:16:00 Video - NSLookup 00:05:00 Video - Windows Reliability Monitor 00:04:00 Overview of Windows Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:15:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Microsoft Windows Server 2019 - Hands-on Training Part I
Delivered Online On Demand
£19

First Aid for Students

5.0(50)

By Pochat Training

FAA Level 2 Award In Student First Aid (RQF)

First Aid for Students
Delivered in-person, on-requestDelivered In-Person in Alfreton & 13 more
Price on Enquiry