• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

259 Courses

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE TELCO CLOUD AUTOMATION INSTALLATION * Describe day-zero operations for VMware Telco Cloud Automation * Describe the VMware Telco Cloud Automation architecture * List the steps to perform VMware Telco Cloud Automation deployment * List the steps to perform VMware Telco Cloud Automation control plane integration * Describe VMware Telco Cloud Automation control plane scaling * Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor * Describe where, when, and how to use VMware Telco Cloud Automation tagging DAY ONE OPERATIONS: INFRASTRUCTURE SETTINGS * Describe the VMware Telco Cloud Automation infrastructure options * Describe VMware Telco Cloud Automation infrastructure requirements * Outline the role of virtual infrastructure and TCA * Identify the benefits of public versus private infrastructure * List the steps to integrate a VM-based virtual infrastructure * List the steps to integrate a container-based virtual infrastructure * Describe private infrastructure requirements DAY ONE OPERATIONS: CONTAINERS AS A SERVICE * Define Containers as a Service (CaaS) * List the challenges of CNF deployment without automation * Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures * Describe supporting technologies like Cluster API * List steps to create a Kubernetes cluster template * Describe the process for deploying node pools and groups * Describe cluster monitoring * List CaaS scale options DAY ONE OPERATIONS: PARTNER INTEGRATION * Describe partner integration and the types of partners * Describe Harbor and the various Harbor platforms * List the steps to interface with a Harbor platform * Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) * Explain how to add an S-VNFM * Define S-VNFM use cases DAY ONE OPERATIONS: ZERO TOUCH PROVISIONING AND INFRASTRUCTURE DEPLOYMENT * Describe zero-touch provisioning * List the use cases of zero-touch provisioning * List the benefits of zero-touch provisioning * Describe the infrastructure requirements of zero-touch provisioning * Describe the zero-touch provisioning domains * List the steps to deploy an infrastructure using zero-touch provisioning DAY ONE OPERATIONS: NETWORK FUNCTIONS AD NETWORK SERVICES * Describe the roles of network services and network functions * List the types of descriptors * Describe the role of TOSCA * Describe the role of onboarding * List the steps to onboard network functions and network services * Examine the results of the onboarding process * List the steps to instantiate network functions and network services * Examine the results of the instantiation process DAY TWO OPERATIONS: AUTHORIZATION MODEL * Explain the resources that can be accessed in vSphere * Define the role of a VMware vCenter Server© system in credential management * Describe the procedures to create, delete, and modify rules using vCenter Server * Explain how to control and verify access to vSphere resources * List roles in VMware Telco Cloud Automation * Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation * List all the permissions and filters that can be implemented in VMware Telco Cloud Automation * Summarize the role-based access control model of VMware Telco Cloud Automation DAY TWO OPERATIONS: PLATFORM LIFE CYCLE MANAGEMENT * Explain the life cycle stages in VMware Telco Cloud Automation control plane * Explain the life cycle stages in VMware Telco Cloud Automation * Define an upgrade schedule * Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation * control plane * Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation * Describe network function and network service life cycle management events * Execute network function and network service healing * Set up Network Function and Network Service monitoring * Perform Network Function and Network Service termination DAY TWO OPERATIONS: TROUBLESHOOTING * List the components of the VMware Telco Cloud Automation dashboard * Explain the features of fault management in VMware Telco Cloud Automation * Explain the features of performance management in VMware Telco Cloud Automation * Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs * Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs * Troubleshoot using tcf_manager, app.log, and web.log * Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation * Usage of VMware vRealize© Operations? DAY TWO OPERATIONS: API MANAGEMENT * Define the VMware Telco Cloud Automation API * Explain the API architecture * Describe VMware Telco Cloud Automation API use cases * Explain how to configure an external REST API * Describe how to request security tokens for implementation * Explain how to implement commands through external systems using APIs DAY TWO OPERATIONS: CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY * Describe continuous integration and continuous delivery (CICD) * List the benefits and challenges of CICD * Describe how VMware Telco Cloud Automation can be used in a CICD environment * Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vRealize Operations: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators Consultants responsible for designing, implementing, and customizing vRealize Operations Overview By the end of the course, you should be able to meet the following objectives: List the vRealize Operations use cases Identify features and benefits of vRealize Operations Determine the vRealize Operations cluster that meets your monitoring requirements Deploy and configure a vRealize Operations cluster Use interface features to assess and troubleshoot operational problems Describe vRealize Operations certificates Create policies to meet the operational needs of your environment Recognize effective ways to optimize performance, capacity, and cost in data centers Troubleshoot and manage problems using workbench, alerts, and predefined dashboards Manage configurations Configure application monitoring using VMware vRealize Operations Cloud Appliance™ Create custom symptoms and alert definitions, reports, and views Create various custom dashboards using the dashboard creation canvas Configure widgets and widget interactions for dashboards Create super metrics Set up users and user groups for controlled access to your environment Extend the capabilities of vRealize Operations by adding management packs and configuring solutions Monitor the health of the vRealize Operations cluster by using self-monitoring dashboards This course provides you with the knowledge and skills to deploy a VMware vRealize Operations cluster that meets the monitoring requirements of your environment.This course includes advanced capabilities such as customizing alerts, views, reports, and dashboards and explains the deployment and architecture in vRealize Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs. COURSE INTRODUCTION * Introduction and course logistics * Course objectives INTRODUCTION TO VREALIZE OPERATIONS * List the vRealize Operations use cases * Access the vRealize Operations User Interface (UI) VREALIZE OPERATIONS ARCHITECTURE * Identify the functions of components in a vRealize Operations node * Identify the types of nodes and their role in a vRealize Operations cluster * Outline how high availability is achieved in vRealize Operations * List the components required to enable Continuous Availability (CA) DEPLOYING VREALIZE OPERATIONS * Design and size a vRealize Operations cluster * Deploy a vRealize Operations node * Install a vRealize Operations instance * Describe different vRealize Operations deployment scenarios VREALIZE OPERATIONS CONCEPTS * Identify product UI components * Create and use tags to group objects * Use a custom group to group objects VREALIZE OPERATIONS POLICIES AND CERTIFICATE MANAGEMENT * Describe vRealize Operations certificates * Create policies for various types of workloads * Explain how policy inheritance works CAPACITY OPTIMIZATION * Define capacity planning terms * Explain capacity planning models * Assess the overall capacity of a data center and identify optimization recommendations WHAT-IF SCENARIOS AND COSTING IN VREALIZE OPERATIONS * Run what-if scenarios for adding workloads to a data center * Discuss the types of cost drivers in vRealize Operations * Assess the cost of your data center inventory PERFORMANCE OPTIMIZATION * Introduction to performance optimization * Define the business and operational intentions for a data center * Automate the process of optimizing and balancing workloads in data centers * Report the results of optimization potential TROUBLESHOOTING AND MANAGING CONFIGURATIONS * Describe the troubleshooting workbench * Recognize how to troubleshoot problems by monitoring alerts * Use step-by-step workflows to troubleshoot different vSphere objects * Assess your environment?s compliance to standards * View the configurations of vSphere objects in your environment OPERATING SYSTEM AND APPLICATION MONITORING * Describe native service discovery and application monitoring features * Configure application monitoring * Monitor operating systems and applications by using VMware vRealize© Operations Cloud Appliance? CUSTOM ALERTS * Create symptom definitions * Create recommendations, actions, and notifications * Create alert definitions that monitor resource demand in hosts and VMs * Build and use custom views in your environment CUSTOM VIEWS AND REPORTS * Build and use custom views in your environment * Create custom reports for presenting data about your environment CUSTOM DASHBOARDS * Create dashboards that use predefined and custom widgets * Configure widgets to interact with other widgets and other dashboards * Configure the Scoreboard widget to use a metric configuration file * Manage dashboards by grouping dashboards and sharing dashboards with users SUPER METRICS * Recognize different types of super metrics * Create super metrics and associate them with objects * Enable super metrics in policies USER ACCESS CONTROL * Recognize how users are authorized to access objects * Determine privilege priorities when a user has multiple privileges * Import users and user groups from an LDAP source EXTENDING AND MANAGING A VREALIZE OPERATIONS DEPLOYMENT * Identify available management packs in the VMware Marketplace? * Monitor the health of a vRealize Operations cluster * Generate a support bundle * View vRealize Operations logs and audit reports * Perform vRealize Operations cluster management tasks ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Operations: Install, Configure, Manage [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Operations: Install, Configure, Manage [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Operations: Install, Configure, Manage [V8.6]
Delivered on-request, onlineDelivered Online
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. INTRODUCTION * Introduction to the application you will build * Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) THINKING SERVERLESS * Best practices for building modern serverless applications * Event-driven design * AWS services that support event-driven serverless applications API-DRIVEN DEVELOPMENT AND SYNCHRONOUS EVENT SOURCES * Characteristics of standard request/response API-based web applications * How Amazon API Gateway fits into serverless applications * Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function * High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) INTRODUCTION TO AUTHENTICATION, AUTHORIZATION, AND ACCESS CONTROL * Authentication vs. Authorization * Options for authenticating to APIs using API Gateway * Amazon Cognito in serverless applications * Amazon Cognito user pools vs. federated identities SERVERLESS DEPLOYMENT FRAMEWORKS * Overview of imperative vs. declarative programming for infrastructure as code * Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks * Features of AWS SAM and the AWS SAM CLI for local emulation and testing USING AMAZON EVENTBRIDGE AND AMAZON SNS TO DECOUPLE COMPONENTS * Development considerations when using asynchronous event sources * Features and use cases of Amazon EventBridge * Try-it-out exercise: Build a custom EventBridge bus and rule * Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge * Try-it-out exercise: Configure an Amazon SNS topic with filtering EVENT-DRIVEN DEVELOPMENT USING QUEUES AND STREAMS * Development considerations when using polling event sources to trigger Lambda functions * Distinctions between queues and streams as event sources for Lambda * Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda * Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source WRITING GOOD LAMBDA FUNCTIONS * How the Lambda lifecycle influences your function code * Best practices for your Lambda functions * Configuring a function * Function code, versions and aliases * Try-it-out exercise: Configure and test a Lambda function * Lambda error handling * Handling partial failures with queues and streams STEP FUNCTIONS FOR ORCHESTRATION * AWS Step Functions in serverless architectures * Try-it-out exercise: Step Functions states * The callback pattern * Standard vs. Express Workflows * Step Functions direct integrations * Try-it-out exercise: Troubleshooting a Standard Step Functions workflow OBSERVABILITY AND MONITORING * The three pillars of observability * Amazon CloudWatch Logs and Logs Insights * Writing effective log files * Try-it-out exercise: Interpreting logs * Using AWS X-Ray for observability * Try-it-out exercise: Enable X-Ray and interpret X-Ray traces * CloudWatch metrics and embedded metrics format * Try-it-out exercise: Metrics and alarms * Try-it-out exercise: ServiceLens SERVERLESS APPLICATION SECURITY * Security best practices for serverless applications * Applying security at all layers * API Gateway and application security * Lambda and application security * Protecting data in your serverless data stores * Auditing and traceability HANDLING SCALE IN SERVERLESS APPLICATIONS * Scaling considerations for serverless applications * Using API Gateway to manage scale * Lambda concurrency scaling * How different event sources scale with Lambda AUTOMATING THE DEPLOYMENT PIPELINE * The importance of CI/CD in serverless applications * Tools in a serverless pipeline * AWS SAM features for serverless deployments * Best practices for automation * Course wrap-up ADDITIONAL COURSE DETAILS: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered on-request, onlineDelivered Online
Price on Enquiry

Aruba OS-CX Switching Fundamentals, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain Networking Fundamentals Describe and review the Aruba Switching portfolio with customers Install and configure devices running the ArubaOS-CX Network Operating System Describe and configure VLANs Explain, describe and configure Spanning Tree Protocol Understand when to use VRRP and how to configure it Explain and configure Link Aggregation Understand and configure IP Routing Explain IP Subnetting Understand and configure OSPFv2 - Single Area Describe and configure Switch Stacking using VSF Configuration of Aruba solutions using Secure Management and Maintenance methodologies Manage, monitor, administer and operate Aruba solutions using Aruba's NetEdit tool This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. This course consists of approximately 60% lecture and 40% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 5-day course prepares candidates for the Aruba Certified Switching Associate exam.In this course, participants learn about ArubaOS-CX switch technologies including multi-layer switches. You will also learn about broadcast domains and Virtual Local Area Networks (VLANs); secure management protocols such as AAA, SSH, HTTPS, and Dynamic Segmentation using Aruba's Role-Based Access Control (RBAC); availability technologies such as Multiple Spanning Tree Protocol (MSTP); link aggregation techniques including Link Aggregation Control Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Framework (VSF). Static and dynamic IP routing protocols such as Open Shortest Path First (OSPF) are also covered. NETWORK FUNDAMENTALS * What is a network? * What is a Protocol? * OSI Reference Model * Encapsulation, frames, packets, segments * Layer 2 to Layer 7 headers * Media, cabling, Ethernet/wifi headers * Binary/Hex/Decimal theory and conversion * TCP/IP Stack (IP addressing & Transport Protocols TCP/UDP) * Types of traffic: Unicast, Broadcast, Multicast TCP/IP STACK * Overview * Ethernet frames * IPv4 Header * TCP Header ? Three-way Handshake * TCP Header ? Sequence Numbers * TCP Header ? Port Numbers * TCP Header * UPD Header BASIC NETWORKING WITH ARUBA SOLUTIONS * Networking devices: Switches, Routers, Multilayer Switches, APs, Mobility Controllers, Firewalls, Servers (HTTP, DHCP, DNS, Telnet, FTP) * 2-Tier vs 3-Tier hierarchy * Switching Portfolio (AOS switches & AOS-CX switches) is this introducing both portfolio on a couple of slide and few slides on AOS-CX hardware architecture, software architecture and intro to NAE high level. * Introduction to AOS-CX and feature set * Port numbering * Accessing Aruba OS-CX CLI * Prompt modes/levels and navigation * Context sensitive help * Show logs, configuration, interfaces, transceivers, flash, version * Hostname/interface name, enabling interfaces * Link Layer Discovery Protocol * ICMP and reachability testing tools: Ping and Traceroute * PoE (standards one slide and what we support and one or two slide on configuration and verifications.) VLANS * Broadcast/collision domains * VLAN benefits * VLAN creation * DHCP server configuration in switches (optional) * 802.1Q tagging * Switchports vs. Routed ports * MAC address table * ARP table * Packet Delivery part 1 SPANNING TREE PROTOCOL * Redundant network * L2 loops * 802.1D * Common Spanning Tree * 802.1s * 802.1w overview * 802.1w load balancing * 802.1w region configuration LINK AGGREGATION * Static Aggregation * LACP * Load Balancing IP ROUTING - PART 1 * Default Gateway * DHCP IP Helper Address * IP Routing Service * Inter-VLAN routing * Packet Delivery Part 2 * Need for layer 3 redundancy * Introduction to VRF VRRP * VRRP overview * VRRP basic operation * VRRP failover and preempt * VRRP and MSTP coordination IP ROUTING - PART 2 * Subnetting * CIDR * Static routes * Administrative Distance * Floating routes * Scalability issues * IP ROUTING - PART 3 * IGP vs EGP * Distance Vector vs Link State * OSPF Router-ID and Hello Messages * Passive interfaces * States * DR and BDR * LSDB: LSA 1 and 2 * Path selection and convergence * Using cost to manipulate routes STACKING * Control Plane, Management Plane, and Data Plane * Introduction to Stacking technologies * Stacking Benefits * Centralized control and management plane * Distributed Data Plane and Distributed Link Aggregation * VSF * VSF requirements * VSF Link and member roles * VSF member IDs and port numbers * VSF Configuration * VSF Provisioning use cases * Tracing Layer 2 traffic: Unicast * Tracing Layer 2 traffic: Broadcast, Multicast, and Unknown Unicast * VSF Failover and OSFP Graceful-Restart * VSF Link failure without MAD * MAD * VSX Introduction SECURE MANAGEMENT AND MAINTENANCE * OOBM port * Management VRF * Secure Management Protocols: AAA, SSH, HTTPS, RBAC * Radius-based management auth (VSA) * SNMP * Web interface * Configuration file management (Backup, restore, checkpoint and roll back) * Operating System image management (backup and restore) * Factory default/password recovery AOS-CX MANAGEMENT TOOLS * Intro to NetEdit * NetEdit installation * Basic monitoring with NetEdit * AOS-CX Mobile App ADDITIONAL COURSE DETAILS: Nexus Humans Aruba OS-CX Switching Fundamentals, Rev. 20.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba OS-CX Switching Fundamentals, Rev. 20.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba OS-CX Switching Fundamentals, Rev. 20.21
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco SD-WAN Cloud (SDWAN-CLD-CT)

By Nexus Human

Duration 5 Days 30 CPD hours Overview Upon completing this course, you will be able to meet the following objectives: SD-WAN Overview Cloud Concepts Cloud Technologies SD-WAN Direct Cloud Access (DCA) SD-WAN SaaS Cloud On-RAMP for IAAS (AWS) Cloud On-RAMP for IAAS (AZURE) Cloud Configuration for GCP Cloud On-RAMP for MULTI-CLOUD Cloud On-RAMP for CO-LOCATIONS This is a 5 day hands-on course on Cisco SD-WAN Cloud Configuration, Monitoring and Troubleshooting. This course provides the student with the knowledge to connect SD-WAN to SaaS Applications, as well as the ability to connect their Branches to AWS, AZURE, GCP Data Centers in the Cloud. Students will also learn how to Configure, Monitor, and Troubleshoot SD-WAN Co-Locations and SD-WAN Multicloud. SD-WAN OVERVIEW * SD-WAN Controller SD-WAN WAN Edges supported in Cloud Instances CLOUD CONCEPTS * Cloud Ops vs WAN Ops Cloud Connectivity Cloud Access Control Cloud Network Connectivity Cloud Regions Cloud Availability Zones Virtual Networks Cloud Routing Internet Gateways VS VPN Gateways VPC/VNET: IP Addressing Cloud Network Load Balancing Cloud Peering Cloud Transit Networks CLOUD TECHNOLOGIES * Azure Azure Basics Resource Groups vNets Availability zones Availability Set Workload and Public IP Network Virtual Appliance Load Balancer User Defined Routes Network Security Group VPN Gateway Express Routes Creating VNET for SDWAN AWS AWS Basics Region VPCs Availability zones Subnets EC2 Instance Elastic IPs Security Groups Internet Gateway NAT Gateway Route Table VPN Gateway Direct Connect Elastic Load Balancer Subscribe to Amazon machine images Setting AWS resource limits AWS Transit Gateways Creating VPC for SDWAN AWS IAM Role AWS Security Groups Service limits AWS SSH key pair Google Cloud GCP Basics Project Region Virtual Private Cloud Availability Zone Subnets Compute Engine Cloud Load Balancer Cloud DNS VPC Routing Cloud VPN & VPC peering VPC Firewall Rules SD-WAN DIRECT CLOUD ACCESS (DCA) * DCA Prerequisites DNS on VPN 0 DIA Central Policy Configuration Match Traffic Set QOS Set External Access SD-WAN SAAS * Supported Platforms and Versions SaaS Prerequisites DNS on VPN 0 DIA SaaS Access Methods Cloud Access through Direct Internet Access Links Cloud Access through a Gateway Site Hybrid Approach Supported SaaS Applications SaaS Security Options SaaS Configuration Common Scenarios for Using Cloud onRamp for SaaS Specify Office 365 Traffic Category Enable Cloud onRamp for SaaS, Cisco IOS XE SD-WAN Devices Configure Applications for Cloud onRamp for SaaS Using Cisco vManage Configure Sites for Cloud onRamp for SaaS Using Cisco vManage View Details of Monitored Applications CLOUD ON-RAMP FOR IAAS (AWS) * Prerequisite AWS Configuration Verify prerequisites Configure AWS for Cisco SD-WAN Cloud On-RAMP for AWS Overview Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp AWS IAM Role Select Region Select CPU and Memory Transit Networking IP Addresses Discover and Map Host VPCs AWS to SD-WAN Security Monitor Cisco Cloud Onramp for AWS Troubleshoot Cisco Cloud Onramp for AWS Interconnecting Cisco SD-WAN with AWS Transit Gateway (TGW) CLOUD ON-RAMP FOR IAAS (AZURE) * Prerequisite AZURE Configuration Cloud On-RAMP for AZURE Configure AWS for Cisco SD-WAN Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp Select Region Discover and Map Host VPCs Monitor Cisco Cloud Onramp for Azure Troubleshoot Cisco Cloud Onramp for AZURE Azure Virtual Wan (VWAN) Integration CLOUD CONFIGURATION FOR GCP * Prerequisite GCP Configuration SD-WAN Configuration Configure Google Cloud for SD-WAN Google Cloud GCP Basics Deploy cEdge Catalyst 8000V Edges Setup IPSEC Connections Setup BGP Connections CLOUD ON-RAMP FOR MULTI-CLOUD * AWS Transit Gateway Microsoft vWAN Create Cisco Cloud GW Discover host VPCs/VNets Map Branch nets to VPCs CLOUD ON-RAMP FOR CO-LOCATIONS * SD-WAN CO-LOCATIONS Overview Colocation facilities Cisco Colocation Equipment Cisco Cloud Services Platform 5444 Cisco Network Function Virtualization Infrastructure Software (NFVIS) Virtual Network Functions Network Fabric Cisco Catalyst 9500-48Y4C switch Cisco Catalyst 9500-40X switch Device Configuration and Connectivity Sizing the Colocation Solution Devices Cisco Colocation Manager Deploy Network Services at the Network Edge Colocation Solution?Deployment Workflow Monitor Cisco SD-WAN Colocation Devices Cisco Colocation Manager States for Switch Configuration Cisco Colocation Manager States and Transitions from Host Cisco Colocation Manager Notifications VM Alarms Cloud Services Platform Real-Time Commands Colocation High Availability Troubleshoot Cisco SD-WAN Cloud onRamp for Colocation Solution Troubleshoot Catalyst 9500 Issues Troubleshoot Cloud Services Platform Issues DHCP IP Address Assignment Troubleshoot Cisco Colo Manager Issues Troubleshoot Service Chain Issues Troubleshoot Physical Network Function Management Issues Log Collection from CSP Troubleshoot vManage Issues ADDITIONAL COURSE DETAILS: Nexus Humans Cisco SD-WAN Cloud (SDWAN-CLD-CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Cloud (SDWAN-CLD-CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco SD-WAN Cloud (SDWAN-CLD-CT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Administering Collaboration Environments (CLACE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. DEFINE COLLABORATION TECHNOLOGY AND BENEFITS * Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments * Describe On-Premise Collaboration Deployments * Describe Cisco's Collaboration Endpoints * Describe Cisco Collaboration On-Premise Edge Solutions * Describe Cisco's Collaboration On-Premise Conferencing Solutions * Describe Cisco Cloud Services ADMINISTERING INITIAL PARAMETERS FOR CISCO UNIFIED COMMUNICATIONS MANAGER * Understand the On-Premise Collaboration Deployment Models * Describe The Cisco Unified CM Cluster Services * Define Network requirements for Collaboration * Define Network Services for Collaboration Navigate Cisco Unified CM Discovery * 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery * 2: Configure the Cisco UCM Core Systems Settings EXPLORING ENDPOINTS AND THE REGISTRATION PROCESS * Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint * Describe Power Over Ethernet * Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings * Discovery 4: Deploy an IP Phone Through Auto and Manual Registration * Discovery 5: Administer Endpoints in Cisco Unified Communications Manager MANAGING USERS IN CISCO UNIFIED COMMUNICATIONS MANAGER * Analyze Cisco UCM Users Types and Settings * Describe Methods for Authenticating Cisco UCM Users * Discovery 6: Create Local User Accounts * Discovery 7: Adding Users in Cisco Unified Communications Manager DESCRIBING A BASIC DIAL PLAN * Describe the Concepts of a Dial Plan and Call Routing * Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns * Discovery 8: Create a Basic Dial Plan DESCRIBING CLASS OF SERVICE * Explore the Concepts of Class of Control * Discovery 9: Explore Partitions and Calling Search Spaces * Discovery 10: Explore Private Line Automatic Ringdown (PLAR) ENABLING ENDPOINTS AND FEATURES * Configure a Cisco Jabber Endpoint in Cisco UCM * Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility * Discovery 12: Implement Mobility IMPLEMENTING MEDIA RESOURCES IN CISCO UNIFIED COMMUNICATIONS MANAGER * Media Resource Overview * Media Resource Selection and Access Control Audio and Video Conference * Bridge Devices Audio and Video Conference * Bridge Integration Options * Discovery 13: Configuring Media Resources REPORTING AND MAINTENANCE * Explore the Troubleshooting Process * Describe Reporting and Maintenance Tools * Describe the Cisco Real-Time Monitoring Tool * Discovery 14: Use Reporting and maintenance Tools DESCRIBING CISCO INSTANT MESSAGING AND PRESENCE * Describe Cisco IM and Presence Features and Architecture Clustering * Describe Cisco IM and Presence Components and Communication Flows ENABLING JABBER * Cisco Jabber Deployment Modes * Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows CONFIGURE UNITY CONNECTION INTEGRATION * Overview of Cisco Unity Connection * Integration SIP Integration Typical Integration * Mistakes Integration Considerations * Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM * Discovery 17: Configure Voicemail Users CONFIGURING CISCO UNITY CONNECTION CALL HANDLERS * Call handler Overview System * Call Handler Caller Input Operator * Call Handler Goodbye * Call Handler Directory Handler * Interview Handler TROUBLESHOOTING CISCO UNITY CONNECTION * Overview of Cisco Unity Connection * Troubleshooting Options Integration * Troubleshooting Tools Cisco Real-Time Monitoring Tool * Discovery 18: Troubleshoot Cisco Unity Connection ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering Collaboration Environments (CLACE)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to C Plus Plus Programming Essentials (TTCP2100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level C++ programming course designed for developers with experience programming in C or other languages. Practical hands-on prior programming experience and knowledge is required. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with C++, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: Writing procedural programs using C++ Using private, public and protected keywords to control access to class members Defining a class in C++ Writing constructors and destructors Writing classes with const and static class members Overloading operators Implementing polymorphic methods in programs Writing programs using file I/O and string streams Using manipulators and stream flags to format output Using the keyword template to write generic functions and classes Writing programs that use generic classes and functions Writing programs that use algorithms and containers of the Standard Library Apply object-oriented design techniques to real-world programming problems Using algorithms and containers of the Standard Library to manipulate string data Understand how C++ protects the programmer from implementation changes in other modules of an application Using try() blocks to trap exceptions Using catch() blocks to handle exceptions Defining exceptions and using throw to trigger them Introduction to C++ Programming / C++ Essentials is a skills-focused, hands-on C++ training course geared for experienced programmers who need to learn C++ coupled with sounds coding skills and best practices for OO development. Students will leave this course armed with the required skills to put foundation-level C++ programming skills right to work in a practical environment. The central concepts of C++ syntax and style are taught in the context of using object-oriented methods to achieve reusability, adaptability and reliability. Emphasis is placed on the features of C++ that support abstract data types, inheritance, and polymorphism. Students will learn to apply the process of data abstraction and class design. Practical aspects of C++ programming including efficiency, performance, testing, and reliability considerations are stressed throughout. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency MOVING FROM C TO C++ (OPTIONAL) * New Compiler Directives * Stream Console I/O * Explicit Operators * Standard Libraries * Data Control Capabilities HANDLING DATA * New Declaration Features * Initialization and Assignment * Enumerated Types * The bool Type * Constant Storage * Pointers to Constant Storage * Constant Pointers * References * Constant Reference Arguments * Volatile Data * Global Data FUNCTIONS * Function Prototypes and Type Checking * Default Function Data Types * Function Overloading * Problems with Function Overloading * Name Resolution * Promotions and Conversions * Call by Value * Reference Declarations * Call-by-Reference and Reference Types * References in Function Return * Constant Argument Types * Conversion of Parameters Using Default Initializers * Providing Default Arguments * Inline Functions OPERATOR OVERLOADING * Advantages and Pitfalls of Overloading * Member Operator Syntax and Examples * Class Assignment Operators * Class Equality Operators * Non-Member Operator Overloading * Member and Non-Member Operator Functions * Operator Precedence * This Pointer * Overloading the Assignment Operator * Overloading Caveats CREATING AND USING OBJECTS * Creating Automatic Objects * Creating Dynamic Objects * Calling Object Methods * Constructors * Initializing Member consts * Initializer List Syntax * Allocating Resources in Constructor * Destructors * Block and Function Scope * File and Global Scope * Class Scope * Scope Resolution Operator :: * Using Objects as Arguments * Objects as Function Return Values * Constant Methods * Containment Relationships DYNAMIC MEMORY MANAGEMENT * Advantages of Dynamic Memory Allocation * Static, Automatic, and Heap Memory * Free Store Allocation with new and delete * Handling Memory Allocation Errors CONTROLLING OBJECT CREATION * Object Copying and Copy Constructor * Automatic Copy Constructor * Conversion Constructor STREAMING I/O * Streams and the iostream Library * Built-in Stream Objects * Stream Manipulators * Stream Methods * Input/Output Operators * Character Input * String Streams * Formatted I/O * File Stream I/O * Overloading Stream Operators * Persistent Objects * INTRODUCTION TO OBJECT CONCEPTS * The Object Programming Paradigm * Object-Orientated Programming Definitions * Information Hiding and Encapsulation * Separating Interface and Implementation * Classes and Instances of Objects * Overloaded Objects and Polymorphism DECLARING AND DEFINING CLASSES * Components of a Class * Class Structure * Class Declaration Syntax * Member Data * Built-in Operations * Constructors and Initialization * Initialization vs. Assignment * Class Type Members * Member Functions and Member Accessibility * Inline Member Functions * Friend Functions * Static Members * Modifying Access with a Friend Class TEMPLATES * Purpose of Template Classes * Constants in Templates * Templates and Inheritance * Container Classes * Use of Libraries STRINGS IN C++ * Character Strings * The String Class * Operators on Strings * Member Functions of the String Class INHERITANCE * Inheritance and Reuse * Composition vs. Inheritance * Inheritance: Centralized Code * Inheritance: Maintenance and Revision * Public, Private and Protected Members * Redefining Behavior in Derived Classes * Designing Extensible Software Systems * Syntax for Public Inheritance * Use of Common Pointers * Constructors and Initialization * Inherited Copy Constructors * Destructors and Inheritance * Public, Protected, Private Inheritance * EXCEPTIONS * Types of Exceptions * Trapping and Handling Exceptions * Triggering Exceptions * Handling Memory Allocation Errors C++ PROGRAM STRUCTURE * Organizing C++ Source Files * Integrating C and C++ Projects * Using C in C++ RELIABILITY CONSIDERATIONS IN C++ PROJECTS * Function Prototypes * Strong Type Checking * Constant Types * C++ Access Control Techniques POLYMORPHISM IN C++ * Definition of Polymorphism * Calling Overridden Methods * Upcasting * Accessing Overridden Methods * Virtual Methods and Dynamic Binding * Virtual Destructors * Abstract Base Classes and Pure Virtual Methods MULTIPLE INHERITANCE * Derivation from Multiple Base Classes * Base Class Ambiguities Virtual Inheritance * Virtual Base Classes * Virtual Base Class Information THE STANDARD TEMPLATE LIBRARY * STL Containers * Parameters Used in Container Classes * The Vector Class * STL Algorithms * Use of Libraries

Introduction to C Plus Plus Programming Essentials (TTCP2100)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. SYSTEM ADMINISTRATION OVERVIEW * UNIX, Linux and Open Source * Duties of the System Administrator * Superusers and the Root Login * Sharing Superuser Privileges with Others (su and sudo Commands) * TCP/IP Networking Fundamentals * Online Help INSTALLATION AND CONFIGURATION * Planning: Hardware and Software Considerations * Site Planning * Installation Methods and Types * Installation Classes * Partitions * Logical Volume Manager - LVM * File System Overview * Swap Partition Considerations * Other Partition Considerations * The Linux Boot Loader: grub * Software Package Selection * Adding and Configuring Peripherals * Printers * Graphics Controllers * Basic Networking Configuration * Booting to Recovery Mode BOOTING AND SHUTTING DOWN LINUX * Boot Sequence * The systemd Daemon * The systemctl Command * Targets vs. Run Levels * Modifying a Target * Service Unit Scripts * Changing System States * Booting into Rescue Mode * Shutdown Commands MANAGING SOFTWARE AND DEVICES * Identifying Software Packages * Using rpm to Manage Software * Using yum to Manage Software * Installing and Removing Software * Identifying Devices * Displaying Device and System Information (PCI, USB) * Plug and Play Devices * Device Configuration Tools MANAGING USERS AND GROUPS * Setting Policies * User File Management * The /etc/passwd file * The /etc/shadow file * The /etc/group file * The /etc/gshadow file * Adding Users * Modifying User Accounts * Deleting User Accounts * Working with Groups * Setting User Environments * Login Configuration Files THE LINUX FILE SYSTEM * Filesystem Types * Conventional Directory Structure * Mounting a File System * The /etc/fstab File * Special Files (Device Files) * Inodes * Hard File Links * Soft File Links * Creating New File Systems with mkfs * The lost+found Directory * Repairing File Systems with fsck * The Journaling Attribute * File and Disk Management Tools LINUX FILE SECURITY * File Permissions * Directory Permissions * Octal Representation * Changing Permissions * Setting Default Permissions * Access Control Lists (ACLs) * The getfacl and setfacl commands * SUID Bit * SGID Bit * The Sticky Bit CONTROLLING PROCESSES * Characteristics of Processes * Parent-Child Relationship * Examining Running Processes * Background Processes * Controlling Processes * Signaling Processes * Killing Processes * Automating Processes * cron and crontab * at and batch * System Processes (Daemons) WORKING WITH THE LINUX KERNEL * Linux Kernel Components * Types of Kernels * Kernel Configuration Options * Recompiling the Kernel SHELL SCRIPTING OVERVIEW * Shell Script Fundamentals * Bash Shell Syntax Overview * Shell Script Examples SYSTEM BACKUPS * Backup Concepts and Strategies * User Backups with the tar Command * System Backup Options * The xfsdump and xfsrestore Commands TROUBLESHOOTING THE SYSTEM * Common Problems and Symptoms * Troubleshooting Steps * Repairing General Boot Problems * Repairing the GRUB 2 Boot Loader * Hard Drive Problems * Restoring Shared Libraries * System Logs and rsyslogd BASIC NETWORKING * Networking Services Overview * NetworkManager Introduction * Network Configuration Files Locations and Formats * Enabling and Restarting Network Services with systemtcl * Configuring Basic Networking Manually * Configuring Basic Networking with NetworkManager LAMP SERVER BASICS * LAMP Overview * Configuring the Apache Web Server * Common Directives * Apache Virtual Hosting * Configuring an Open Source Database * MySQL * MariaDB * PHP Basics * Perl CGI Scripting INTRODUCTION TO SYSTEM SECURITY * Security Overview * Maintaining System Security * Server Access * Physical Security * Network Security * Security Tools * Port Probing with nmap * Intrusion Detection and Prevention * PAM Security Modules * Scanning the System * Maintaining File Integrity * Using Firewalls * Introduction to firewalld THE SAMBA FILE SHARING FACILITY * Configure Samba for Linux to Linux/UNIX File Sharing * Configure Samba for Linux to Windows File Sharing * Use the smbclient Utility to Transfer Files * Mount/Connect Samba Shares to Linux and Windows Clients NETWORKED FILE SYSTEMS (NFS) * Using NFS to Access Remote File Systems * Configuring the NFS Server * Configuring the NFS Client * Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "access control training"

Show all 6
Ember Compliance

ember compliance

Broxburn

WELCOME TO EMBER COMPLIANCE We are thrilled to announce that this year marks our 20th year supporting the Fire & Security industry! With two decades of experience under our belt, we are committed to providing the highest quality training and support to our attendees. Last year, we received a 4.9 out of 5-star review rating from our attendees, making us incredibly proud of the impact we are making. We are committed to exceeding expectations and delivering training that is second to none. We take pride in our ability to provide cutting-edge training that meets the highest standards, ensuring that our attendees have the knowledge and skills they need to succeed in their careers. At Ember Compliance, we are passionate about what we do and dedicated to providing the best possible training experience. Join us today and experience the excellence that Ember Compliance is known for in the Fire & Security industry. Thank you for trusting us to support your professional development. PROVIDING INDEPENDENT TRAINING TO THE UK FIRE & SECURITY INDUSTRY Ember Compliance understand that an integral part of maintaining compliance is ensuring staff and technicians have the competence to carry out activities to national standards. We provide courses and examinations through The CPD Certification Service and FireQual in order for your business to achieve this. Our online training courses and exams include: * Fire alarm system training, specialising in foundation, design, maintenance, and commissioning * Fire safety training * Security system training * CCTV training * Evacuation alert training HERE ARE SOME GREAT REASONS TO BOOK YOUR TRAINING WITH US TODAY * We offer interactive 2-way training sessions * We have over 20 years of training experience * Our trainers are all experienced and work within the industry * All of our trainers have an RQF L3 award in Education & Training * Our trainees rate us 4.8 out of 5 stars * Our class sizes are small (12 maximum) * You can train from anywhere including the ability to sit exams remotely * Our courses are delivered in bite-size chunks Book your training today!

Abbey College Manchester

abbey college manchester

Abbey College Manchester is an independent sixth form college situated on Cheapside in Manchester city centre. Most of our 220 students study A-Levels, GCSEs or one of our International Foundation Programme pathways. We also offer a unique alternative to A-Levels called the Combined Studies Programme which provides an alternative pathway to UK Universities for British Students. Another exciting and popular programme of study is the Academic Studies with Football or Basketball Training, which offers the students the opportunity to combine GCSE, A-Level or the International Foundation Programme study with their passion for sport. We strongly believe that the discipline of sport helps support academic study in the form of the 5 Rs; Routine, Rigour, Responsibility, Resilience and Reflection. We offer a friendly, safe, supportive environment where students can achieve their goals and move on to their chosen university.

Abbey College Manchester is an independent sixth form college situated on Cheapside in Manchester city centre. Most of our 220 students study A-Levels, GCSEs or one of our International Foundation Programme pathways. We also offer a unique alternative to A-Levels called the Combined Studies Programme which provides an alternative pathway to UK Universities for British Students. Another exciting and popular programme of study is the Academic Studies with Football or Basketball Training, which offers the students the opportunity to combine GCSE, A-Level or the International Foundation Programme study with their passion for sport. We strongly believe that the discipline of sport helps support academic study in the form of the 5 Rs; Routine, Rigour, Responsibility, Resilience and Reflection. We offer a friendly, safe, supportive environment where students can achieve their goals and move on to their chosen university.