• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

28650 Courses

VMware Horizon 8: Deploy and Manage

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. COURSE INTRODUCTION * Introductions and course logistics * Course objectives * INTRODUCTION TO VMWARE HORIZON * Recognize the features and benefits of Horizon * Describe the conceptual and logical architecture of Horizon INTRODUCTION TO USE CASE * Define a use case for your virtual desktop and application infrastructure * Convert customer requirements to use-case attributes VSPHERE FOR HORIZON 8 * Explain basic virtualization concepts * Use VMware vSphere© Client? to access your Center Server system and VMware ESXi? hosts * Create, provision, and remove a virtual machine VMWARE HORIZON DESKTOPS * Create a Windows and a Linux virtual machine using vSphere * Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs VMWARE HORIZON AGENTS * Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines * Create a gold master for Windows Horizon desktops VMWARE HORIZON POOLS * Identify the steps to set up a template for desktop pool deployment * List the steps to add desktops to the VMware Horizon© Connection Server? inventory * Compare dedicated-assignment and floating-assignment pools * Outline the steps to create an automated pool * Define user entitlement * Explain the hierarchy of global, pool-level, and user-level policies VMWARE HORIZON CLIENT OPTIONS * Describe the different clients and their benefits * Access Horizon desktop using various Horizon clients and HTML * Configure integrated printing, USB redirection, and the shared folders option * Configure session collaboration and media optimization for Microsoft Teams CREATING AND MANAGING INSTANT-CLONE DESKTOP POOLS * List the advantages of instant clones * Explain the provisioning technology used for instant clone desktop pools * Set up an automated pool of instant clones * Push updated images to instant clone desktop pools CREATING RDS DESKTOP AND APPLICATION POOLS * Explain the difference between an RDS desktop pool and an automated pool * Compare and contrast an RDS session host pool, a farm, and an application pool * Create an RDS desktop pool and an application pool * Access RDS desktops and application from Horizon Client * Use the instant clone technology to automate the build-out of RDSH farms * Configure load-balancing for RDSHs on a farm MONITORING VMWARE HORIZON * Monitor the status of the Horizon components using the Horizon Administrator console dashboard * Monitor desktop sessions using the HelpDesk tool COURSE INTRODUCTION * Introductions and course logistics * Course objectives HORIZON CONNECTION SERVER * Recognize VMware Horizon reference architecture * Identify the Horizon Connection Server supported features * Identify the recommended system requirements for Horizon Connection Server * Configure the Horizon event database * Outline the steps for the initial configuration of Horizon Connection Server * Discuss the ADAM database as a critical component of Horizon Connection Server installation AUTHENTICATION AND CERTIFICATES * Compare the authentication options that Horizon Connection Server supports * Describe the Smartcard authentication options that Horizon Connection Server supports * Outline the steps to create a Horizon administrator and custom roles * Describe the roles available in a Horizon environment * Explain the role that certificates play for Horizon Connection Server * Install and configure certificates for Horizon Connection Server * Install and configure True SSO in a Horizon environment WORKSPACE ONE ACCESS & VIRTUAL APPLICATION MANAGEMENT * Recognize the features and benefits of Workspace ONE Access * Recognize the Workspace ONE Access console features * Explain identity management in Workspace ONE Access * Explain access management in Workspace ONE Access * Describe the Workspace ONE Access directory integration * Describe the Workspace ONE Access directory integration * Deploy virtual applications with Workspace services HORIZON PROTOCOLS * Compare the remote display protocols that are available in VMware Horizon * Describe the BLAST Display Protocol Codecs * Describe BLAST and PCoIP ADMX GPO common configurations GRAPHIC CARDS * Describe the 3D rendering options available in Horizon 8 * Compare vSGA and vDGA * List the steps to configure graphics cards for use in a VMware Horizon environment HORIZON SCALABILITY * Describe the purpose of a replica connection server * Explain how multiple Horizon Connection Server instances in a pod maintain synchronization * Explain Horizon Cloud Pod Architecture LDAP replication and VIPA * Explain Horizon Cloud Pod Architecture scalability options HORIZON SECURITY * Explain concepts relevant to secure Horizon connections * Describe how to restrict Horizon connections. * Discuss the benefits of using Unified Access Gateway * List the two-factor authentication options that are supported by Unified Access Gateway * List Unified Access Gateway firewall rules * Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Deploy and Manage
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. EXPLORING ORACLE DATABASE ARCHITECTURE * Introducing Oracle Database * Relation Database Models * Oracle SQL and PL/SQL * Oracle Database Server Architecture * Connecting to Oracle Databases * Oracle Database Tools * Oracle-Supplied User Accounts * Querying the Oracle Data Dictionary MANAGING DATABASE INSTANCES * Initialization Parameter Files * Starting Up Oracle Databases * Shutting Down Oracle Databases * Opening and Closing PDBs * Working with the Automatic Diagnostic Repository (ADR) * Querying Dynamic Performance Views CREATING PDBS * Methods and Tools to Create PDBs * Creating PDBs from Seed with SQL*Plus * Cloning PDBs with SQL*Plus * Unplugging and Pluggin In PDBs with SQL*Plus * Dropping PDBs with SQL*Plus CONFIGURING THE ORACLE NETWORK ENVIRONMENT * Oracle Net Services * How Listeners Work * Configuring Listeners for Dynamic Service Registration * Configuring Listeners for Static Service Registration * Configuring Local Naming for Connections * Testing Oracle Net Connectivity with tnsping * Configuring Communication Between Databases * Dedicated Versus Shared Server Configurations ADMINISTERING USER SECURITY * Creating Users * Granting Privileges * Creating and Granting Roles * Revoking Privileges and Roles * Creating and Assigning Profiles * Authenticating Users * Assigning Quotas to Users * Applying the Principal of Least Privilege CREATING AND MANAGING TABLESPACES * How Table Data is Stored * Creating Tablespaces in SQL*Plus * Altering and Dropping Tablespaces in SQL*Plus * Viewing Tablespace Information in SQL*Plus * Implementing Oracle Managed Files * Moving and Renaming Online Data Files in SQL*Plus MANAGING STORAGE SPACE * Oracle Database Space Management Features * Block Space Management * Row Chaining and Migration * Free Space Management Within Segments * Types of Segments * Allocating Extents * Understanding Deferred Segment Creation * Space-Saving Features MANAGING UNDO DATA * Undo Data: Overview * Transactions and Undo Data * Storing Undo Information * Comparing Undo Data and Redo Data * Managing Undo * Local Undo Mode Versus Shared Undo Mode * Configuring Undo Retention * Categories of Undo MOVING DATA * Moving Data: General Architecture * Oracle Data Pump: Overview * Oracle Data Pump: Benefits * Data Pump Export and Import Clients * Data Pump Utility: Interfaces and Modes * Data Pump Import: Transformations * SQL*Loader Overview * Loading Methods BACKUP AND RECOVERY CONCEPTS * DBA Responsibilities * Categories of Failure * Understanding Instance Recovery * Understanding Types of Backups * Comparing Complete and Incomplete Recovery * Oracle Data Protection Solutions * Flashback Technology MONITORING AND TUNING DATABASE PERFORMANCE * Managing Performance Activities * Performance Planning Considerations * Database Maintenance * Automatic Workload Repository (AWR) * Automatic Database Diagnostic Monitor * Performance Monitoring * Performance Tuning Methodology * Database Server Statistics and Metrics SQL TUNING * SQL Tuning Process * Oracle Optimizer * Optimizer Statistics * SQL Plan Directives * Adaptive Execution Plans * SQL Tuning Advisor * SQL Access Advisor * SQL Performance Analyzer ORACLE DATABASE RESOURCE MANAGER * Oracle Database Resource Manager: Overview * Resource Manager Elements * Using Resource Manager to Allocate Resources * Creating a Simple Resource Plan * Creating a Complex Resource Plan * Using the Active Session Pool Feature * Limiting CPU Utilization at the Database Level * Limiting CPU Utilization at the Server Level ENTERPRISE MANAGER CLOUD CONTROL * Controlling the Enterprise Manager Cloud Control Framework * Starting the Enterprise Manager Cloud Control Framework * Stopping the Enterprise Manager Cloud Control Framework INTRODUCTION TO ORACLE DATABASE CLOUD SERVICE * Oracle Cloud: Overview * Database Cloud Service Offerings * DBCS Architecture * Features and Tooling * Additional Database Configuration Options CREATING DBCS DATABASE DEPLOYMENTS * Automated Database Provisioning * Creating a Database Deployment * How SSH Key Pairs are Used * Creating an SSH Key Pair * Storage Used for Database Files MANAGING DBCS DATABASE DEPLOYMENTS * Cloud Tooling * Accessing Tools and Features from the DBCS Console * Managing the Compute Node Associated With a Database Deployment * Managing Network Access to DBCS * Enabling Access to a Compute Node Port * Scaling a Database Deployment BACKING UP AND RESTORING DBCS DATABASE DEPLOYMENTS * Backing Up and Recovering Databases on DBCS * Backup Destination Choices * Backup Configuration * Creating an On-Demand Backup * Customizing the Backup Configuration * Performing Recovery by Using the Console * Performing Recovery by Using the dbaascli Utility PATCHING DBCS DATABASE DEPLOYMENTS * Patching DBCS * Using the DBCS Console to Manage Patches * Using the dbaascli Utility to Manage Patches CREATING MASTER ENCRYPTION KEYS FOR PDBS * CDB and PDB Master Encryption Keys * Determining Whether You Need to Create and Activate and Encryption Key for a PDB * Creating and Activating an Encryption Key TABLESPACE ENCRYPTION BY DEFAULT * Tablespace Encryption by Default in DBCS * Transparent Data Encryption (TDE) Overview * Components of TDE * Using TDE * Defining the Keystore Location * Controlling Tablespace Encryption by Default * Managing the Software Keystore and Master Encryption Key * Managing the Keystore in CDBs and PDBs ADDITIONAL COURSE DETAILS: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere: Fast Track [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi™ hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use and manage resource pools Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler™ Create virtual networks with VMware vSphere Distributed Switch™ and enable distributed switch features Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines Use host profiles to manage ESXi configuration compliance Describe how vSphere storage APIs help storage systems integrate with vSphere Configure and use virtual machine storage policies Discuss the purpose and capabilities of VMware vSphere with Kubernetes and how it fits into the VMware Tanzu™ portfolio This five-day, intensive course takes you from introductory to advanced VMware vSphere© 7 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VSPHERE AND THE SOFTWARE-DEFINED DATA CENTER * Explain basic virtualization concepts * Describe how vSphere fits into the software-defined data center and the cloud infrastructure * Explain how vSphere interacts with CPUs, memory, networks, and storage * Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts * Use VMware Host Client? to access and manage ESXi host VIRTUAL MACHINES * Create and remove a virtual machine * Provision a virtual machine with virtual devices * Identify the files that make up a virtual machine * Explain the importance of VMware Tools VCENTER SERVER * Describe the vCenter Server architecture * Discuss how ESXi hosts communicate with vCenter Server * Deploy and configure vCenter Server Appliance * Use the vSphere Client to manage the vCenter Server inventory * Add data center, organizational objects, and hosts to vCenter Server * Use roles and permissions to enable users to access objects in the vCenter Server inventory * Back up vCenter Server Appliance * Monitor vCenter Server tasks, events, and appliance health * Use vCenter Server High Availability to protect a vCenter Server Appliance CONFIGURING AND MANAGING VIRTUAL NETWORKS * Create and manage standard switches * Describe the virtual switch connection types * Configure virtual switch security, traffic-shaping and load-balancing policies * Compare vSphere distributed switches and standard switches CONFIGURING AND MANAGING VIRTUAL STORAGE * Identify storage protocols and storage device types * Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage * Create and manage VMFS and NFS datastores * Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage * Deploy virtual machines on a VMware vSAN? datastore VIRTUAL MACHINE MANAGEMENT * Use templates and cloning to deploy new virtual machines * Modify and manage virtual machines * Create a content library and deploy virtual machines from templates in the library * Dynamically increase the size of a virtual disk * Use customization specification files to customize a new virtual machine * Perform vSphere vMotion and vSphere Storage vMotion migrations * Create and manage virtual machine snapshots * Examine the features and functions of VMware vSphere© Replication? RESOURCE MANAGEMENT AND MONITORING * Discuss CPU and memory concepts in a virtualized environment * Describe what over commitment of a resource means * Describe methods for optimizing CPU and memory usage * Use various tools to monitor resource use * Create and use alarms to report certain conditions or events VSPHERE CLUSTERS * Describe options for making a vSphere environment highly available * Explain the vSphere HA architecture * Configure and manage a vSphere HA cluster * Examine the features and functions of VMware vSphere© Fault Tolerance * Configure a vSphere cluster using ESXi Cluster Quickstart * Describe the functions of a vSphere DRS cluster * Create a vSphere DRS cluster NETWORK SCALABILITY * Configure and manage vSphere distributed switches * Describe how VMware vSphere© Network I/O Control enhances performance * Explain distributed switch features such as port mirroring and NetFlow VSPHERE LIFECYCLE MANAGEMENT * Describe how VMware vSphere© Lifecycle Manager? works * Use vSphere Lifecycle Manager to update ESXi hosts in a cluster HOST AND MANAGEMENT SCALABILITY * Use host profiles to manage ESXi configuration compliance * Create and manage resource pools in a cluster STORAGE SCALABILITY * Explain why VMware vSphere© VMFS is a highperformance, scalable file system * Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O Filtering * Configure and assign virtual machine storage policies * Create VMware vSAN? storage policies * Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control * Discuss vSphere support for NVMe and iSER INTRODUCTION TO VSPHERE WITH KUBERNETES * Differentiate between containers and virtual machines * Identify the parts of a container system * Recognize the basic architecture of Kubernetes * Describe a basic Kubernetes workflow * Describe the purpose of vSphere with Kubernetes and how it fits into the VMware Tanzu portfolio * Explain the vSphere with Kubernetes supervisor cluster * Describe the Tanzu Kubernetes Grid service ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Fast Track [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Fast Track [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Fast Track [v7.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Skills for Professions in Catering, Hospitality & Tourism

By Step Into Learning

This qualification is suitable for those who are new to or would like work in catering, hospitality or tourism. The Maths & English element of the course will be tailored to your specific needs.

Skills for Professions in Catering, Hospitality & Tourism
Delivered in-person, on-requestDelivered In-Person in Launceston
Price on Enquiry

Linux Professional Institute Certification (LPIC) 101

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. WORK ON THE COMMAND LINE * LPI Objectives Covered * Role of Command Shell * Shells * Gathering System Info * Identifying the Shell * Changing the Shell * Shell Prompts * Bash: Bourne-Again Shell * Navigating the Filesystem * Help from Commands and Documentation * Getting Help Within the Graphical Desktop * Getting Help with man & info * Bash: Command Line History * Bash: Command Editing * Bash: Command Completion * Shell and Environment Variables * Key Environment Variables * LAB TASKS * USE STREAMS, PIPES, AND REDIRECTS * LPI Objectives Covered * File Redirection * Piping Commands Together * Filename Matching * File Globbing and Wildcard Patterns * Brace Expansion * General Quoting Rules * Nesting Commands * Gotchas: Maximum Command Length * LAB TASKS * MANAGE FILE PERMISSIONS AND OWNERSHIP * LPI Objectives Covered * Filesystem Hierarchy Standard * Displaying Directory Contents * Filesystem Structures * Determining Disk Usage With df and du * File Ownership * Default Group Ownership * File and Directory Permissions * File Creation Permissions with umask * Changing File Permissions * SUID and SGID on files * SGID and Sticky Bit on Directories * User Private Group Scheme * LAB TASKS * CREATE, DELETE, FIND, AND DISPLAY FILES * LPI Objectives Covered * Directory Manipulation * File Manipulation * Deleting and Creating Files * Physical Unix File Structure * Filesystem Links * File Extensions and Content * Which and Type * Where is * Searching the Filesystem * Alternate Search Method * Manually Installed Shared Libraries * LAB TASKS * WORK WITH ARCHIVES AND COMPRESSION * LPI Objectives Covered * Archives with tar * Archives with cpio * The gzip Compression Utility * The bzip2 Compression Utility * The XZ Compression Utility * The PKZIP Archiving/Compression format * LAB TASKS * PROCESS TEXT STREAMS USING FILTERS * LPI Objectives Covered * Producing File Statistics * The Streaming Editor * Replacing Text Characters * Text Sorting * Duplicate Removal Utility * Extracting Columns of Text * Displaying Files * Prepare Text for Display * Previewing Files * Displaying Binary Files * Combining Files and Merging Text * LAB TASKS * SEARCH TEXT FILES USING REGULAR EXPRESSIONS * LPI Objectives Covered * Searching Inside Files * Regular Expression Overview * Regular Expressions * RE Character Classes * Regex Quantifiers * RE Parenthesis * LAB TASKS * PERFORM BASIC FILE EDITING OPERATIONS USING VI * LPI Objectives Covered * Text Editing * vi and Vim * Learning Vim * Basic vi * Intermediate vi * LAB TASKS * CREATE, MONITOR, AND KILL PROCESSES * LPI Objectives Covered * What is a Process? * Process Lifecycle * Process States * Viewing Processes * Signals * Tools to Send Signals * Managing Processes * Tuning Process Scheduling * Job Control Overview * Job Control Commands * Nohup and Disown * Uptime & w * Persistent Shell Sessions with Screen * Using screen * Advanced Screen * LAB TASKS USE RPM, YUM, AND DEBIAN PACKAGE MANAGEMENT * LPI Objectives Covered * Managing Software * RPM Architecture * Working With RPMs * Querying and Verifying with RPM * Installing Debian Packages * Querying and Verifying with dpkg * The alien Package Conversion Tool * Managing Software Dependencies * Using the Yum command * yum downloader * Configuring Yum * The deselect & APT Frontends to dpkg * Aptitude * Configuring APT * LAB TASKS * WORK WITH PARTITIONS, FILESYSTEM, AND DISK QUOTAS * LPI Objectives Covered * Partition Considerations * Logical Volume Management * Filesystem Planning * Partitioning Disks with fdisk & gdisk * Resizing a GPT Partition with gdisk * Partitioning Disks with parted * Non-Interactive Disk Partitioning with sfdisk * Filesystem Creation * Filesystem Support * Unix/Linux Filesystem Features * Swap * Selecting a Filesystem * Filesystem Maintenance * Mounting Filesystems * Mounting Filesystems * Managing an XFS Filesystem * NFS * SMB * Filesystem Table (/etc/fstab) * Configuring Disk Quotas * Setting Quotas * Viewing and Monitoring Quotas * LAB TASKS * LINUX BOOT PROCESS * LPI Objectives Covered * Booting Linux on PCs * GRUB 2 * GRUB 2 Configuration * GRUB Legacy Configuration * Boot Parameters * Uinit * Linux Runlevels Aliases * Systemd local-fs.target and sysinit.target * Runlevel Implementation * System Boot Method Overview * Systemd System and Service Manager * Modifying systemd services * Systemd Targets * Using systemd * Shutdown and Reboot * System Messaging Commands * Controlling System Messaging * LAB TASKS DETERMINE AND CONFIGURE HARDWARE SETTINGS * LPI Objectives Covered * Managing Linux Device Files * Hardware Discovery Tools * Configuring New Hardware with hwinfo * PC Architecture and Bus * DMA & IRQ * USB Devices * USB Architecture * Configuring Kernel Components and Modules * Kernel Modules * Handling Module Dependencies * Configuring the Kernel via /proc/ * LAB TASKS * LINUX FUNDAMENTALS * Unix and its Design Principles * FSF and GNU * GPL ƒ?? General Public License * The Linux Kernel * Components of a Distribution * Red Hat Linux Products * SUSE Linux Products * Debian * Ubuntu * Logging In * got root? * Switching User Contexts * Gathering Login Session Info * LAB TASKS * ADDITIONAL COURSE DETAILS: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC) 101
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

WINDSOR GUITAR LESSONS, YOUR GUITAR INSTRUCTOR

By Windsor Guitar Lessons

I’m a qualified Guitar Instructor offering personalized lessons and instruction to students in the Berkshire area.

WINDSOR GUITAR LESSONS, YOUR GUITAR INSTRUCTOR
Delivered in-person, on-requestDelivered In-Person in Windsor
Price on Enquiry

#BusComm Wednesday Breakfast Networking Meeting

By The Business Community

Are you an ambitious, entrepreneurial business owner with a collaborative mindset? You are? Good! You're in the right place. Running your own business can be tough and the odds are against you - but don't worry! The support you need is on your doorstep - at next to no cost!

#BusComm Wednesday Breakfast Networking Meeting
Delivered Online
Dates arranged on request
FREE

Access to Sage 50 Accounts Training in London | Sage Courses Online

By Osborne Training

Course description Sage 50 Accounting / Bookkeeping Training - Fast Track Overview Want to open the door to working in Finance and Accountancy Industry? Starting Sage Line 50 Accounting Fast Track Training course will enhance your career potentials and give you the skills and knowledge you need to get started in Finance and Accountancy Industry. Get a new direction for your career in Accountancy, according to statistics, the average salary for Accountants is £50,000 (Source: Reed), it is the sector where the employability rate is higher than any other sector. With the right skills and practical experience, you would be able to fast track your career in Accountancy and exactly that's where Osborne Training can fill the gap. The intensive programmes include all the skills required to fast track your career in professional Accountancy. Duration 6 Weeks Study Options Classroom Based - Osborne Training offers Daytime or Weekend sessions for Sage 50 Bookkeeping Training Course from London Campus. Online Live - Osborne Training offers online Evening sessions for Sage 50 Bookkeeping Training Classes through the Virtual Learning Campus. Distance Learning - Self Study with Study Material and access to Online study Material through Virtual Learning Campus. Certification You will receive a certificate from Osborne Training once you finish the course. You have an option to get an IAB Certificate subject to passing the exams. What qualification will I gain? You could Gain the following IAB qualifications provided that you book and register for IAB exams and pass the exams successfully: * IAB Level 1 Award in Computerised Bookkeeping (QCF) 500/9405/1 * IAB Level 2 Award in Computerised Bookkeeping (QCF) 500/9261/3 * IAB Level 3 Award in Computerised Bookkeeping (QCF) 500/9407/5 Awarding body International Association of Book-Keepers SAGE 50 ACCOUNTS COURSE SYLLABUS * Creating a Chart of Accounts to Suit Company Requirements * Sole Trader Accounts preparation * The Trial Balance preparation * Errors in the Trial Balance * Disputed Items * Use of the Journal * Prepare and Process Month End Routine * Contra Entries * The Government Gateway and VAT Returns * Bad Debts and Provision for Doubtful Debts * Stock Valuation, Stock Control, Work in Progress and Finished Goods * Prepare and Produce Final Accounts * Extended Trial Balance * Exporting Data including Linking to Other Systems * Management Information Reports * Making Decisions with Reports Using Sage * Prepare and Process Year End Accounts and Archive Data * Final Accounts for Partnerships including Appropriation Accounts * The Fixed Asset Register and Depreciation * Accruals and Prepayments * Cash Flow and Forecast Reports * Advanced Credit Control

Access to Sage 50 Accounts Training in London | Sage Courses Online
Delivered in-person, on-request, onlineDelivered Online & In-Person in Birmingham
Price on Enquiry

Group Singing Courses

By LondonSinging

By being both highly enjoyable and educational, our group singing lessons are ideal for adults who want to combine learning and socialising. Studying in a group format is a great way to improve your vocal skills while connecting with like-minded singing lovers. Open to beginners.

Group Singing Courses
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
Price on Enquiry