• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3417 Courses

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. COURSE INTRODUCTION * Introduction and course logistics * Course objectives INTRODUCTION TO NSX ADVANCED LOAD BALANCER * Illustrate NSX Advanced Load Balancer * Explain NSX Advanced Load Balancer architecture and components * Describe control plane clustering and high availability * Describe data plane high availability mode * Understand the common terminologies used with NSX Advanced Load Balancer * Explain the NSX Advanced Load Balancer service elements * Explain virtual service components and how to configure a virtual service * Explain application profiles and network profiles * Explain the pool configuration options and how to configure a pool * Explain the available load-balancing algorithms * Explain and configure SSL profiles and certificates * Explain cloud connectors and cloud connector integration modes * Explain multiple health monitor types * Understand client logs INTRODUCTION TO APPLICATION SECURITY * Understand web application security breaches and the implication of breaches * Explain common terminologies related to Web Application Security * Understand the different teams involved to secure applications ATTACKING WEB APPLICATIONS * Understand the various web application security testing methodologies * Understand the OWASP Top 10 vulnerabilities * Understand the tools to generate a web application attack * Describe a few types of web application attacks TYPES OF TRANSPORT * Understand different web traffic transport modes * Describe web traffic and API traffic NSX ADVANCED LOAD BALANCER WAF COMPONENTS * Understand the core design principles of NSX Advanced Load Balancer WAF * Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline * Understand the NSX Advanced Load Balancer WAF configuration objects NSX ADVANCED LOAD BALANCER WAF OPERATIONS * Examine how to set up an application with WAF * Describe considerations for the WAF policy * Work with WAF logs and analytics * Describe WAF policy tuning * Describe the options available to remediate false positive mitigation NSX ADVANCED LOAD BALANCER WAF BEST PRACTICES * Describe technical and application considerations for onboarding an application front ended by WAF * Describe best practices to remediate false positive mitigation. * Describe how to manage a response from a back-end application server and client upload to the application server * Describe the consideration for setting the rigidity of a WAF signature rule set * Describe the options available to identify client traffic NSX ADVANCED LOAD BALANCER WAF SIZING * Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX ADVANCED LOAD BALANCER WAF CUSTOM RULES * Understand WAF custom rules * Describe the need and recommendation for custom rules * Describe ModSecurity rules * Understand the ModSecurity rule structure and explain how to construct the rule * Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX ADVANCED LOAD BALANCER WAF APPLICATION LEARNING * Understand the significance of Application Learning * Explain the Positive Security Model architecture * Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules * Describe how to view the data that is learned by the Application learning module * Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results * Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. MALWARE PROTECTION THROUGH ICAP IN NSX ADVANCED LOAD BALANCER * Understand Malicious File Upload Protection and ICAP workflow * Describe ICAP configuration and log analytics NSX ADVANCED LOAD BALANCER IP REPUTATION * Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer * Describe IP Reputation configuration, log analytics, and troubleshooting DATASCRIPT FOR APPLICATION SECURITY * Describe DataScript events and reference * Describe application security using DataScript * Explain how to troubleshoot DataScript issues RATE LIMITING AND DOS * Describe and configure the NSX Advanced Load Balancer rate limiter technique * Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer * Explain the Service Engine general advice and guidance for DDOS BOT MANAGEMENT * Understand Bots * Describe the Bot Management mechanism in NSX Advanced Load Balancer * Describe how to configure NSX Advanced Load Balancer Bot Management MANAGING PERSONALLY IDENTIFIABLE INFORMATION IN NSX ADVANCED LOAD BALANCER * Understand Personally Identifiable Information (PII) * Understand the scope of managing PII in NSX Advanced Load Balancer * Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. THREAT INTELLIGENCE * Introduce the Threat Intelligence service * Describe the Threat Intelligence live security threat feed for multiple attack vectors * Describe how to configure Threat Intelligence in NSX Advanced Load Balancer APPLICATION PROGRAMMING INTERFACE SECURITY * Define Application Programming Interface (API) Security * Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH * Understand API Rate Limiting in NSX Advanced Load Balancer * Understand the NSX Advanced Load Balancer WAF Protection for API ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Business Applications

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge of business skills. Overview Upon successful completion of this course, students will be able to communicate and work effectively in a business environment. In this course, students will learn about all different aspects of business skills needed be effective in an office environment. ACCESSING PDF DOCUMENTS * Open a PDF Document * Browse a PDF Document CREATING & SAVING PDF DOCUMENTS * Create and Save a PDF Document from an Existing Document * Create a PDF Document from a Web Page * Combine Multiple PDF Documents NAVIGATING CONTENT IN A PDF DOCUMENT * Perform a Search in a PDF Document * Search Multiple PDF Documents * Work with Bookmarks * Create Links and Buttons MODIFYING PDF DOCUMENTS * Manipulate PDF Document Pages * Edit Content in a PDF Document * Add Page Elements REVIEWING PDF DOCUMENTS * Add Comments and Markup * Compare PDF Documents * Initiate and Manage a Review CONVERTING PDF FILES * Reduce the File Size of a PDF Document * Optimize PDF Files * Convert and Reuse PDF Document Content CUSTOMIZING THE ACROBAT XI PRO WORKSPACE * Customize the Toolbars * Customize the Tool Sets CREATING PDFS FROM TECHNICAL DOCUMENTS * Create PDF Documents Using Autodesk AutoCAD * Measure Technical Drawings ENHANCING PDF DOCUMENTS * Embed Multimedia * Enhance PDF Document Accessibility SECURING PDF DOCUMENTS * Manage the Security of PDF Documents * Validate PDF Documents CREATING INTERACTIVE PDF FORMS * Create a PDF Form * Compile and Manage PDF Form Data FINALIZING PDF FILES FOR COMMERCIAL PRINTING * Apply Color Management Settings * Preview Printed Effects * Perform Preflight on a PDF Document * Create PDF/X, PDF/A, and PDF/E Compliant Files * Create a Composite and Color Separations ACCESSING & NAVIGATING SHAREPOINT TEAM SITES * Access SharePoint Sites * Navigate SharePoint Sites WORKING WITH DOCUMENTS, CONTENT, & LIBRARIES * Upload Documents * Search for Documents and Files WORKING WITH LISTS * Add List Items * Modify List Items * Configure List Views * Filtering and Grouping with List Views CONFIGURING YOUR SHAREPOINT PROFILE * Update and Share Your Profile Information * Share and Follow SharePoint Content * Creating a Blog INTEGRATING WITH MICROSOFT OFFICE * Access and Save SharePoint Documents with Microsoft Office * Manage Document Versions through Office 2013 * Accessing SharePoint Data from Outlook 2013 WORKING OFFLINE & REMOTELY WITH SHAREPOINT * Synchronize Libraries, Sites, and MySite and Working Offline * Working from a Mobile Device CREATING A NEW SITE * Create a Site * Change the Look and Feel of Your SharePoint Site ADDING & CONFIGURING LIBRARIES * Configure Document Library for Your SharePoint Team Site * Configure the Site Assets Library for Your SharePoint Site * Add and Configure a Wiki for Your SharePoint Site ADDING & CONFIGURING LISTS * Add an Announcement List * Add and Configure a Task List * Add and Configure Contact and Calendar Lists * Add and Configure a Blog Subsite * Add and Configure a Custom List to your SharePoint Site * Customize List Forms CONFIGURING SITE SETTINGS, NAVIGATION, & SEARCH * Configure Site Search Options * Configure Site Administration Settings * Configure Site Organization and Navigation ASSIGNING PERMISSIONS & ACCESS RIGHTS * Sharing Sites and Setting Site Permissions * Secure Lists, Libraries, and Documents CONFIGURE CONTENT ROLL-UP, SUMMARY LINKS, & SITE MAP * Add and Configure the Content Search Web Part * Add and Configure the Relevant Documents Web Part IDENTIFYING NOUNS, PRONOUNS, & VERBS * Identify Nouns * Identify Pronouns * Identify Verbs IDENTIFYING ADJECTIVES & ADVERBS * Use Adjectives * Use Adverbs INDENTIFYING PREPOSITIONS, CONJUNCTIONS, AND INTERJECTIONS * Use Prepositions * Use Conjunctions * Use Interjections IDENTIFYING RULES * Monitor Sentences * Monitor Modifiers * Avoid Common Errors IDENTIFYING CORRECT PUNCTUATION * Use Parentheses Correctly * Use Commas, Semicolons, and Quotation Marks * Use Numbers, Symbols, and Capitalization Correctly IDENTIFYING SENTENCE FRAGMENTS, RUN-ONS, AND COMMA SPLICES * Identify Sentence Fragments * Identify Run-ons, Comma Splices, and Solutions IMPROVING WORD CHOICES * Identify Commonly Misused Words * Identify Synonyms, Antonyms, and Homonyms BUILDING EFFECTIVE SENTENCES * Identify the Goal * Consider the Audience * Consider the Context EDITING EFFECTIVELY * Use Correct Spelling * Achieve Clarity AVOIDING HYPERCORRECTIONS * Avoid Hypercorrections * Achieve Simplicity GETTING STARTED * Icebreaker * Housekeeping Items * The Parking Lot * Workshop Objectives WORKING WITH WORDS * Spelling * Grammar * Creating a Cheat Sheet CONSTRUCTING SENTENCES * Parts of a Sentence * Punctuation * Types of Sentences CREATING PARAGRAPHS * The Basic Parts * Organization Methods WRITING MEETING AGENDAS * The Basic Structure * Choosing a Format * Writing the Agenda WRITING E-MAILS * Addressing Your Message * Grammar and Acronyms WRITING BUSINESS LETTERS * The Basic Structure * Choosing a Format * Writing the Letter WRITING PROPOSALS * The Basic Structure * Choosing a Format * Writing the Proposal WRITING REPORTS * The Basic Structure * Choosing a Format * Be guided by the: The purpose of the report * The seniority of your readers * Writing the Report OTHER TYPES OF DOCUMENTS * Requests for Proposals * Projections * Executive Summaries * Business Cases PROOFREADING & FINISHING * A Proofreading Primer * How Peer Review Can Help * Printing and Publishing WRAPPING UP * Words from the Wise * Review of Parking Lot * Lessons Learned * Completion of Action Plans and Evaluations E-MAIL BASICS * E-mail characteristics * Writing online versus on paper * Understanding the advantages and disadvantages of e-mail * Understanding the cultural significance of e-mail * E-mail programs * Using an e-mail program to send e-mail * When to use e-mail * Communicating by e-mail * Understanding when to avoid using e-mail * Writing an e-mail message * Using the MAIL acronym E-MAIL POLICIES * Company policies * Avoiding improper e-mail messages * Ensuring employee compliance to e-mail policies * Copyright laws, viruses, and liability * Avoiding copyright infringement * Avoiding viruses * Identifying e-mail liability E-MAIL FEATURES & SECURITY * Features of an e-mail program * Using attachments * Using priority labels and signature files * Features of an e-mail program * Using attachments * Using priority labels and signature files * Discussing e-mail program options * Securing e-mail * Usi ADDITIONAL COURSE DETAILS: Nexus Humans Business Applications training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Applications course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Applications
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle 12c SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. RELATIONAL DATABASES & DATA MODELS * About Data Models * About the Relational Model * The Electronics Data Model * About the Relational DBMS SELECTION & SETUP OF THE DATABASE INTERFACE * Considering Available Tools * Selecting the Appropriate Tool * Oracle Net Database Connections * Oracle PAAS Database Connections * Setup SQL Developer * Setup SQL*Plus * Setup Jdeveloper USING THE DATABASE INTERFACE * About Bind & Substitution Variables * Using SQL Developer * Using SQL*Plus INTRODUCTION TO THE SQL LANGUAGE * About the SQL Language * Characteristics of SQL * Introducing SQL Using Select * SQL Rules THE SELECT STATEMENT * The Select Statement * Distinct/Unique Keyword * Using Alias Names RESTRICTING RESULTS WITH THE WHERE CLAUSE * About Logical Operators * Equality Operator * Boolean Operators * REGEXP_LIKE() * In Operator SORTING DATA WITH THE ORDER BY CLAUSE * About the Order by Clause * Multiple Column Sorts * Specify the Sort Sequence * About Null Values within Sorts * Using Column Aliases PSEUDO COLUMNS, FUNCTIONS & TOP-N QUERIES * Rowid Pseudo Column * ORA_ROWSCN PSEUDO Column * ROWNUM Pseudo Column * About the Built-In Functions * SYSDATE * User & UID * SESSIONTIMEZONE Function * Using the Dual Table * Row Limiting & Top-N Queries * FETCH First x Rows Only Clause * OFFSET x Rows Clause * FETCH?PERCENT Clause * The WITH TIES Option JOINING TABLES * About Joins * Inner Joins * Reflexive Join * Non-Key Join * Outer Join USING THE SET OPERATORS * About the Set Operators * SQL Set Operator Examples * UNION Example * INTERECT Example * MINUS Example * UNION All SUMMARY FUNCTIONS USING SUB-QUERIES * Finding Data with Sub-Queries * Standard Sub-Queries * Correlated Sub-Queries * The EXISTS Operator AGGREGATING DATA WITHIN GROUPS * About Summary Groups * Find Groups within the Tables * Select Data From the Base Tables * Select Groups from the Results USE DDL TO CREATE & MANAGE TABLES * Create Table Statement * Column Data Types * Not Null * Default * Describe * Alter Table Statement * Drop Table Statement * Table DDL Using SQL Developer * Alter User Statement * Alter Session Statement * NLS_Language * NLS_Date USE DML TO MANIPULATE DATA * The Insert Statement * The Delete Statement * The Update Statement * About Transactions * Transaction Rollback * Transaction Commit * Transaction Savepoint * The Set Transaction Statement * Set Transaction Read Only Statement Rules UNDERSTANDING THE DATA MODELS * The Company Data Model * The Electronics Data Model ABOUT THE SQL-99 STANDARD * SQL-92 & SQL-99 * Cross Joins * Natural Joins * Inner Joins * Implicit Inner Join * Outer Joins * Anti Joins * Named Sub-Queries * ENHANCING GROUPS WITH ROLLUP & CUBE * Using Rollup * The Grouping() Function * Using Cube SQL FUNCTIONS: CHARACTER HANDLING * What are the SQL Functions? * String Formatting Functions * UPPER(), LOWER() Example * INITCAP() Example * Character Codes Functions * CHR((), ASCII() Examples * PAD & TRIM Functions * RPAD() Example * RTRIM() Example * TRIM() Example * String Manipulation Functions * DECODE () Example * SUBSTR() Example * INSTR() Example * TRANSLATE() Example * REPLACE() Example * String Comparison Functions * LEAST() Example * Phonetic Search Function * SOUNDEX() Example SQL FUNCTIONS: NUMERIC HANDLING * About the Numeric Data Functions * GREATEST() Example * ABS() Example * ROUND() Example * TRUNC() Example * SIGN() Example * TO_NUMBER() Example & Data ype Conversions * NULL VALUES FUNCTIONS * NVL() & NVL2() Function * NVL() Example (Character) * NVL() Example (Numeric Loss of Data) * NVL() Example (Numeric Output) * NVL2() Example * COALESCE() Function * NULLIF() Function SQL FUNCTIONS: DATE HANDLING * Date Formatting Functions * TO_CHAR() & TO_DATE() Format Patterns * TO_CHAR() Examples * TO_DATE() Examples * EXTRACT() Example * Date Arithmetic Functions * MONTHS_BETWEEN() Example * ADD_MONTHS() Example * LAST_DAY() Example * NEXT_DAY() Example * TRUNC(), ROUND() Dates Example * NEW_ TIME() Example * About V$TIMEZONE_NAMES * CAST() FUNCTION & TIME ZONES DATABASE OBJECTS: ABOUT DATABASE OBJECTS * About Database Objects * About Schemas * Making Object References DATABASE OBJECTS: RELATIONAL VIEWS * About Relations Views * The Create View Statement * Why Use Views? * Accessing Views with DML * Maintaining View Definitions * Alter View * Drop View * DDL Using SQL Developer * DATABASE OBJECTS: INDEXES * About Indexes * Create & Drop Index Statements * Indexes & Performance * Data Dictionary Storage DATABASE OBJECTS: CREATING OTHER OBJECTS * About Sequences * Referencing NEXTVAL * Referencing CURRVAL * Within the DEFAULT Clause * Alter Sequence & Drop Sequence * ALTER SEQUENCE * DROP SEQUENCE * About Identity Columns * CREATE TABLE?GENERATED AS IDENTITY * ALTER TABLE?GENERATED AS IDENTITY * Start With Limit Value * ALTER TABLE...DROP IDENTITY * About Synonyms * CREATE & DROP SYNONYM Statements * CREATE SYNONYM * DROP SYNONYM * Public Vs Private Synonyms * CREATE SCHEMA AUTHORIZATION DATABASE OBJECTS: OBJECT MANAGEMENT USING DDL * The RENAME Statement * TABLESPACE Placement * CREATE TABLE?TABLESPACE * The Comment Statement * The TRUNCATE TABLE Statement DATABASE OBJECTS: SECURITY * About Object Security * Grant Object Privileges * Revoke Object Privileges * Object Privileges & SQL Developer DATA INTEGRITY USING CONSTRAINTS * About Constraints * NOT NULL Constraint * NOT NULL Example * CHECK Constraint * UNIQUE Constraint * PRIMARY KEY Constraint * REFERENCES Constraint * ON DELETE CASCADE Example * ON DELETE SET NULL Example * Constraints on Existing Tables * Constraints & SQL Developer MANAGING CONSTRAINT DEFINITIONS * RENAMING & DROPPING Constraints * ENABLING & DISABLING Constraints * DEFERRED Constraint Enforcement * SET CONSTRAINTS * Handling Constraint Exceptions * Constraints with Views * DATA Dictionary Storage THE DATA DICTIONARY STRUCTURE * More About the Data Dictionary * OBJECT-SPECIFIC Dictionary Views * USER_UPDATABLE_COLUMNS * The Dictionary Structure * METADATA & SQL Developer ADDITIONAL COURSE DETAILS: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c SQL Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) DESCRIBING HIGH AVAILABILITY ON LAYER 2 * Overview of Layer 2 High-Availability Mechanisms * Virtual Port Channels * Cisco Fabric Path * Virtual Port Channel+ DESIGNING LAYER 3 CONNECTIVITY * First Hop Redundancy Protocols * Improve Routing Protocol Performance and Security * Enhance Layer 3 Scalability and Robustness DESIGNING DATA CENTER TOPOLOGIES * Data Center Traffic Flows * Cabling Challenges * Access Layer * Aggregation Layer * Core Layer * Spine-and-Leaf Topology * Redundancy Options DESIGNING DATA CENTER INTERCONNECTS WITH CISCO OTV * Cisco OTV Overview * Cisco OTV Control and Data Planes * Failure Isolation * Cisco OTV Features * Optimize Cisco OTV * Evaluate Cisco OTV DESCRIBING LOCATOR/ID SEPARATION PROTOCOL * Locator/ID Separation Protocol * Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility * LISP Extended Subnet Mode (ESM) Multihop Mobility * LISP VPN Virtualization DESCRIBING VXLAN OVERLAY NETWORKS * Describe VXLAN Benefits over VLAN * Layer 2 and Layer 3 VXLAN Overlay * Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview * VXLAN Data Plane DESCRIBING HARDWARE AND DEVICE VIRTUALIZATION * Hardware-Based High Availability * Device Virtualization * Cisco UCS Hardware Virtualization * Server Virtualization * SAN Virtualization * N-Port ID Virtualization DESCRIBING CISCO FEX OPTIONS * Cisco Adapter FEX * Access Layer with Cisco FEX * Cisco FEX Topologies * Virtualization-Aware Networking * Single Root I/O Virtualization * Cisco FEX Evaluation DESCRIBING BASIC DATA CENTER SECURITY * Threat Mitigation * Attack and Countermeasure Examples * Secure the Management Plane * Protect the Control Plane * RBAC and Authentication, Authorization, and Accounting (AAA) DESCRIBING ADVANCED DATA CENTER SECURITY * Cisco TrustSec in Cisco Secure Enclaves Architecture * Cisco TrustSec Operation * Firewalling * Positioning the Firewall Within Data Center Networks * Cisco Firepower© Portfolio * Firewall Virtualization * Design for Threat Mitigation DESCRIBING MANAGEMENT AND ORCHESTRATION * Network and License Management * Cisco UCS Manager * Cisco UCS Director * Cisco Intersight * Cisco DCNM Overview DESCRIBING STORAGE AND RAID OPTIONS * Position DAS in Storage Technologies * Network-Attached Storage * Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) * Evaluate Storage Technologies DESCRIBING FIBRE CHANNEL CONCEPTS * Fibre Channel Connections, Layers, and Addresses * Fibre Channel Communication * Virtualization in Fibre Channel SAN DESCRIBING FIBRE CHANNEL TOPOLOGIES * SAN Parameterization * SAN Design Options * Choosing a Fibre Channel Design Solution DESCRIBING FCOE * FCoE Protocol Characteristics * FCoE Communication * Data Center Bridging * FCoE Initialization Protocol * FCoE Design Options DESCRIBING STORAGE SECURITY * Common SAN Security Features * Zones * SAN Security Enhancements * Cryptography in SAN DESCRIBING SAN MANAGEMENT AND ORCHESTRATION * Cisco DCNM for SAN * Cisco DCNM Analytics and Streaming Telemetry * Cisco UCS Director in the SAN * Cisco UCS Director Workflows DESCRIBING CISCO UCS SERVERS AND USE CASES * Cisco UCS C-Series Servers * Fabric Interconnects and Blade Chassis * Cisco UCS B-Series Server Adapter Cards * Stateless Computing * Cisco UCS Mini DESCRIBING FABRIC INTERCONNECT CONNECTIVITY * Use of Fabric Interconnect Interfaces * VLANs and VSANs in a Cisco UCS Domain * Southbound Connections * Northbound Connections * Disjoint Layer 2 Networks * Fabric Interconnect High Availability and Redundancy DESCRIBING HYPERCONVERGED AND INTEGRATED SYSTEMS * Hyperconverged and Integrated Systems Overview * Cisco HyperFlex? Solution * Cisco HyperFlex Scalability and Robustness * Cisco HyperFlex Clusters * Cluster Capacity and Multiple Clusters on One Cisco UCS Domain * External Storage and Graphical Processing Units on Cisco HyperFlex * Cisco HyperFlex Positioning DESCRIBING CISCO UCS MANAGER SYSTEMWIDE PARAMETERS * Cisco UCS Setup and Management * Cisco UCS Traffic Management DESCRIBING CISCO UCS RBAC * Roles and Privileges * Organizations in Cisco UCS Manager * Locales and Effective Rights * Authentication, Authorization, and Accounting * Two-Factor Authentication DESCRIBING POOLS FOR SERVICE PROFILES * Global and Local Pools * Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools * World Wide Name (WWN) Pools * Server and iSCSI Initiator IP Pools DESCRIBING POLICIES FOR SERVICE PROFILES * Global vs. Local Policies * Storage and Basic Input/Output System (BIOS) Policies * Boot and Scrub Policies * Intelligent Platform Management Interface (IPMI) and Maintenance Policies DESCRIBING NETWORK-SPECIFIC ADAPTERS AND POLICIES * LAN Connectivity Controls * SAN Connectivity Controls * Virtual Access Layer * Connectivity Enhancements DESCRIBING TEMPLATES IN CISCO UCS MANAGER * Cisco UCS Templates * Service Profile Templates * Network Templates DESIGNING DATA CENTER AUTOMATION * Model-Driven Programmability * Cisco NX-API Overview * Programmability Using Python * Cisco Ansible Module * Use the Puppet Agent ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered on-request, onlineDelivered Online
Price on Enquiry

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the Dynamics 365 Supply Chain Management Functional Consultant Expert or those whose role includes implementing and configuring advanced features of Dynamics 365 Supply Chain Management. Overview Objectives: Create products as type Item and Service. Set up product unit conversions. Set up transfer orders Set up default order settings. Create product masters with predefined variants. Create and set up category hierarchies. Create product attributes. Create bill of materials using BOM designer Discrete manufacturing concepts Production order statuses Production stages Bill of materials (BOM) Resources Routes and operations Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure process manufacturing. Create and configure catch weight items. Configure approved vendors. Understand the features in engineering change management. Learn how the end-to-end engineering change management process works. Set up engineering organizations. Work with product versioning. Create dimension groups by using the version dimensions. Create product life cycle states. Use engineering categories. Set up engineering change severities and severity rules. Set up product owners. Use a workflow with engineering change management. Create an engineering change request. Learn about business impacts. Create an engineering change order. Important terminology to help you understand the concepts and processes that are associated with product configuration. Product configuration end-to-end scenario. Different areas that span the product configuration process. The product configuration model. How to build a product configuration model. Configure the costing sheet. Perform BOM calculation and analyze costs by using the costing sheet. IoT intelligence and insights in Supply Chain Management This course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes. CREATE PRODUCTS AND PRODUCT MASTERS IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Product information workspace * Concept of a product * Create products * Set up unit conversions * Batch disposition codes * Default order settings * Define products as not stocked * Create product masters with variants * Gain productivity by using the Variant suggestions page * Create and set up category hierarchies and attributes * Set up item pricing CREATE BILL OF MATERIALS IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Work with the BOM designer * BOM and formula versions * BOM line types * BOM levels GET STARTED WITH DISCRETE MANUFACTURING IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Discrete manufacturing life cycle * Master planning and planned production orders * Bills of materials * Working with BOM and item configurations * Create a bill of materials * Production orders WORK WITH COMMODITY PRICING AND COMPLIANCE IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Configure commodity pricing * Configure product compliance CONFIGURE PROCESS MANUFACTURING IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Process manufacturing item types * Production type setup * Set up packaging and batch attributes * Shelf life related setup * Item model group, product compliance, and approved vendors * Catch weight * Transaction adjustments * Catch weight item handling policy * Catch weight tags * Configure approved vendors GET STARTED WITH ENGINEERING CHANGE MANAGEMENT FOR DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Overview of features * End-to-end walkthrough of features SET UP VERSIONED PRODUCTS IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Create an engineering organization * Create nomenclature for product versions * Create product version number rules * Create product dimension groups by using the version dimension * Create product life cycle states * Engineering attributes * Product readiness policies * Product release policies * Create engineering categories CONFIGURE ENGINEERING CHANGE MANAGEMENT FOR DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Set up engineering change severities * Set up severity rule sets * Set up product owners * Engineering workflows REQUEST AND FOLLOW UP WITH PRODUCT CHANGES IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Engineering change requests * Engineering change orders up with product changes in Dynamics 365 Supply Chain Management GET STARTED WITH PRODUCT CONFIGURATION IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Elements of a product configuration model * Expression constraints and table constraints in product configuration models * Validate and test a product configuration model * Finalize a model for configuration * Set up a product configuration model * Calculations for product configuration models * Solver strategy for product configuration * Reuse product configurations * Release a product configuration model * Customize a product configuration model WORK WITH THE COSTING SHEET IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Costing versions * Cost groups * Calculation groups * Costing sheets * BOM calculations * BOM Measurements * BOM Reports CONFIGURE FORMULAS FOR PROCESS MANUFACTURING IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Formulas, formula lines, and formula versions * Formula features * Approve and activate formulas and formula versions * Use step consumption * Coproducts * By-products * Burden allocation * Planning items GET STARTED WITH PRODUCTION CONTROL IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Core concepts in production control * Understand unified manufacturing * Manufacturing principles * Overview of the production process and production life cycle * Batch orders * Discrete manufacturing * Process manufacturing * Lean manufacturing * Configure production control for unified manufacturing * Capacity planning * Integration between the General ledger and the Production control modules * IoT intelligence and insights * Describe the value proposition for mixed-reality Guides for production floor workers USE WAREHOUSE MANAGEMENT FOR MANUFACTURING IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Production input location * Production output location * Staging and order picking * Release BOM and formula lines to the warehouse * Cross-docking * Planned cross docking * Visibility into material exceptions WORK WITH MANUFACTURING EXECUTION IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Understand the manufacturing executions * Identify roles in manufacturing execution * Planning consideration for manufacturing execution * Configure manufacturing execution * Setup time and attendance for manufacturing execution processes * Control production with manufacturing execution * Create and process report as finished journals with co-products and by-products * Calculate and approve raw time registrations * Report as finished from the job card device GET STARTED WITH ASSET MANAGEMENT FOR DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Asset Management terminology and concepts * Functional locations and assets * Assets and work orders * Install the Asset Management mobile workspace * Use the Asset Management mobile workspace * Asset Management integration capabilities * Integrate Asset Management with Dynamics 365 Guides SCHEDULE WORK ORDERS IN ASSET MANAGEMENT FOR DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Configure workers for work order scheduling * Schedule and dispatch work orders * Calculate capacity load on scheduled work orders CONFIGURE AND PERFORM THE PROCURE-TO-PURCHASE PROCESS IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Procurement scenario * Overview of the procure-to-purchase process * Set up procurement categories * Use procurement catalogs * Create a purchase requisition * Create and process a request for quotation * Create purchase orders * Vendor categories and catalogs * Evaluate a vendor and put a vendor on hold * Use purchasing policies CONFIGURE ACTIVITY-BASED SUBCONTRACTING AND PRODUCTION FLOW COSTING IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Subcontracting capabilities * Subcontracting a vendor * Subcontracting service * Transfer activities as subcontracting activities * Subcontracting as an alternate resource * Cost accounting of subcontracted services * Subcontracting cost flow * Backflush costing * Products and material in Work in Progress * Standard cost * Costing lean manufacturing * Calculation of standard cost * Calculate unused quantities * Calculation of production variances to standard cost * Ledger entries created from processing a production flow CONFIGURE AND USE AGREEMENTS IN DYNAMICS 365 SUPPLY CHAIN MANAGEMENT * Work with trade agreements * Create sales agreements * Create purchase agreements * Configure trade allowance management * Configure brokerage contract management * Configure royalty contract management * Configure vendor rebates * Rebate management module WORK WITH CAPA ADDITIONAL COURSE DETAILS: Nexus Humans MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Use VMware vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a VMware Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment Describe the features and functions of App Volumes and Dynamic Environment Manager Demonstrate the architectures of App Volumes and Dynamic Environment Manager Install and configure App Volumes Create and deploy Application Packages and writable volumes Install and configure Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings This five-day accelerated, hands-on training course is a blend of VMware Horizon© 8: Skills for Virtual Desktop Management, VMware Horizon 8: Infrastructure Administration, and VMware App Volumes?, and VMware Dynamic Environment Manager?. Eight days of content are taught in five-days of extending learning.This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users.You learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server? and VMware Unified Access Gateway?. You also learn how to configure a load balancer for use with Horizon and how to establish Cloud Pod Architecture.Additionally, you learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VMWARE HORIZON * Recognize the features and benefits of Horizon * Describe the conceptual and logical architecture of VMware Horizon INTRODUCTION TO USE CASE * Define a use case for your virtual desktop and application infrastructure * Convert customer requirements to use-case attributes VSPHERE FOR HORIZON 8 * Explain basic virtualization concepts * Use vSphere Client to access your vCenter Server system and VMware ESXi? hosts * Create, provision, and remove a virtual machine VMWARE HORIZON DESKTOPS * Create a Windows and a Linux virtual machine using vSphere * Optimize and prepare Windows and Linux virtual machines to set up VMware Horizon desktop VMs VMWARE HORIZON AGENTS * Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines * Create a gold master for Windows Horizon desktops VMWARE HORIZON POOLS * Identify the steps to set up a template for desktop pool deployment * List the steps to add desktops to the Horizon Connection Server inventory * Compare dedicated-assignment and floating-assignment pools * Outline the steps to create an automated pool * Define user entitlement * Explain the hierarchy of global, pool-level, and user-level policies VMWARE HORIZON CLIENT OPTIONS * Describe the different clients and their benefits * Access the VMware Horizon desktop using various VMware Horizon clients and HTML * Configure integrated printing, USB redirection, and the shared folders option * Configure session collaboration and media optimization for Microsoft Teams CREATING AND MANAGING INSTANT-CLONE DESKTOP POOLS * List the advantages of instant clones * Explain the provisioning technology used for instant-clone desktop pools * Set up an automated pool of instant clones * Push updated images to instant-clone desktop pools CREATING RDS DESKTOP AND APPLICATION POOLS * Explain the difference between an RDS desktop pool and an automated pool * Compare and contrast an RDS session host pool, a farm, and an application pool * Create an RDS desktop pool and an application pool * Access RDS desktops and application from Horizon Client * Use the instant clone technology to automate the build-out of RDSH farms * Configure load-balancing for RDSHs on a farm MONITORING VMWARE HORIZON * Monitor the status of the VMware Horizon components using the Horizon Administrator console dashboard * Monitor desktop sessions using the HelpDesk tool HORIZON CONNECTION SERVER * Recognize VMware Horizon reference architecture * Identify the Horizon Connection Server supported features * Identify the recommended system requirements for Horizon Connection Server * Configure the Horizon event database * Outline the steps for the initial configuration of Horizon Connection Server * Discuss the ADAM database as a critical component of the Horizon Connection Server installation VMWARE HORIZON AUTHENTICATION AND CERTIFICATES * Compare the authentication options that Horizon Connection Server supports * Describe the Smartcard authentication options that Horizon Connection Server supports * Outline the steps to create a VMware Horizon administrator and custom roles * Describe the roles available in a VMware Horizon environment * Explain the role that certificates play for Horizon Connection Server * Install and configure certificates for Horizon Connection Server * Install and configure True SSO in a VMware Horizon environment WORKSPACE ONE ACCESS AND VIRTUAL APPLICATION MANAGEMENT * Recognize the features and benefits of Workspace ONE Access * Recognize the Workspace ONE Access console features * Explain identity management in Workspace ONE Access * Explain access management in Workspace ONE Access * Describe the Workspace ONE Access directory integration * Describe the Workspace ONE Access directory integration * Deploy virtual applications with Workspace services VMWARE HORIZON PERFORMANCE AND SCALABILITY * Describe the purpose of a replica connection server * Explain how multiple Horizon Connection Server instances in a pod maintain synchronization * Describe the 3D rendering options available in VMware Horizon 8 * List the steps to configure graphics cards for use in a VMware Horizon environment * Configure a load balancer for use in a VMware Horizon environment * Explain Horizon Cloud Pod Architecture LDAP replication and VIPA * Explain Horizon Cloud Pod Architecture scalability options MANAGING VMWARE HORIZON SECURITY * Explain concepts relevant to secure VMware Horizon connections * Describe how to restrict VMware Horizon connections. * Discuss the benefits of using Unified Access Gateway * List the two-factor authentication options that are supported by Unified Access Gateway * List Unified Access Gateway firewall rules * Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces OVERVIEW OF APPLICATION AND PROFILE MANAGEMENT * Profile Management * Application Management OVERVIEW OF APP VOLUMES * App Volumes components APP VOLUMES INSTALLATION OVERVIEW * Requirements * Installing and configuring App Volumes Manager * Installing the App Volumes agent WORKING WITH APPLICATION PACKAGES * Packaging Applications * Maintaining Applications WORKING WITH WRITABLE VOLUMES * Default writable volume templates * Writable volume policies at creation * Updating and rescanning writable volumes WORKING WITH APPSTACKS * Enabling AppStacks * Creating and provisioning AppStacks * Assigning and updating AppStacks * Overriding precedence in AppStacks OVERVIEW OF DYNAMIC ENVIRONMENT MANAGER * Features and benefits * VMware Dynamic Environment Manager terminology * User environment settings and scope * User profile scenarios INSTALL VMWARE DYNAMIC ENVIRONMENT MANAGER * Infrastructure and system requirements * VMware Dynamic Environment Manager Agent (FlexEngine) requirements * Group Policy configuration * Management Console configuration MANAGEMENT CONSOLE USER INTERFACE * Personalize User Profile * User environment configuration APPLICATION CONFIGURATION MANAGEMENT * Predefined and user-customized application settings * Using Application Profiler * Using the Self-Support Tool * Using the Helpdesk Support Tool VMWARE HORIZON SMART POLICIES * Scope of VMware Horizon Smart Policies * Configure VMware Horizon Smart Policies settings * Define Smart Policies conditions ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track
Delivered on-request, onlineDelivered Online
Price on Enquiry

Advanced Professional Practice

By CORE theatre arts training

CORE is a professional level training company in physical theatre and acting with a solid emphasis on the classical “Theatre Apprenticeship” training model. With 30+ years experience and using proven training methods, combined with our unique mentoring approach, we develop the whole person, in order to equip our trainees to identify their God-given calling and use their gifts to impact culture and society for good. EQUIPPING YOU FOR LIFE One of our unique qualities lies in our ability to identify your strengths, regardless of your experience and training, and develop you further. You will be challenged, receive practical skills and confidence to make your next step, whether you want to take qualifications with Trinity College London, train as a teacher or get an agent as you step into the challenging world of the performing arts. Training groups are kept small to ensure individual attention and you receive a wealth of transferrable skills to equip you for life in the workplace. OUR UNIQUE APPROACH CORE's uniqueness lies in our attention to individual coaching, personal and professional development whilst maintaining a culture of excellence and rigorous discipline. We engage trainees in professional productions for on and off stage experience, and in collaborative works with other artists and musicians. Admission is by audition only (min age 16) no educational qualifications required, as admission is based on Potential, Passion and Perseverance that are essentials required to thrive in this industry and in life!

Advanced Professional Practice
Delivered in-person, on-requestDelivered In-Person in Coventry
Price on Enquiry

Educators matching "masterclass"

Show all 110