• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

184 Active Directory courses

Symantec Client Management Suite 7.6 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Client Management Suite 7.6 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Ultimate Bootcamp vSphere 4

4.3(43)

By John Academy

Description: This VMware Ultimate Bootcamp vSphere 4 will help you to learn advanced virtualization concepts and explores the VMware vSphere 4.0 product suite. The objective is to instill the knowledge required for you to do your job efficiently and effectively, starting from installation of the product to real-world troubleshooting issues. The focus is not limited only to learning and harnessing the power of VMware but the entire concept of virtualization, and other 3rd party tools and technologies that will enhance VMware capabilities and increase the student's virtualization expertise. You will be introduced with Expert Lectures, Certificate Of Completion, PowerPoint Visuals, Demonstrations, Review Quizzes, Mobile Access, Workbooks, and more. This comprehensive series will prepare you to become a certified professional virtualization expert. You can join this course to Experience the comprehensive content included in multiple VMware vSphere. Assessment & Certification: To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware Ultimate Bootcamp vSphere 4 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Series Introduction and Methodology Series Methodology 00:15:00 Virtualization Overview Virtualization Overview 00:37:00 Planning and Installing ESX Planning the ESX Deployment 00:14:00 vSphere 4 Deployment Guidelines 00:38:00 ESX Installation 00:06:00 ESX Management 00:06:00 Configuring Hostname Resolution and NTP 00:03:00 Troubleshooting ESX Server 00:08:00 Tools to Administer ESX Overview of 3rd Party Tools 00:31:00 ESX Configuration Commands 00:26:00 Configuring Networking Creating and Modifying Virtual Networks 00:46:00 Creating and Modifying Virtual Networks Using CLI 00:08:00 Configuring Storage Storage Concepts 00:13:00 iSCSI Storage (GUI and Command Line) 00:21:00 Fibre Channel Storage 00:05:00 VMFS Datastores (GUI and Command Line) 00:24:00 NAS Storage and NFS Datastores (GUI and Command Line) 00:12:00 Raw Device Mapping (RDM) 00:04:00 vCenter Server and Licensing Licensing 00:09:00 vCenter Server Installation 00:11:00 vCenter Server Inventory 00:04:00 Managing vCenter Server 00:11:00 Planning vCenter Server Deployment 00:10:00 Troubleshooting vCenter Server and Database 00:06:00 Troubleshooting the vSphere Client 00:03:00 VM Creation Configuration and Snapshots Create a VM 00:26:00 Create Multiple VMs, Templates and Clones 00:16:00 Virtual Appliances 00:04:00 VMware Converter (P2V - V2V) 00:15:00 Manage VMs 00:19:00 VM Startup Shutdown 00:03:00 VM Snapshots 00:08:00 Web Access 00:08:00 VM Troubleshooting 00:05:00 Security and Permissions Controlling User Access and Passwords 00:22:00 ESX Active Directory (AD) Integration 00:03:00 Managing Firewalls 00:07:00 SSH Access 00:06:00 Running Elevated Commands (su sudo setuid setgid) 00:08:00 VMsafe and vShield Zones 00:04:00 Advanced ESX and vCenter Management Configuring Vmotion 00:16:00 Storage VMotion 00:07:00 Distributed Resource Scheduler (DRS) Cluster 00:13:00 Resource Pools and Monitoring 00:24:00 vNetwork Distributed Virtual Switches 00:08:00 Host Profiles 00:03:00 Linked Mode Group of vCenter Servers 00:03:00 Patching and Upgrading ESX Patching ESX Server 00:04:00 Patching with Update Manager 00:14:00 Upgrades and Migrations 00:14:00 Disaster Recovery and Backup Site Recovery Manager (SRM) 00:03:00 High Availability (HA) 00:21:00 VM Fault Tolerance 00:04:00 Microsoft Clustering 00:03:00 Backup Strategies 00:08:00 Using VCB Command Line Utilities 00:06:00 VMware Data Recovery 00:05:00 Third Party Backups 00:06:00 Server and VM Monitoring Tools for Optimization 00:28:00 VM Performance Monitoring 00:16:00 Configuring Alarms 00:07:00 ESX and vCenter Logs 00:14:00 Installing and Configuring ESXi ESXi Overview 00:04:00 ESXi Installation 00:06:00 ESXi Management 00:10:00 Mock Exam Mock Exam- VMware Ultimate Bootcamp vSphere 4 00:20:00 Final Exam Final Exam- VMware Ultimate Bootcamp vSphere 4 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

VMware Ultimate Bootcamp vSphere 4
Delivered Online On Demand13 hours 32 minutes
£24

VMware Ultimate Bootcamp vSphere 4.1

4.3(43)

By John Academy

Description: This VMware Ultimate Bootcamp vSphere 4.1 will teach you advanced virtualization concepts and explore the VMware vSphere 4.1 product suite. The course objective is to install the knowledge required for you to do your job effectively and effectively, starting from installation of the product to real-world troubleshooting issues. The course focus is not limited only to learning and harnessing the power of VMware but the entire concept of virtualization, and other 3rd party tools and technologies that will enhance VMware capabilities and increase the student's virtualization expertise. In this course you will be introduced with Expert Lectures, Certificate of Completion, PowerPoint Visuals, demonstrations, Review Quizzes, Mobile Access, work books, and more. This course will help you to prepare yourself to become a certified professional virtualization expert. Assessment & Certification: To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware Ultimate Bootcamp vSphere 4.1 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Course Introduction and Methodology Learn IT! Do IT! Know IT! FREE 00:06:00 Virtualization Overview Why Virtualize 00:46:00 Planning and Installing ESX/ESXi Planning the ESX ESXi Deployment 00:12:00 vSphere 4.1 Deployment Guidelines 00:12:00 vSphere Hypervisor (ESXi) Installation 00:05:00 ESX Installation 00:20:00 Configuring Hostname Resolution and NTP 00:08:00 Troubleshooting ESX ESXi 00:11:00 Using Tools to Administer a VMware Environment Overview of 3rd Party Tools 00:10:00 ESX ESXi Management 00:21:00 Linux Command Review 00:07:00 Troubleshooting the vSphere Client (VIC) 00:02:00 Configuring Networking Creating & Modifying Virtual Networks 00:31:00 Creating & Modifying Virtual Networks Using CLI 00:27:00 Configuring Storage Storage Concepts 00:26:00 iSCSI Storage (GUI & Command Line) 00:38:00 Fibre Channel Storage 00:09:00 VMFS Datastores (GUI & Command Line) 00:29:00 NAS Storage and NFS Datastores (GUI & Command Line) 00:11:00 Raw Device Mapping (RDM) 00:04:00 vCenter Server 4.1 and Licensing Licensing 00:16:00 vCenter Server Installation 00:13:00 vCenter Server Inventory 00:34:00 Managing vCenter Server 00:08:00 Planning vCenter Server Deployment 00:07:00 Troubleshooting vCenter Server and Database 00:12:00 VM Creation, Configuration, and Snapshots Create a VM 00:27:00 Create Multiple VMs, Templates, & Clones 00:10:00 Virtual Appliances 00:22:00 VMware Converter (P2V - V2V) 00:20:00 Manage VMs 00:22:00 Virtual Machine Startup/Shutdown 00:07:00 Virtual Machine Snapshots 00:18:00 Web Access 00:13:00 Virtual Machine Troubleshooting & Best Practices 00:03:00 Security and Permissions Controlling User Access and Passwords 00:39:00 ESX ESXi Active Directory (AD) Integration 00:10:00 Managing Firewalls 00:11:00 SSH Access 00:06:00 Running Elevated Commands (su, sudo, setuid setgid) 00:07:00 VMsafe and vShield Zones 00:09:00 Server and VM Monitoring Optimizing Resources 00:31:00 Performance Monitoring 00:32:00 Configuring Alarms 00:07:00 ESXi ESX and vCenter Logs 00:10:00 Advanced ESX/ESXi and vCenter Management Storage Views & Topology Maps 00:09:00 Storage vMotion 00:13:00 Configuring vMotion 00:16:00 Distributed Resource Scheduler (DRS) Cluster 00:22:00 vNetwork Distributed Virtual Switches 00:27:00 Host Profiles 00:10:00 Linked Mode Group of vCenter Servers 00:04:00 Patching and Upgrading ESX Patching ESX ESXi Standalone Hosts 00:07:00 Patching with Update Manager 00:24:00 Upgrades and Migrations 00:18:00 Disaster Recovery and Backup Site Recovery Manager (SRM) 00:07:00 High Availability (HA) 00:19:00 VM Fault Tolerance 00:06:00 Microsoft Clustering 00:04:00 Backup Strategies 00:01:00 Using VCB Command Line Utilities 00:05:00 VMware Data Recovery 00:24:00 Third Party Backups 00:07:00 Mock Exam Mock Exam- VMware Ultimate Bootcamp vSphere 4.1 00:20:00 Final Exam Final Exam- VMware Ultimate Bootcamp vSphere 4.1 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

VMware Ultimate Bootcamp vSphere 4.1
Delivered Online On Demand16 hours 32 minutes
£23

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation

Symantec PGP Universal Server 3.2 and PGP Desktop 10.2 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Ethical Hacking - Capture the Flag Walkthroughs - v2

By Packt

This course is designed to introduce students to skills similar to what pentesters and hackers use in real-life situations. In addition, this course will provide a greater understanding of how vulnerabilities are discovered and exploited. This course will guide you on how to use pentesting tools in the real world.

Ethical Hacking - Capture the Flag Walkthroughs - v2
Delivered Online On Demand1 hour 43 minutes
£13.99

VMware Ultimate Bootcamp vSphere 5

4.3(43)

By John Academy

Description: The VMware Ultimate Bootcamp vSphere 5 course provides the advanced virtualisation concepts and teaches about VMware methodology. The course also explores the VMware vSphere 5.0 product suite. Throughout the course, you will learn how to use tools to administer VMware environment. You will also learn about planning the ESXi deployment, vSphere five deployment guidelines, vSphere Hypervisor installation, configuring hostname resolution and NTP, and Troubleshooting ESXi. Finally, the course teaches you vCenter Server 5 and licensing, configuring network and storage, security issues and VM monitoring. In short, the course covers all the concepts related to virtualisation including different 3rd party tools and technologies so that you can increase your virtualisation knowledge. The purpose of the course is to prepare you to become a certified professional virtualisation expert. The course will help you to work efficiently in real-world troubleshooting issues from installation process to up-gradation and security system. Assessment & Certification: To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware Ultimate Bootcamp vSphere 5 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Course Introduction and Methodology Learn IT! Do IT! Know IT! FREE 00:06:00 Virtualization Overview Why Virtualize 01:01:00 Planning and Installing ESXi Planning the ESXi Deployment 00:12:00 vSphere 5 Deployment Guidelines 00:11:00 vSphere Hypervisor (ESXi) Installation 00:41:00 Configuring Hostname Resolution and NTP 00:08:00 CTroubleshooting ESXi 00:10:00 Using Tools to Administer a VMware Environment Overview of 3rd Party Tools 00:13:00 ESXi Management 00:29:00 Linux Command Review 00:08:00 Troubleshooting the vSphere Client (VIC) 00:02:00 vCenter Server 5 and Licensing Licensing 00:20:00 vCenter Server Installation 00:32:00 vCenter Server Inventory 00:11:00 Managing vCenter Server 00:11:00 Planning vCenter Server Deployment 00:06:00 Troubleshooting vCenter Server and Database 00:17:00 Configuring Networking Creating & Modifying Virtual Networks 00:49:00 vSphere Distributed Virtual Switches 00:43:00 Creating & Modifying Virtual Networks Using CLI 00:13:00 Configuring Storage Storage Concepts 00:34:00 iSCSI Storage (GUI & Command Line) 00:35:00 Fibre Channel Storage 00:08:00 VMFS Datastores (GUI & Command Line) 00:36:00 NAS Storage and NFS Datastores (GUI & Command Line) 00:13:00 Raw Device Mapping (RDM) 00:07:00 VM Creation, Configuration, and Snapshots Create a VM 00:31:00 Create Multiple VMs, Templates, & Clones 00:28:00 Virtual Appliances 00:04:00 VMware Converter (P2V - V2V) 00:20:00 Manage VMs 00:28:00 Virtual Machine Startup Shutdown 00:06:00 Virtual Machine Snapshots 00:18:00 vSphere Web Client 00:12:00 Virtual Machine Troubleshooting & Best Practices 00:04:00 Security and Permissions Controlling User Access and Passwords 00:29:00 ESXi ESX Active Directory (AD) Integration 00:09:00 Managing Firewalls 00:13:00 SSH Access 00:05:00 The root Account 00:04:00 VMsafe and vShield 00:07:00 Server and VM Monitoring Optimizing Resources 00:32:00 Performance Monitoring 00:32:00 Configuring Alarms 00:07:00 ESXi and vCenter Logs 00:11:00 Advanced ESXi and vCenter Server Management Storage Views & Topology Maps 00:10:00 Storage vMotion 00:14:00 Configuring vMotion 00:20:00 Distributed Resource Scheduler (DRS) Cluster 00:39:00 Datastore Clusters & Storage DRS (SDRS) 00:18:00 Resource Pools and Monitoring 00:11:00 Host Profiles 00:23:00 Linked Mode Group of vCenter Servers 00:04:00 vSphere Storage Appliance (VSA) 00:06:00 Patching and Upgrading ESXi Patching ESXi Standalone Hosts 00:03:00 Patching with Update Manager 00:16:00 Upgrades and Migrations 00:18:00 Disaster Recovery and Backup Site Recovery Manager (SRM) 00:07:00 High Availability (HA) 00:31:00 VM Fault Tolerance 00:06:00 Microsoft Clustering 00:04:00 Backup Strategies 00:01:00 VMware Data Recovery 00:24:00 Third Party Backups 00:07:00 Mock Exam Mock Exam- VMware Ultimate Bootcamp vSphere 5 00:20:00 Final Exam Final Exam- VMware Ultimate Bootcamp vSphere 5 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

VMware Ultimate Bootcamp vSphere 5
Delivered Online On Demand18 hours 58 minutes
£24

Microsoft Azure Functions - Developing Serverless Solutions

By Packt

In this course, you will learn how to create your own Azure Functions apps and visualize how full applications can be built using Azure Functions. We will also explore the tools needed to support development, both locally and in the Azure portal, and explore the different triggers, bindings, and deployment models that are possible.

Microsoft Azure Functions - Developing Serverless Solutions
Delivered Online On Demand3 hours 46 minutes
£41.99

VMware vSphere 6.0 Ultimate Bootcamp

4.3(43)

By John Academy

Description This VMware vSphere 6.0 Ultimate Bootcamp covers everything you need to know about the VMware vSphere 6.0 Ultimate Bootcamp. In this course you will learn about virtualization, planning and installing ESXi, using tools to administer a VMware environment, vCenter Server 6.0 and licensing, configuring networking, configuring storage, VM creation, configuration, and snapshots, security and permissions, server and VM monitoring, advanced ESXi and vCenter server management, patching and upgrading ESXi, and disaster recovery and backup. This course is designed to immerse you into the new features inherent to version 6.0. It will prepare you to achieve the Certified Virtualization Expert 6.0 (CVE6.0) certification, which will demonstrate practical VMware vSphere knowledge and skills as a certified professional. So, if you are interested to learn more you can join this course now. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware vSphere 6.0 Ultimate Bootcamp is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Series Introduction and Methodology UB Learn IT! Do IT! Know IT! FREE 00:02:00 Virtualization Overview UB VMware Virtualization 00:09:00 Other VMware & 3rd Party Virtualization Technologies 00:05:00 Planning and Installing ESXi Planning the ESXi Deployment 00:09:00 vSphere 6.x Deployment Guidelines 00:06:00 vSphere Hypervisor (ESXi) Installation 00:12:00 Configuring Hostname Resolution and NTP 00:02:00 Troubleshooting ESXi 00:03:00 Using Tools to Administer a VMware Environment Overview of 3rd Party Tools 00:05:00 ESXi Management 00:19:00 Linux Command Review 00:03:00 Troubleshooting the vSphere Client (VIC) 00:01:00 vCenter Server 6.0 and Licensing Licensing 00:06:00 Planning vCenter Server Deployment 00:25:00 vCenter Server Installation 00:14:00 vSphere Web Client 00:11:00 vCenter Server Inventory 00:11:00 Managing vCenter Server 00:07:00 Troubleshooting vCenter Server and Database 00:08:00 Configuring Networking Creating & Modifying Virtual Networks 00:48:00 vSphere Distributed Switches 00:28:00 3rd Party Distributed Switches 00:03:00 Configuring Storage Storage Concepts 00:28:00 iSCSI Storage 00:12:00 Fibre Channel Storage 00:07:00 VMFS Datastores 00:12:00 NAS Storage and NFS Datastores 00:06:00 Raw Device Mapping (RDM) 00:03:00 Solid State Disks (SSD) 00:05:00 Storage & Management Solutions 00:01:00 VMware Virtual SAN (VSAN) 00:04:00 Virtual Volumes (VVols) 00:06:00 VM Creation, Configuration, and Snapshots Create a VM 00:37:00 Create Multiple VMs, Templates & Clones 00:18:00 Virtual Appliances 00:05:00 Configuration and Use of vApps 00:03:00 VMware Converter (P2V - V2V) 00:17:00 Manage VMs 00:22:00 Virtual Machine Startup Shutdown 00:02:00 Virtual Machine Snapshots 00:06:00 Virtual Machine Troubleshooting & Best Practices 00:02:00 Security and Permissions Controlling User Access and Passwords 00:15:00 ESXi Active Directory (AD) Integration 00:02:00 Managing Firewalls 00:02:00 Managing Security Certificates 00:02:00 Server and VM Monitoring Optimizing Resources 00:23:00 Resource Pools 00:05:00 Latency Sensitive Applications 00:01:00 Performance Monitoring 00:10:00 Configuring Alarms 00:07:00 ESXi & vCenter Logs 00:04:00 Advanced ESXi and vCenter Server Management Storage Reports 00:01:00 Storage vMotion 00:04:00 Configuring vMotion 00:13:00 Enhanced vMotion 00:01:00 Distributed Resource Scheduler (DRS) Cluster 00:17:00 DRS Cluster Monitoring 00:03:00 Profile Driven Storage, Datastore Clusters & Storage DRS (SDRS) 00:11:00 Host Profiles 00:05:00 Linked Mode Group of vCenter Servers 00:03:00 Patching and Upgrading ESXi Patching ESXi Standalone Hosts & vCSA 6.0 00:01:00 Patching the vCenter Environment 00:23:00 Upgrades and Migrations 00:29:00 Disaster Recovery and Backup vSphere Replication 6 00:06:00 Site Recovery Manager (SRM) 00:04:00 High Availability (HA) 00:21:00 VM Fault Tolerance 00:14:00 Microsoft Clustering 00:14:00 Backup Strategies 00:01:00 vSphere Data Protection 00:10:00 Third Party Backups 00:09:00 Mock Exam Mock Exam- VMware vSphere 6.0 Ultimate Bootcamp 00:20:00 Final Exam Final Exam- VMware vSphere 6.0 Ultimate Bootcamp 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

VMware vSphere 6.0 Ultimate Bootcamp
Delivered Online On Demand12 hours 14 minutes
£24