• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7452 Admin courses

VMware vRealize Operations: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators Consultants responsible for designing, implementing, and customizing vRealize Operations Overview By the end of the course, you should be able to meet the following objectives: List the vRealize Operations use cases Identify features and benefits of vRealize Operations Determine the vRealize Operations cluster that meets your monitoring requirements Deploy and configure a vRealize Operations cluster Use interface features to assess and troubleshoot operational problems Describe vRealize Operations certificates Create policies to meet the operational needs of your environment Recognize effective ways to optimize performance, capacity, and cost in data centers Troubleshoot and manage problems using workbench, alerts, and predefined dashboards Manage configurations Configure application monitoring using VMware vRealize Operations Cloud Appliance™ Create custom symptoms and alert definitions, reports, and views Create various custom dashboards using the dashboard creation canvas Configure widgets and widget interactions for dashboards Create super metrics Set up users and user groups for controlled access to your environment Extend the capabilities of vRealize Operations by adding management packs and configuring solutions Monitor the health of the vRealize Operations cluster by using self-monitoring dashboards This course provides you with the knowledge and skills to deploy a VMware vRealize Operations cluster that meets the monitoring requirements of your environment.This course includes advanced capabilities such as customizing alerts, views, reports, and dashboards and explains the deployment and architecture in vRealize Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs. Course Introduction Introduction and course logistics Course objectives Introduction to vRealize Operations List the vRealize Operations use cases Access the vRealize Operations User Interface (UI) vRealize Operations Architecture Identify the functions of components in a vRealize Operations node Identify the types of nodes and their role in a vRealize Operations cluster Outline how high availability is achieved in vRealize Operations List the components required to enable Continuous Availability (CA) Deploying vRealize Operations Design and size a vRealize Operations cluster Deploy a vRealize Operations node Install a vRealize Operations instance Describe different vRealize Operations deployment scenarios vRealize Operations Concepts Identify product UI components Create and use tags to group objects Use a custom group to group objects vRealize Operations Policies and Certificate Management Describe vRealize Operations certificates Create policies for various types of workloads Explain how policy inheritance works Capacity Optimization Define capacity planning terms Explain capacity planning models Assess the overall capacity of a data center and identify optimization recommendations What-If Scenarios and Costing in vRealize Operations Run what-if scenarios for adding workloads to a data center Discuss the types of cost drivers in vRealize Operations Assess the cost of your data center inventory Performance Optimization Introduction to performance optimization Define the business and operational intentions for a data center Automate the process of optimizing and balancing workloads in data centers Report the results of optimization potential Troubleshooting and Managing Configurations Describe the troubleshooting workbench Recognize how to troubleshoot problems by monitoring alerts Use step-by-step workflows to troubleshoot different vSphere objects Assess your environment?s compliance to standards View the configurations of vSphere objects in your environment Operating System and Application Monitoring Describe native service discovery and application monitoring features Configure application monitoring Monitor operating systems and applications by using VMware vRealize© Operations Cloud Appliance? Custom Alerts Create symptom definitions Create recommendations, actions, and notifications Create alert definitions that monitor resource demand in hosts and VMs Build and use custom views in your environment Custom Views and Reports Build and use custom views in your environment Create custom reports for presenting data about your environment Custom Dashboards Create dashboards that use predefined and custom widgets Configure widgets to interact with other widgets and other dashboards Configure the Scoreboard widget to use a metric configuration file Manage dashboards by grouping dashboards and sharing dashboards with users Super Metrics Recognize different types of super metrics Create super metrics and associate them with objects Enable super metrics in policies User Access Control Recognize how users are authorized to access objects Determine privilege priorities when a user has multiple privileges Import users and user groups from an LDAP source Extending and managing a vRealize Operations Deployment Identify available management packs in the VMware Marketplace? Monitor the health of a vRealize Operations cluster Generate a support bundle View vRealize Operations logs and audit reports Perform vRealize Operations cluster management tasks Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Operations: Install, Configure, Manage [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Operations: Install, Configure, Manage [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Operations: Install, Configure, Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. Course Introduction Introductions and course logistics Course objectives VMware cloud foundation overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe the VMware Cloud Foundation topology VMware Cloud Foundation+ and VMware Cloud Connectivity Describe the VMware Cloud Foundation+ architecture Identify the pre-requisites for VMware Cloud Foundation+ Describe VMware Cloud Foundation+ value added features Configure subscription-based licensing parameters Describe the vCenter Cloud Gateway functionality Identify the vCenter Cloud Gateway components Describe the vCenter Cloud Gateway architecture Connect the vCenter Cloud Gateway to VMware Cloud Describe the VMware Cloud platform Describe the VMware vSphere+ services used in VMware Cloud Foundation+ Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Describe the VMware Cloud Foundation bring-up process Identify the information required for the Planning and Preparation Workbook Complete the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Identify the configuration validation process performed by VMware Cloud Builder Describe the deployment of the management domain Post-Deployment Operations Complete the Onboarding Wizard Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources for VMware Cloud Foundation Perform the SDDC Manager backup and restore process Identify steps in the NSX backup and restore process Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Manage and secure a primary password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation Networking with NSX Describe network virtualization with NSX Recognize NSX operational planes Identify NSX components Describe logical switching Describe NSX Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX Identify NSX Edge functions Describe data plane preparation for NSX Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Managing Workload Domains Define workload domains List the types of workload domains Identify workload domain prerequisites Understand the scalability limits for workload domains Identify use cases for multiple clusters in a workload domain Create network pools Size network pools Commission hosts with SDDC Manager Create workload domains Scale workload domains Decommission hosts from a workload domain Remove workload domains Describe distinctive design decisions for VMware Cloud Foundation components vSphere with Tanzu in VMware Cloud Foundation Explain vSphere with Tanzu Define the role of the Spherelet Describe the supervisor cluster control plane Create vSphere with Tanzu namespaces Describe the role of NSX networking components in vSphere with Tanzu Discuss vSphere with Tanzu networking topology Describe control plane VM management networking requirements Plan appropriate IP address ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace VMware Cloud Foundation Storage Management Identify storage use cases in VMware Cloud Foundation Determine the most appropriate storage option for a workload domain Describe different vSphere-native storage design options Identify vSAN architecture and components Describe vSAN requirements for the management and workload domains Configure deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Configure storage policies for vSAN Explain storage policy failure tolerance rules Identify a virtual machine storage policy compliance status Explain how vSAN storage policies protect VMware Cloud Foundation components Availability and Business Continuity Explain the importance of external service availability Describe availability options native to VMware vSphere Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Learn the basics of public key infrastructure (PKI) Describe the purpose of certificate signing requests (CSRs) Describe available options in SDDC Manager for certificate authorities View certificates for VMware Cloud Foundation components Install and replace certificates for VMware Cloud Foundation components Configure the integrated Certificate Authorities in SDDC Manager Configure a certificate template in Microsoft Certificate Authority server Configure the OpenSSL certificate authority in SDDC Manager Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMware Cloud Foundation Lifecycle Management Describe VMware Cloud Foundation Life Cycle Management List the products managed by VMware Cloud Foundation Lifecycle management Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation Understand vSphere Lifecycle Manager features Understand how and when to use cluster images Describe the importance of Hardware Support Managers Describe the upgrade prerequisites Outline the upgrade precheck process Describe the order of upgrade for VMware Cloud Foundation components VMware Cloud Foundation Troubleshooting Use the SoS command-line tool to create log bundles, perform health checks, and check password validity List VMware Cloud Foundation services Identify VMware Cloud Foundation log files Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. Course Introduction Introductions and course logistics Course objectives Day 0 Operations: VMware Telco Cloud Infrastructure Installation Describe the challenges of the telco cloud Describe the key functions of the telco cloud List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure Describe the VMware Telco Cloud Infrastructure architecture Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture List the VMware Telco Cloud Infrastructure deployment options Describe the VMware Cloud Director architecture List the key VMware components that are part of VMware Cloud Director Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure Day 0 Operations: ETSI NFV Requirements for Cloud Platforms Compare physical and virtual infrastructures List the benefits and challenges of physical infrastructure Describe the types of virtual infrastructure Describe the advantages and components of the NFV infrastructure (NFVI) Explain the role of network virtualization in the NFVI List the requirements of NFVI for VMware Cloud Director Describe the networking options of VMware Cloud Director Describe the key networking use cases Describe requirements of VMware Telco Cloud Automation? for networking Describe the storage options of VMware Cloud Director Describe the key storage use cases Day 1 Operations: Virtualized Infrastructure Manager (VIM) Configuration Explain basic concepts related to VMware Cloud Director Describe the components of the VMware Cloud Director architecture Describe the basic configuration of the VMware Cloud Director architecture Describe virtual data centers or VDCs Explain the role of organization VDCs Describe the relationship between provider VDCs and organization VDCs Describe resources in VMware Cloud Director List the key resource organization Create resource pools Describe how vSAN integrates with VMware Cloud Director Day 1 Operations: Configuring VMware Cloud Director Providers Describe how compute resources are provided to VMware Cloud Director Describe how storage resources are provided to VMware Cloud Director Describe provider VDC requirements and best practices List the requirements of creating VDCs Describe the VNF on-boarding process Create provider VDCs Day 1 Operations: Configuring VMware Cloud Director Organizations Describe VMware Cloud Director organizations Create VMware Cloud Director organizations Navigate through the VMware Cloud Director HTML5 provider portal Describe the VMware Cloud Director organization VDC Navigate through the tenant portal List use cases for a VMware Cloud Director organization VDC List the organization VDC allocation models Describe the types of resources that can be allocated Describe how resources are allocated for an organization Examine the function and requirements of network pools Describe the network types available in VMware Cloud Director (external, organization, and vApp) Create and manage organization VDC networks Describe catalogs Manage an organization?s catalog Populate, share, and publish catalogs Describe vApps Manage access to vApps and catalogs Modify the configuration of vApps and their virtual machines (VMs) Manage organization VDC networking Create affinity and anti-affinity rules Day 1 Operations: Configuring VMware Cloud Director Security Describe role-based access Create custom security roles Describe the directory services in VMware Cloud Director Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director Explain the use of VMware Cloud Director with SSO Day 1 Operations: Configuring VMware Cloud Director Networking List networking options in VMware Cloud Director Describe key networking use cases in VMware Cloud Director Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall Describe an overview of VMware NSX-T? Data Center Explain the architecture of NSX-T Data Center Describe VMware Cloud Director supported features of NSX-T Data Center Describe the benefits and challenges of multisite networking List the requirements for multisite networking Describe the benefits and challenges of networking between VDCs List the requirements for networking between VDCs Configure cross-VDC networking Day 2 Operations: VMware Cloud Director Resource Management and Monitoring Identify the key resources that need to be managed with VMware Cloud Director List monitoring options with VMware Cloud Director Explain the resource management and monitoring architecture in VMware Cloud Director Monitor objects from the VMware Cloud Director portal Identify features of VMware vRealize© Operations Manager? Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director Integrate VMware Cloud Director with the Tenant App Configure the Tenant App for VMware Cloud Director Monitor objects with the Tenant App List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? List the steps to review historical virtual machine metrics in VMware Cloud Director Examine VMware Cloud Director logs Day 2 Operations: VMware Cloud Director Troubleshooting Identify the features of the VMware Telco Cloud Automation dashboards List the components of the VMware Telco Cloud Automation dashboards Explain the features of fault management in VMware Telco Cloud Director Describe the use of fault management in VMware Cloud Director Describe the use of performance management in VMware Cloud Director Describe the use of logs in VMware Cloud Director Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Business Applications

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge of business skills. Overview Upon successful completion of this course, students will be able to communicate and work effectively in a business environment. In this course, students will learn about all different aspects of business skills needed be effective in an office environment. Accessing PDF Documents Open a PDF Document Browse a PDF Document Creating & Saving PDF Documents Create and Save a PDF Document from an Existing Document Create a PDF Document from a Web Page Combine Multiple PDF Documents Navigating Content in a PDF Document Perform a Search in a PDF Document Search Multiple PDF Documents Work with Bookmarks Create Links and Buttons Modifying PDF Documents Manipulate PDF Document Pages Edit Content in a PDF Document Add Page Elements Reviewing PDF Documents Add Comments and Markup Compare PDF Documents Initiate and Manage a Review Converting PDF Files Reduce the File Size of a PDF Document Optimize PDF Files Convert and Reuse PDF Document Content Customizing the Acrobat XI Pro Workspace Customize the Toolbars Customize the Tool Sets Creating PDFs from Technical Documents Create PDF Documents Using Autodesk AutoCAD Measure Technical Drawings Enhancing PDF Documents Embed Multimedia Enhance PDF Document Accessibility Securing PDF Documents Manage the Security of PDF Documents Validate PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Accessing & Navigating SharePoint Team Sites Access SharePoint Sites Navigate SharePoint Sites Working with Documents, Content, & Libraries Upload Documents Search for Documents and Files Working with Lists Add List Items Modify List Items Configure List Views Filtering and Grouping with List Views Configuring Your SharePoint Profile Update and Share Your Profile Information Share and Follow SharePoint Content Creating a Blog Integrating with Microsoft Office Access and Save SharePoint Documents with Microsoft Office Manage Document Versions through Office 2013 Accessing SharePoint Data from Outlook 2013 Working Offline & Remotely with SharePoint Synchronize Libraries, Sites, and MySite and Working Offline Working from a Mobile Device Creating a New Site Create a Site Change the Look and Feel of Your SharePoint Site Adding & Configuring Libraries Configure Document Library for Your SharePoint Team Site Configure the Site Assets Library for Your SharePoint Site Add and Configure a Wiki for Your SharePoint Site Adding & Configuring Lists Add an Announcement List Add and Configure a Task List Add and Configure Contact and Calendar Lists Add and Configure a Blog Subsite Add and Configure a Custom List to your SharePoint Site Customize List Forms Configuring Site Settings, Navigation, & Search Configure Site Search Options Configure Site Administration Settings Configure Site Organization and Navigation Assigning Permissions & Access Rights Sharing Sites and Setting Site Permissions Secure Lists, Libraries, and Documents Configure Content Roll-Up, Summary Links, & Site Map Add and Configure the Content Search Web Part Add and Configure the Relevant Documents Web Part Identifying Nouns, Pronouns, & Verbs Identify Nouns Identify Pronouns Identify Verbs Identifying Adjectives & Adverbs Use Adjectives Use Adverbs Indentifying Prepositions, Conjunctions, and Interjections Use Prepositions Use Conjunctions Use Interjections Identifying Rules Monitor Sentences Monitor Modifiers Avoid Common Errors Identifying Correct Punctuation Use Parentheses Correctly Use Commas, Semicolons, and Quotation Marks Use Numbers, Symbols, and Capitalization Correctly Identifying Sentence Fragments, Run-Ons, and Comma Splices Identify Sentence Fragments Identify Run-ons, Comma Splices, and Solutions Improving Word Choices Identify Commonly Misused Words Identify Synonyms, Antonyms, and Homonyms Building Effective Sentences Identify the Goal Consider the Audience Consider the Context Editing Effectively Use Correct Spelling Achieve Clarity Avoiding Hypercorrections Avoid Hypercorrections Achieve Simplicity Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Working with Words Spelling Grammar Creating a Cheat Sheet Constructing Sentences Parts of a Sentence Punctuation Types of Sentences Creating Paragraphs The Basic Parts Organization Methods Writing Meeting Agendas The Basic Structure Choosing a Format Writing the Agenda Writing E-Mails Addressing Your Message Grammar and Acronyms Writing Business Letters The Basic Structure Choosing a Format Writing the Letter Writing Proposals The Basic Structure Choosing a Format Writing the Proposal Writing Reports The Basic Structure Choosing a Format Be guided by the: The purpose of the report The seniority of your readers Writing the Report Other Types of Documents Requests for Proposals Projections Executive Summaries Business Cases Proofreading & Finishing A Proofreading Primer How Peer Review Can Help Printing and Publishing Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations E-Mail Basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym E-Mail Policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability E-Mail Features & Security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Usi Additional course details: Nexus Humans Business Applications training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Applications course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Applications
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Foundation: Planning, Management, Operations [V4.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system integrators, and consultants responsible for implementing and managing VMware Cloud Foundation Overview By the end of the course, you should be able to meet the following objectives: Describe design implications of VMware Cloud Foundation standard or consolidated architecture List requirements for VMware Cloud Foundation deployment Describe the VMware Cloud Foundation bring-up process and the VMware Cloud Foundation architecture Perform VMware Cloud Foundation bring-up Describe physical and virtual networking considerations Outline VMware Cloud Foundation storage options Use the VMware Imaging Appliance to image ESXi hosts Describe VMware Cloud Foundation multi-instance federation Use VMware Cloud Foundation™ SDDC Manager™ to perform operational tasks Describe user roles in VMware Cloud Foundation and VMware vSphere Manage users and passwords using VMware Cloud Foundation Manage certificate rotation for VMware Cloud Foundation components Use Active Directory integration to automate certificate generation and rotation Describe workload domains Manage workload domains in VMware Cloud Foundation Manage VMware NSX-T™ for VMware Cloud Foundation Describe use cases for Application Virtual Networks (AVNs) Meet vSphere with VMware Tanzu™ requirements Deploy a vSphere with Tanzu enabled workload domain Manage VMware vSAN™ storage in a workload domain Create vSAN storage policies Describe Cloud Native storage Describe the importance of business continuity measures in VMware Cloud Foundation Plan appropriate backup and restore workflows for VMware Cloud Foundation components Implement stretched clusters in VMware Cloud Foundation workload domains This five-day course includes instruction on the capabilities of VMware Cloud Foundation? and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization. The course explains the architecture of VMware Cloud Foundation and explains licensing, certificates, and storage and network management. The course also covers workload domains, availability, life cycle management, and troubleshooting. Course Introduction Introductions and course logistics Course objectives VMware Cloud Foundation Overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe VMware Cloud Foundation topology Define VMware Cloud Foundation terminology Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Identify management domain sizing considerations Identify workload domain sizing considerations Detail design considerations for ESXi in management and VI workload domains Detail design considerations for vCenter in management and VI workload domains Detail the VMware Cloud Foundation bring-up process Identify information required for the Planning and Preparation Workbook Identify information required for the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Explain how the Deployment Parameter Workbook is imported into VMware Cloud Builder Recognize the configuration validation process performed by VMware Cloud Builder Detail the deployment of the management domain Recognize the options to image a host Identify the key capabilities of VIA Recognize how to use VIA for imaging the ESXi Nodes Post Deployment Operations Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources in vSphere to use with VMware Cloud Foundation Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Detail the best practices for password management for VMware Cloud Foundation Retrieve and secure the password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation License Management Describe how to add license keys to the VMware Cloud Foundation inventory Describe how to view license keys in SDDC Manager Describe how to assign license keys Describe how to remove license keys Describe how to replace expiring licenses VMware Cloud Foundation Networking with NSX-T Describe NSX Management plane and Control planes Detail design considerations for workload domains with shared NSX Manager instances Detail design considerations for workload domains with dedicated NSX Manager instances Describe the spine-and-leaf design Describe the addressing scheme for the underlay Recognize possible variations of the spine-and-leaf design Describe the multi-NIC design Describe NSX Edge node design and BGP peering with the physical network Describe cluster design and rack design Explain dynamic routing with BGP Explain virtual IP addressing Describe logical switching Detail NSX Edge functions Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Describe NSX-T Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX-T Data Center Identify NSX Edge functions Describe data plane preparation for NSX-T Data Center Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Recognize features of NSX distributed firewalls Describe the benefits of NSX Federation in VMware Cloud Foundation Identify NSX Federation Use Cases Explain NSX Federation Components and Architecture Discuss NSX Federation configuration basics Managing Workload Domains Define workload domains Detail design considerations for vSphere networking in management and VI workload domains Detail design considerations for storage in management and VI workload domains Recognize design choices for a consolidated design or standard design List the types of workload domains State scale limits for workload domains Identify use cases for multiple clusters in a workload domain List workload domain prerequisites Explain how to create a workload domain Describe how to scale a workload domain Explain how to delete a workload domain Describe host decommissioning vSphere with Tanzu in VMware Could Foundation Discuss the vSphere with Tanzu solution Define the role of Spherelet Describe the supervisor cluster control plane Define vSphere with Tanzu namespaces Describe the role of NSX-T networking components Discuss vSphere with Tanzu networking topology Describe VMware Container Networking with Antrea Describe control plane VM management networking requirements Plan appropriate IP address CIDR ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace Enabling Harbor Image Registry VMware Cloud Foundation Storage Management Identify vSAN architecture and components Recognize storage options for VMware Cloud Foundation Recognize the connectivity options for supplemental storage Explain why vSAN is the best option for VMware Cloud Foundation storage Recognize vSAN design considerations Identify sizing and performance considerations that impact the storage design Describe vSAN requirements for the management and workload domains Define deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Explain how storage policies work with VMware Cloud Foundation vSAN clusters Explain storage policy failure tolerance rules Identify a VM storage policy compliance status Relate storage policies to Kubernetes storage classes Describe persistent volumes Monitor Cloud Native Storage in the vSphere Client Availability and Business Continuity Identify steps in the SDDC Manager backup and restore process Recognize the importance of external service availability Describe native vSphere availability options Identify steps in the NSX backup and restore process Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Describe public key infrastructure (PKI) Explain the purpose of certificate signing requests (CSRs) List the available CA options in SDDC Manager Describe how to view certificates Explain how to generate a CSR Describe how to replace and install certificates for VMware Cloud Foundation components List the available CA options in SDDC Manager Explain how to configure the Microsoft CA server Describe how to install certificates issued by the Microsoft CA server Explain how to add OpenSSL CA in SDDC Manager Describe how to install certificates issued by OpenSSL CA Explain how to install certificates issued by third-party CAs

VMware Cloud Foundation: Planning, Management, Operations [V4.3]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Contract and commercial management for practitioners (In-House)

By The In House Training Company

This five-day programme empowers participants with the skills and knowledge to understand and effectively apply best practice commercial and contracting principles and techniques, ensuring better contractor performance and greater value add. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Practitioner (CCMP) qualification. By the end of this comprehensive programme the participants will be able to: Develop robust contracting plans, including scopes of work and award strategies Undertake early market engagements to maximise competition Conduct effective contracting and commercial management activities, including ITT, RFP, negotiated outcomes Understand the legalities of contract and commercial management Negotiate effectively with key stakeholders and clients, making use of the key skills of persuading and influencing to optimise outcomes Undertake effective Supplier Relationship Management Appreciate the implications of national and organisational culture on contracting and commercial activities Appreciate professional contract management standards Set up and maintain contract and commercial management governance systems Take a proactive, collaborative, and agile approach to managing commercial contracts Develop and monitor appropriate and robust KPIs and SLAs to manage the contractor and facilitate improved contractor performance Appreciate the cross-functional nature of contract management Collaborate with clients to deliver sustainable performance and to manage and exceed client expectations Understand the roles and responsibilities of contract and commercial managers Use effective contractor selection and award methods and models (including the 10Cs model) and use these models to prepare robust propositions to clients Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Effectively manage the process of change, claims, variations, and dispute resolution Develop and present robust propositions Make appropriate use of best practice contract and commercial management tools, techniques, and templates DAY ONE 1 Introduction Aims Objectives KPIs Learning strategies Plan for the programme 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Critical success factors Essential features of professional commercial and contract management and administration The 6-step model 4 Putting the 'management' into commercial and contract management Traditional v 'new age' models The need for a commercial approach The added value generated 5 Definitions 'Commercial management' 'Contract management' 'Contracting' ... and why have formal contracts? 6 Stakeholders Stakeholder mapping and analysis The 'shared vision' concept Engaging with key functions, eg, HSE, finance, operations 7 Roles and responsibilities Contract administrators Stakeholders 8 Strategy and planning Developing effective contracting plans and strategies DAY TWO 1 Contract control Tools and techniques, including CPA and Gantt charts A project management approach Developing effective contract programmes 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Tendering Overview of the contracting cycle Requirement to tender Methods Rationale Exceptions Steps Gateways Controls One and two package bids 4 Tender assessment and contract award I - framework Tender board procedures Role of the tender board (including minor and major tender boards) Membership Administration Developing robust contract award strategies and presentations DAY THREE 1 Tender assessment and contract award II - processes Pre-qualification processes CRS Vendor registration rules and processes Creating bidder lists Disqualification criteria Short-listing Using the 10Cs model Contract award and contract execution processes 2 Minor works orders Process Need for competition Role and purpose Controls Risks 3 Contract strategy Types of contract Call-offs Framework agreements Price agreements Supply agreements 4 Contract terms I: Pricing structures Lump sum Unit price Cost plus Time and materials Alternative methods Target cost Gain share contracts Advance payments Price escalation clauses 5 Contract terms II: Other financial clauses Insurance Currencies Parent body guarantees Tender bonds Performance bonds Retentions Sub-contracting Termination Invoicing 6 Contract terms III: Risk and reward Incentive contracts Management and mitigation of contractual risk DAY FOUR 1 Contract terms IV: Jurisdiction and related matters Applicable laws and regulations Registration Commercial registry Commercial agencies 2 Managing the client-contractor relationship Types of relationship Driving forces Link between type of contract and style of relationships Motivation - use of incentives and remedies 3 Disputes Types of dispute Conflict resolution strategies Negotiation Mediation Arbitration DAY FIVE 1 Performance measurement KPIs Benchmarking Cost controls Validity of savings Balanced scorecards Using the KPI template 2 Personal qualities of the contract manager Negotiation Communication Persuasion and influencing Working in a matrix environment 3 Contract terms V: Drafting skills Drafting special terms 4 Variations Contract and works variation orders Causes of variations Risk management Controls Prevention Negotiation with contractors 5 Claims Claims management processes Controls Risk mitigation Schedules of rates 6 Close-out Contract close-out and acceptance / completion HSE Final payments Performance evaluation Capturing the learning 7 Close Review Final assessment Next steps

Contract and commercial management for practitioners (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry