• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8201 Admin courses

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

From Data to Insights with Google Cloud Platform

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform Overview This course teaches students the following skills: Derive insights from data using the analysis and visualization tools on Google Cloud Platform Interactively query datasets using Google BigQuery Load, clean, and transform data at scale Visualize data using Google Data Studio and other third-party platforms Distinguish between exploratory and explanatory analytics and when to use each approach Explore new datasets and uncover hidden insights quickly and effectively Optimizing data models and queries for price and performance Want to know how to query and process petabytes of data in seconds? Curious about data analysis that scales automatically as your data grows? Welcome to the Data Insights course! This four-course accelerated online specialization teaches course participants how to derive insights through data analysis and visualization using the Google Cloud Platform. The courses feature interactive scenarios and hands-on labs where participants explore, mine, load, visualize, and extract insights from diverse Google BigQuery datasets. The courses also cover data loading, querying, schema modeling, optimizing performance, query pricing, and data visualization. This specialization is intended for the following participants: Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform To get the most out of this specialization, we recommend participants have some proficiency with ANSI SQL. Introduction to Data on the Google Cloud Platform Highlight Analytics Challenges Faced by Data Analysts Compare Big Data On-Premises vs on the Cloud Learn from Real-World Use Cases of Companies Transformed through Analytics on the Cloud Navigate Google Cloud Platform Project Basics Lab: Getting started with Google Cloud Platform Big Data Tools Overview Walkthrough Data Analyst Tasks, Challenges, and Introduce Google Cloud Platform Data Tools Demo: Analyze 10 Billion Records with Google BigQuery Explore 9 Fundamental Google BigQuery Features Compare GCP Tools for Analysts, Data Scientists, and Data Engineers Lab: Exploring Datasets with Google BigQuery Exploring your Data with SQL Compare Common Data Exploration Techniques Learn How to Code High Quality Standard SQL Explore Google BigQuery Public Datasets Visualization Preview: Google Data Studio Lab: Troubleshoot Common SQL Errors Google BigQuery Pricing Walkthrough of a BigQuery Job Calculate BigQuery Pricing: Storage, Querying, and Streaming Costs Optimize Queries for Cost Lab: Calculate Google BigQuery Pricing Cleaning and Transforming your Data Examine the 5 Principles of Dataset Integrity Characterize Dataset Shape and Skew Clean and Transform Data using SQL Clean and Transform Data using a new UI: Introducing Cloud Dataprep Lab: Explore and Shape Data with Cloud Dataprep Storing and Exporting Data Compare Permanent vs Temporary Tables Save and Export Query Results Performance Preview: Query Cache Lab: Creating new Permanent Tables Ingesting New Datasets into Google BigQuery Query from External Data Sources Avoid Data Ingesting Pitfalls Ingest New Data into Permanent Tables Discuss Streaming Inserts Lab: Ingesting and Querying New Datasets Data Visualization Overview of Data Visualization Principles Exploratory vs Explanatory Analysis Approaches Demo: Google Data Studio UI Connect Google Data Studio to Google BigQuery Lab: Exploring a Dataset in Google Data Studio Joining and Merging Datasets Merge Historical Data Tables with UNION Introduce Table Wildcards for Easy Merges Review Data Schemas: Linking Data Across Multiple Tables Walkthrough JOIN Examples and Pitfalls Lab: Join and Union Data from Multiple Tables Advanced Functions and Clauses Review SQL Case Statements Introduce Analytical Window Functions Safeguard Data with One-Way Field Encryption Discuss Effective Sub-query and CTE design Compare SQL and Javascript UDFs Lab: Deriving Insights with Advanced SQL Functions Schema Design and Nested Data Structures Compare Google BigQuery vs Traditional RDBMS Data Architecture Normalization vs Denormalization: Performance Tradeoffs Schema Review: The Good, The Bad, and The Ugly Arrays and Nested Data in Google BigQuery Lab: Querying Nested and Repeated Data More Visualization with Google Data Studio Create Case Statements and Calculated Fields Avoid Performance Pitfalls with Cache considerations Share Dashboards and Discuss Data Access considerations Optimizing for Performance Avoid Google BigQuery Performance Pitfalls Prevent Hotspots in your Data Diagnose Performance Issues with the Query Explanation map Lab: Optimizing and Troubleshooting Query Performance Advanced Insights Introducing Cloud Datalab Cloud Datalab Notebooks and Cells Benefits of Cloud Datalab Data Access Compare IAM and BigQuery Dataset Roles Avoid Access Pitfalls Review Members, Roles, Organizations, Account Administration, and Service Accounts

From Data to Insights with Google Cloud Platform
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Plan and Deploy [v7]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced VMware vSphere administrators Overview By the end of the course, you should be able to meet the following objectives: Explain the key features and use cases for vSAN Detail the underlying vSAN architecture and components Describe the different vSAN deployment options Detail vSAN cluster requirements and considerations Apply recommended vSAN design considerations and capacity sizing practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Explain Maintenance Mode use and its impacts on vSAN Apply best practices for vSAN network configurations Manually configure a vSAN cluster using VMware vSphere Client™ Explain and configure vSAN fault domains Understand and apply vSAN storage policies Define encryption in the vSAN cluster Describe the architecture and use cases for stretched clusters Describe the architecture and use cases for two-node clusters Understand the steps involved in creating the vSAN iSCSI target services This two-day, hands-on training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Deploy and configure a vSAN cluster using the Cluster Quickstart wizard Manually configure a vSAN cluster using vSphere Client Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status Introduction to Advanced vSAN Configurations Define and configure compression and deduplication in the vSAN cluster Define and configure encryption in the vSAN cluster Understand the remote vSAN datastore topology Identify the operations involved in managing the remote vSAN datastore Understand the steps involved in creating the vSAN iSCSI target service vSAN Stretched and Two-Node Clusters Describe the architecture and use cases for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Plan and Deploy [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Plan and Deploy [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Plan and Deploy [v7]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring BGP on Cisco Routers v4.0 (BGP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: • This course is intended primarily for network administrators, network engineers, network managers and systems engineers who would like to implement BGP. The secondary audience for this course is as follows: • This course is intended for network designers and project managers. The course is also recommended to all individuals preparing for BGP exam. Overview After completing this course the student should be able to: - Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains - Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario In which you must support connections to multiple ISPs - Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections - Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented - Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems - Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems - Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network This covers the theory of BGP, configuration of BGP on Cisco IOS© routers, detailed troubleshooting information, and hands-on exercises that provide learners with the skills that they need to configure and troubleshoot BGP networks in customer environments. BGP Overview Introducing BGP Understanding BGP Path Attributes Establishing BGP Sessions Processing BGP Routes Configuring Basic BGP Monitoring and Troubleshooting BGP Lab 1-1: Initial Lab Setup Lab 1-2: Configuring Basic BGP BGP Transit Autonomous Systems Working with a Transit AS Interacting with IBGP and EBGP in a Transit AS Forwarding Packets in a Transit AS Configuring a Transit AS Monitoring and Troubleshooting IBGP in a Transit AS Lab 2-1: Configuring a Transit AS Route Selection Using Policy Controls Using Multihomed BGP Networks Employing AS-Path Filters Filtering with Prefix-Lists Using Outbound Route Filtering Applying Route-Maps as BGP Filters Implementing Changes in BGP Policy Lab 3-1: Using Multihomed BGP Networks Lab 3-2: Employing AS-Path Filters Lab 3-3: Filtering with Prefix-Lists Lab 3-4: Implementing Changes in BGP Policy Route Selection Using Attributes Influencing BGP Route Selection with Weights Setting BGP Local Preference Using AS-Path Prepending Understanding BGP Multi-Exit Discriminators Addressing BGP Communities Lab 4-1: Influencing BGP Route Selection with Weights Lab 4-2: Setting BGP Local Preference Lab 4-3: Understanding BGP Multi-Exit Discriminators Lab 4-4: Addressing BGP Communities Customer-to-Provider Connectivity with BGP Understanding Customer-to-Provider Connectivity Requirements Implementing Customer Connectivity Using Static Routing Connecting a Multihomed Customer to a Single Service Provider Connecting a Multihomed Customer to Multiple Service Providers Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks Introducing Route Reflectors Designing Networks with Route Reflectors Configuring and Monitoring Route Reflectors Introducing Confederations Configuring and Monitoring Confederations Lab 6-1: Introducing Route Reflectors Lab 6-2: Configuring and Monitoring Confederations Optimizing BGP Scalability Improving BGP Convergence Limiting the Number of Prefixes Received from a BGP Neighbor Implementing BGP Peer Groups Using BGP Route Dampening Lab 7-1: Limiting the Number of Prefixes Received from a BGP Neighbor Lab 7-2: Implementing BGP Peer Groups Lab 7-3: Using BGP Route Dampening Additional course details: Nexus Humans Cisco Configuring BGP on Cisco Routers v4.0 (BGP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring BGP on Cisco Routers v4.0 (BGP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring BGP on Cisco Routers v4.0 (BGP)
Delivered OnlineFlexible Dates
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Install, Configure, Manage [v8.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the vRealize Automation architecture and use cases in cloud environments Manage vRealize Automation entities on VMware and third-party virtual and cloud infrastructures Configure and manage Cloud Accounts, Projects, Flavor Mappings, Image Mappings, Network Profiles, Storage Profiles, Volumes, Tags, and Services Create, modify, manage, and deploy Cloud Templates Connect to a Kubernetes Cluster and manage namespaces Customize services and virtual machines with cloudConfig Configure and manage the Service Broker Configure and manage ABX actions, custom properties, event broker subscriptions, and vRealize Orchestrator workflows Integrate with vRealize Orchestrator Install vRealize Automation with Lifecycle Configuration Manager Describe Cloud Automation Services (Cloud Assembly and Code Stream). Integrate Cloud Assembly with Terraform and SaltStack Use logs and CLI commands to monitor and troubleshoot vRealize Automation During this five-day course, you focus on installing, configuring, and managing VMware vRealize© Automation?. You learn about how vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how to manage both on-premise systems and cloud services. The course covers how vRealize Automation Service Broker can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing vRealize Automation with other systems using VMware vRealize© Orchestrator? and how to use vRealize Automation to manage Kubernetes systems and leverage other systems. The course also covers integrating with Terraform and using SaltStack as a configuration management tool. Course Introduction Introductions and course logistics Course objectives vRealize Automation Overview and Architecture Describe the purpose and functionality of vRealize Automation Describe the vRealize Automation architecture Describe the use of VMware Workspace ONE© AccessTM Describe the relationship between Kubernetes clusters, containers, and vRealize Automation services Describe CLI commands for vRealize Automation 8 cluster management Describe Cloud Assembly Describe Service Broker Describe Code Stream Installing vRealize Automation List the different vRealize Automation deployment types Describe the purpose of vRealize easy installer Describe the vRealize Automation installation process Authentication and Authorization Identity the steps involved in integrating Workspace One with Active Directory Describe features of Workspace One Describe the user roles available in vRealize Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Quickly create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping. VMware Cloud Templates Configure and deploy a basic cloud template Create cloud templates that can run on any cloud Use cloudConfig to run commands, install software, and create users Use YAML for inputs, variables, and conditional deployments Tags and Storage Configuration Configure tags Describe different types of tags Manage tags Configure storage profiles Use tags and storage profiles Integrating NSX-T Data Center List the capabilities and use cases of NSX-T Data Center Describe the NSX-T Data Center architecture and components Integrate NSX-T Data Center with vRealize Automation List the supported network profiles in vRealize Automation Use NSX-T Data Center components to design a multitier application Cloud Template Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX-T day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation accounts Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Using Service Broker for Catalog Management Release a VMware Cloud Template? Define content source and content sharing Define Service Broker policy enforcement Use custom forms for catalog items vRealize Automation Extensibility Describe Extensibility Use event topics Create a subscription Call a vRealize Orchestrator workflow Create ABX actions Using Code Stream Introduction to Code Stream The CI/CD process Integrate GitLab with Code Stream and Cloud Assembly Use Code Stream to install software Using Terraform Integrate Cloud Assembly with Terraform Use Terraform with a VMware Cloud Template Use Terraform with Code Stream Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Integrate VMware Tanzu? Grid Integrated Edition Create a Supervisor Namespace as a catalog item Using SaltStack for Configuration Management Introduction SaltStack with vRealize Automation Use SaltStack for software deployment Use SaltStack for configuration management Use SaltStack with event-driven orchestration vRealize Automation Troubleshooting and Integration Location of logs Using Activity Monitoring deployment history Basic troubleshooting CLI commands Collecting logs (VAMI console) Integration with VMware vRealize© Log Insight? Integration with vRealize Operations Migrating vRealize Automation 7.x to 8

VMware vRealize Automation: Install, Configure, Manage [v8.3]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere with Tanzu: Deploy and Manage [V7]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes Overview By the end of the course, you should be able to meet the following objectives: Describe vSphere with Kubernetes and use cases in on-premises environments Deploy vSphere with Kubernetes Describe the VMware NSX networking requirements for vSphere with Kubernetes. Create and manage vSphere with Kubernetes namespaces Deploy and run container applications on vSphere with Kubernetes Deploy and configure VMware Harbor Describe the VMware Tanzu™ Kubernetes Grid™ service Deploy a Tanzu Kubernetes Grid cluster Deploy and run container applications on a Tanzu Kubernetes Grid cluster Describe the vSphere with Kubernetes lifecycle Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes During this 3-day course, you focus on deploying and managing VMware vSphere© with Kubernetes. You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a VMware vSphere© environment. Course Introduction Introductions and course logistics Course objectives Introduction to Containers and Kubernetes Describe Virtual Machines and Containers Describe Container Hosts Describe Container Engines Describe Dockerfile Describe Container Images Describe Image Registry Describe the purpose and functionality of Kubernetes Describe Manifest YAML files Explain Pod YAML files Explain ReplicaSets Explain Services Explain Deployments Introduction to vSphere with Kubernetes Describe the purpose and functionality of vSphere with Kubernetes Explain the integration with VMware Tanzu? Mission Control? Describe the capabilities of vSphere with Kubernetes Describe the components of vSphere with Kubernetes Contrast vSphere with Kubernetes to traditional Kubernetes Describe the requirements for vSphere with Kubernetes Prepare a vSphere cluster for vSphere with Kubernetes Describe the NSX components required for vSphere with Kubernetes Describe the network topology of vSphere with Kubernetes Explain the networking requirements of vSphere with Kubernetes Compare NSX networking objects with Kubernetes networking objects vSphere with Kubernetes Core Services Explain the architecture of the vSphere with Kubernetes Core Services Describe the Container Service Describe the Volume Service Describe the Network Service Describe the Registry Service Describe the use cases of vSphere with Kubernetes Enable vSphere with Kubernetes Deploy VMware Harbor Registry vSphere with Kubernetes Namespaces Describe a vSphere with Kubernetes namespace Contrast a vSphere with Kubernetes namespace to a traditional Kubernetes namespace Describe Resource Quotas Explain Authentication and Authorization to vSphere with Kubernetes Explain the use cases of namespaces Create a namespace Describe kubectl Use kubectl to interact with vSphere with Kubernetes Describe using kubectl pod deployment Explain scaling a pod deployment Explain managing pod lifecycle Explain deleting pods Use kubectl to deploy a pod Use kubectl to scale a pod Use kubectl to switch between namespaces VMware Tanzu Kubernetes Grid service Explain Tanzu Kubernetes Grid service Describe the use cases for Tanzu Kubernetes Grid clusters Describe the integration with Tanzu Mission Control Explain the lifecycle of Tanzu Kubernetes Grid clusters Deploy Tanzu Kubernetes Grid cluster Deploy pods to a Tanzu Kubernetes Grid cluster Monitoring and Troubleshooting Describe the monitoring tools for vSphere with Kubernetes Describe the troubleshooting tools for vSphere with Kubernetes Explain cluster, node, and namespace health Explain usage and capacity monitoring Describe vCenter Server events Describe vSphere with Kubernetes events Gather support information vSphere with Kubernetes Lifecycle Describe the vSphere with Kubernetes lifecycle Describe the Tanzu Kubernetes Grid lifecycle Describe scaling a vSphere with Kubernetes cluster Update vSphere with Kubernetes Update Tanzu Kubernetes Grid clusters Remove vSphere with Kubernetes Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere with Tanzu: Deploy and Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere with Tanzu: Deploy and Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere with Tanzu: Deploy and Manage [V7]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Aria Automation: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Aria Automation architecture and use cases in cloud environments Describe the key services of VMware Cloud Automation Services™ Manage VMware Aria Automation entities on VMware and third-party virtual and cloud infrastructures Install VMware Aria Automation with VMware Aria Suite Lifecycle Configure and manage cloud accounts, projects, flavor mappings, image mappings, network profiles, storage profiles, volumes, tags, and services Create, modify, manage, and deploy VMware Aria Automation Templates Customize services and virtual machines with cloudConfig and cloudbase-init Configure and manage VMware Aria Automation Consumption Configure and manage ABX actions, custom properties, event broker subscriptions, and VMware Aria Automation Orchestrator workflows Connect to a Kubernetes cluster and manage namespaces Use VMware Aria Automation Config to configure and deploy systems Use logs and CLI commands to monitor and troubleshoot VMware Aria Automation During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10? on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware Aria Automation Consumption? can aggregate content in native formats from multiple clouds and platforms into a common catalog.This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config? as a configuration management tool. Course Introduction Introductions and course logistics Course objectives VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Workspace ONE Access? Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process Authentication and Authorization Identify the steps to integrating Workspace ONE© Access with Active Directory Describe the features of Workspace ONE Access Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments Tags Configure tags Describe functions of tags Manage tags Storage Configuration Configure storage profiles Use tags and storage profiles Integrating NSX With VMware Aria Automation List the capabilities and use cases of VMware NSX© Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation? accounts Integrate VMware Cloud Director? account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Integrate VMware Cloud on AWS cloud account Using VMware Aria Automation Consumption Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Create a VMware Aria Automation template with Kubernetes components Using VMware Aria Automation Config for Configuration Management Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration VMware Aria Automation Troubleshooting and Integration Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware Aria Operations for Logs Describe integration with VMware Aria Operations

VMware Aria Automation: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry