• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

515 Administration courses in London delivered Live Online

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Certificate in Business and Commercial Law (CBCL)

By EMG Associates UK Limited

Certificate in Business and Commercial Law (CBCL) Why Attend This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations. It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization.  Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to specific commercial situations through consideration of relevant case law Negotiate commercial contracts complying with commercial and legal requirements Increase profitability within their organization by selecting appropriate methods of distribution of goods Recognize and analyze how intellectual property rights affect their organization Evaluate and modify organizational employment practices complying with labor law requirements Target Audience This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly benefit directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also find this course highly beneficial. Target Competencies Drafting Contracts Contract Negotiation Understanding Commercial Terms Understanding Employment Law Implementing Organizational Employment Practices Understanding Intellectual Property Understanding corporate restructuring Understanding the effect of breach of commercial contract terms Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Overview of commercial & business law Areas of commercial and business law Types of commercial contracts Commercial contracts in the civil law and common law systems Sources of English law Civil law v Common law Civil law in the GCC Formalities for a binding contract Elements required for an enforceable contract Rules for contract interpretation implied terms v express terms identifying risks and how to minimise risks Structure of a commercial contract Preliminary documents in international transactions Memorandum of Understanding/ Heads of Terms. Are they legally binding? Commercial implications Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! Force majeure v Frustration Notices Set off No waiver Entire Agreement/ non- reliance clause Times is of the essence Assignment v Novation Governing law Common mistakes in choice of law Jurisdiction clause Exclusive v Non-exclusive Factors in deciding the jurisdiction clause International dispute resolution Litigation Importance of Alternative Dispute Resolution (ADR) Arbitration Mediations Conciliation Negotiation Remedies for breach of contract Damages Specific performance Injunctions Advantages and disadvantages of different business forms Types of business vehicles Sole trader Partnerships Limited Liability Partnerships Companies Cross Border Transactions Distributorship Agency Joint Venture Acquisitions Share purchase v Business purchase Apportioning risks and liabilities through warranties and indemnities Negotiating warranties and indemnities Corporate insolvency Tests identifying insolvency Consequence for directors who fail to react to insolvency Types of insolvency Administration Receivership Creditor Voluntary Liquidation Compulsory Liquidation Commercial Tort Tort of negligence Defamation Libel Slander Recent case law on defamation Managing risk Prevention is better than cure: Effective risk management Intellectual Property Rights management Types of Intellectual Property copyright trademark patent design rights confidential information Assignment v Granting a license The law of passing off Intellectual Property in the GCC Employment law issues in the common law systems and the GCC Types of employment contracts Grounds for dismissal Wrongful dismissal Redundancy Unfair dismissal Commercial real estate in the GCC Leasehold Freehold

Certificate in Business and Commercial Law (CBCL)
Delivered OnlineFlexible Dates
£4,212

WE761 IBM Administration of IBM DataPower Gateway V7.6

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary

WE761 IBM Administration of IBM DataPower Gateway V7.6
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to MongoDB for DBAs (TTDB4680)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced DBAs who will be working with MongoDB. In order to gain the most from this course you should have: Prior practical experience in Database Administration Experience working with Linux and be comfortable working with command line Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will explore: The MongoDB Basic Architecture and Installation MongoDB administration User Management MongoDB security Indexes Backup & Recovery High Availability / Replication Diagnostics & Troubleshooting MongoDB is fast becoming the database of choice for big data applications, being one of the most popular and widely implemented NoSQL databases. Its scalability, robustness, and flexibility have made it extremely popular among business enterprises who use it to implement a variety of activities including social communications, analytics, content management, archiving and other activities. This has led to an increased demand for MongoDB administrators who have the skills to handle cross functional duties. Geared for experienced DBAs, MongoDB for DBAs is a three-day hands-on course that explores the concepts, architecture and pitfalls of managing a MongoDB installation. This course is targeted to the DBA who is familiar with the concepts and tasks of working with a Relational database and is not responsible for a NoSQL MongoDB database. You will learn the critical aspects of MongoDB and use it to solve data management challenges. You will learn to manage MongoDB effectively by gaining expertise in MongoDB administration tools, syntax, MongoDB installations, configurations, security, troubleshooting, backup, scaling and many other features. The focus of this course is on practical skills and applying the DBA existing database knowledge to a MongoDB installation. Introduction to MongoDB Basic Architecture and Installation Differentiate database categories Learn MongoDB design goals List MongoDB tools Describe JSON and BSON Understanding the basic concepts of a Database Database categories: What is NoSQL? Why NoSQL? Benefit over RDBMS Types of NoSQL Database, and NoSQL vs. SQL Comparison, ACID & Base Property CAP Theorem, implementing NoSQL and what is MongoDB? Graph Database Overview of MongoDB, Design Goals for MongoDB Server and Database, MongoDB tools Understanding the following: Collection, Documents and Key/Values, etc., Introduction to JSON and BSON documents Environment setup (live Handson) and using various MongoDB tools available in the MongoDB Package MongoDB Administration Take database backup and restore MongoDB© Export and import data from/ to a MongoDB© instance Check server status and DB status Monitor various resource utilization of a mongod instance Understand various optimization strategies Administration concepts in MongoDB Monitoring issues related to Database Monitoring at Server, Database, Collection level, and various Monitoring tools related to MongoDB Database Profiling, Locks, Memory Usage, No of connections, page fault etc., Backup and Recovery Methods for MongoDB Export and Import of Data to and from MongoDB Run time configuration of MongoDB Production notes/ best practices Data Managements in MongoDB (Capped Collections/ Expired data from TTL), TTL Collection Features GridFS Memory-Mapped Files Journaling Mechanics Storage Engines Power of 2-Sized Allocations No Padding Allocation Strategy Diagnosing Performance Issues Optimization Strategies for MongoDB Configure Tag Sets for Replica Set. Optimize Query Performance Monitoring Strategies for MongoDB . MongoDB Utilities MongoDB Commands MongoDB Management Service (MMS) Data Backup Strategies in MongoDB Copying Underlying Data Files Backup with MongoDump Fsync and Lock MongoDB Ops Manager Backup Software Security Strategies in MongoDB Authentication Implementation in MongoDB . Authentication in a Replica set Authentication on Sharded Clusters Authorization End-to-End Auditing for Compliance User Management Create a User Administrator. Add a User to a Database. Create/Assign User a Role. Verify/Modify a User Access/Privileges. Change a User?s Password MongoDB Security Knowing security concepts in MongoDB Understand how Authentication and Authorisation works Security Introduction Security Concepts Indexes Index Introduction, Index Concepts, Index Types Index Properties Index Creation and Indexing Reference Introduction to Aggregation Aggregation Approach to Aggregation sort Order Pipeline Operators and Indexes Text Indexes Aggregate Pipeline Stages Text Search MapReduce Index Creation Aggregation Operations Index Creation on Replica Set Remove, Modify, and Rebuild Indexes Listing Indexes Measure Index Use Control Index Use Index Use Reporting Geospatial Indexes MongoDB?s Geospatial Query Operators GeoWith Operator Backup & Recovery Import and Export MongoDB Data Restore and recovery of MongoDB(Including point in time Recovery) Restore a Replica Set from MongoDB Backups Recover Data after an Unexpected Shutdown Backup and Restore with Filesystem Snapshots Back Up and Restore with MongoDB Tools Backup and Restore Sharded Clusters High Availability (Replication ) Understand the concept of Replication in MongoDB© ? Create a production like Replica Set Introduction to Replication (High Availability), Concepts around Replication What is Replica Set and Master Slave Replication? Type of Replication in MongoDB How to setup a replicated cluster & managing replica sets etc., Master-Slave Replication Replica Set in MongoDB Automatic Failover Replica Set Members Write Concern Write Concern Levels Write Concern for a Replica Set Modify Default Write Concern Read Preference Read Preference Modes Blocking for Replication Tag Set Configure Tag Sets for Replica set. Replica Set Deployment Strategies . Replica Set Deployment Patterns Oplog File Replication State and Local Database, Replication Administration Diagnostics & Troubleshooting Troubleshoot slow queries Diagnose connectivity problems Understand diagnostic tools Learn common production issues Learn fixes and solutions. Additional course details: Nexus Humans Introduction to MongoDB for DBAs (TTDB4680) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to MongoDB for DBAs (TTDB4680) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to MongoDB for DBAs (TTDB4680)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course  Exploration and production technology, equipment specification and processes have a unique language that must be conquered by executives such as you. A confident understanding of the technical jargon and a visual appreciation of the various pieces of equipment used provides for an overall 'big picture' of industry value chain. This serves as an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. Gain a comprehensive overview of the entire value chain and process of oil & gas upstream operations and business in this 3 full-day training course. Training Objectives By attending this industry fundamentals training course, participants will be better able to: Appreciate the dynamics of world energy demand & supply and its impact on pricing Understand the formation of petroleum reservoirs and basic geological considerations Examine the exploration process to gain an overview of the technical processes involved Gain a comprehensive overview of drilling activities - from pre-drilling preparation, through to well drilling, well evaluations and post drilling activities Get familiarised with the common production methods and the different stages of its processes Integrate your understanding of asset maintenance and downstream supply chain activities Better visualise through video presentations the various exploration equipment/ technologies and understand the major cost components Target Audience This course will be useful and applicable, but not limited to: Accounting Administration Business Development Commercial Construction E & P IT / Data Finance Finance & Treasury Health & Safety Human Resource Joint Venture Co-ordinators Legal Logistics Materials Planning Procurement Sales & Marketing Senior Management Sourcing Strategic Planning Supply Chain Tender Contract Course Level Basic or Foundation Training Methods Multi-media presentation methodology to enable better understanding and appreciation technical jargon and equipment applied in the field A pre-course questionnaire to help us focus on your key learning objectives Detailed reference manual for continuous learning and sharing Limited class size to ensure one to one interactivity Trainer Your expert course leader worked for BP for 28 years as a Research Associate and Team Leader, working on Feasibility Studies and acting as a trouble shooter covering all aspects of BPs businesses. These covered field Development Project in the North Sea and several novel resource recovery techniques which were taken from Concept to Field Pilot trials in Canada. His specific work in the offshore area covered Subsea Robotics / Automation, Seabed Production Concepts, Seabed Excavation Methods, Underwater Repair Techniques, Flexible Riser Studies and Maintenance Cost Reductions. After leaving BP in 1992, he continued working in the offshore oil industry through Azur Offshore Ltd, including activities in the assessment of Emerging and Novel Technologies, Technical and Economic Audits, Studies, Production Sharing Agreement Evaluations, Safety and Environmental issues. Clients have included Chevron UK, BP Exploration, British Gas, Technomare, Trident Consultants, Fina UK and Cameron France. He is a regular University lecturer at Crandfield School of Industrial Sciences (UK) and is a course Group Project external examiner for Crandfield. He also lectures on offshore oil industry activities at ENSIETA (France), the Technical University of Delft (Holland) and the Northern Territories University in Darwin (Australia). He is an active member of the UK Society for Underwater Technology (SUT) and serves on their Subsea Engineering and Operations Committee. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas
Delivered in Internationally or OnlineFlexible Dates
£2,149 to £2,499

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)
Delivered OnlineFlexible Dates
Price on Enquiry

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

Linux Professional Institute Certification (LPIC-1) 102

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-1) 102 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: customize shell environments to meet users' needs customize existing scripts or write simple new Bash scripts install and configure X11 add, remove, suspend and change user accounts use cron and systemd timers to run jobs at regular intervals and to use at to run jobs at a specific time localize a system in a different language than English properly maintain the system time and synchronize the clock via NTP manage print queues and user print jobs using CUPS and the LPD compatibility interface manage the persistent network configuration of a Linux host configure DNS on a client host review system configuration to ensure host security in accordance with local security policies know how to set up a basic level of host security use public key techniques to secure data and communication. This course prepares students to take the 102 exam of the LPI level 1 certification. Shells and Shell Scripting Customize and use the shell environment Customize or write simple scripts User Interfaces and Desktops Install and configure X11 Graphical Desktops Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Persistent network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-1) 102 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-1) 102 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC-1) 102
Delivered OnlineFlexible Dates
Price on Enquiry

4G & 5G Roaming Scenarios & Procedures

5.0(3)

By Systems & Network Training

4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control

4G & 5G Roaming Scenarios & Procedures
Delivered in Internationally or OnlineFlexible Dates
£2,367

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry