Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway⢠platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist⢠In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify
Duration 3 Days 18 CPD hours This course is designed for Architects, and System Administrators interested in gathering a deeper understanding on how Hyperledger Fabric Networks are Architected and operated throughout. You will learn about the integral base files in which Fabric are built upon. You will learn about how identity, and permissions are administered throughout Membership Only networks. Additionally, you will gather the experience necessary to enter into and manage nodes/peer needs (i.e. chaincode installation, securing communication, etc).
Duration 5 Days 30 CPD hours This course is intended for Network EngineersSystems EngineersNetwork OperatorsNetwork Administrators Overview Upon completion of this course, students will be able to:Successfully configure and deploy ClearPass for policy management, AAA, network access control and reporting.Using the ClearPass GUI, you should become familiar with how to setup authentication services, add users and devices and perform administration tasks. The ClearPass Essentials course provides you with a foundation in Network Access Control using ClearPass product portfolio. This course covers in depth configuration of ClearPass policy manager with a focus on Enforcement and Device Profiling. Intro to ClearPassClearPass for AAAExternal AuthenticationGuestOnboardEndpoint AnalysisPostureOperations & Admin UsersClustering & RedundancyLicensingClearPass ExchangeFinal Case Study
Duration 1 Days 6 CPD hours In this hands on workshop for Agile Scrum Masters, Release Train Engineers and anyone serving as Jira Administrators, Jira experts will lead you through advanced configuration and customization settings in Jira, from installation through to customized screens, workflows, filters and reports. Jira Administration Adding and managing Users Administering and managing Groups Global Jira Settings Jira layout and interface customization User authentication and security Jira Customization Customization of screens and fields Customization of workflows Project and Board Administration Configuring and managing Projects Configuring and managing Boards Creating and managing Filters JQL Jira Integration Integrating Jira with Atlassian Tools Retrospectives and Documentation in Confluence Code management with Bitbucket Integration management with Bamboo Building a Dashboard with gadgets Jira Plug-ins and Marketplace
Duration 5 Days 30 CPD hours This course is intended for This advanced course is for: AIX technical support personnel Performance benchmarking personnel AIX system administrators Overview Define performance terminology Describe the methodology for tuning a system Identify the set of basic AIX tools to monitor, analyze, and tune a system Use AIX tools to determine common bottlenecks in the Central Processing Unit (CPU), Virtual Memory Manager (VMM), Logical Volume Manager (LVM), internal disk Input/Output (I/O), and network subsystems Use AIX tools to demonstrate techniques to tune the subsystems In this course, students will develop the skills to measure, analyze, and tune common performance issues on IBM Power Systems running AIX. Day 1 Performance analysis and tuning overview Data collection Monitoring, analyzing, and tuning CPU usage Day 2 Virtual memory performance monitoring and tuning Day 3 Physical and logical volume performance File system performance monitoring and tuning Day 4 File system performance monitoring and tuning Network performance Day 5 NFS performance Performance management methodology
Duration 5 Days 30 CPD hours This course is intended for Motivations: Quickly learn the foundations of containerization and orchestration with Docker Swarm, and become familiar with all the features of Docker Enterprise. Roles: System Operators & Administrators Overview This course combines all topics of CN100 , CN110 , CN210 In this intense cloud native bootcamp, you?ll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible. In this intense cloud native bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MySQL or Postgres DB workloads to Azure SQL DB. The secondary audience for this course is MySQL/Postgres administrators to raise awareness of the features and benefits of Azure SQL DB. Overview At the end of this course, the students will have learned: Migrate on-premises MySQL to Azure SQL DB for MySQL Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL This course will enable the students to understand Azure SQL Database, and educate the students on what is required to migrate MySQL and PostgreSQL workloads to Azure SQL Database. Migrate to Azure SQL DB for MySQL & PostgreSQL OSS databases overview Common OSS database workloads Customer challenges in migration Migrate on-premises MySQL to Azure SQL DB for MySQL Configure and Manage Azure SQL DB for MySQL Migrate on-premises MySQL to SQL DB for MySQL Application Migration Post-migration considerations Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL Configure and Manage Azure SQL DB for PostgreSQL Migrate on-premises MySQL to SQL DB for PostgreSQL Application Migration Post-migration considerations
Duration 3 Days 18 CPD hours This course is intended for Salesforce consultants and administrators Overview When you complete this course, you will be able to:Enable Field Service Lightning.Describe the capabilities and components of Field Service Lightning.Know the right questions to ask prior to implementing Field Service Lightning.Understand the steps to successfully implement Field Service Lightning In this hands-on course, you will learn about Field Service Lightning components and even have the opportunity to implement Field Service Lightning for AW Computing, our fictitious company. What is Field Service Lightning? Define Field Service Lightning Identify the challenges of field service management and how FSL can overcome those challenges Describe what connected field service looks like Explain the main components and capabilities of FSL Meet AW Computing Learn about AW Computing Understand the business reason why AW Computing has purchased FSL Plan for Field Service Lightning Learn the essential questions to ask before setting up FSL Consider FSL limitations Set Up Field Service Lightning (Long Module) Set up FSL Components and Managed Package Walk Through the FSL Process by Role View and perform FSL actions as a Service Agent View and perform FSL actions as a Dispatcher View and perform FSL actions as a Field Resource View and run FSL reports as a Supervisor / Manager
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps