Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke cloud security environment. Describe the function of the Cloud Management Extension Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in Azure. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in Azure. Describe the workflow for configuring scaling solutions in Azure. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in Azure. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in Azure. Explain the steps required for troubleshooting Scaling Solution issues in Azure. Describe the steps required for troubleshooting clusters in Azure. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Deploy a Security Management Server. Connect to SmartConsole. Configure Azure Active Directory and the Service Principle. Install the Cloud Management Extension. Configure the Cloud Management Extension. Configure the Access Control Policy. Assign the Service Principle. Create the CloudGuard Controller Object. Configure Access Control Policy with a Data Center Object. Deploy the Spoke vNets. Create the Spoke Route Table. Deploy Web Servers into the Spoke vNets. Deploy the Virtual Machine Scale Set. Assign the Service Principle to the VMSS Resource Group. Enable Indentity Awareness on the VMSS. Create Load Balancer Rules. Create vNet Peers. Create Web Server Access Control policy. Deploy the Azure High Availability Solution. Create the Cluster Object. Configure the vNet Peering. Create the Internal User Defined Routes. Create the Security Policy for Internal Traffic. Test the Internal Traffic. Troubleshoot the CloudGuard Controller. Debugs the CloudGuard Controller. Debug the Cloud Management Extension. Additional course details: Nexus Humans CNSE-Azure Check Point Network Security Expert for Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-Azure Check Point Network Security Expert for Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime
Duration 5 Days 30 CPD hours This course is intended for Experienced Programmers and Systems Administrators. Overview Throughout the course students will be led through a series of progressively advanced topics, where each topic consists of lecture, group discussion, comprehensive hands-on lab exercises, and lab review. This course is ?skills-centric?, designed to train attendees in core Python and web development skills beyond an intermediate level, coupling the most current, effective techniques with best practices. Working within in an engaging, hands-on learning environment, guided by our expert Python practitioner, students will learn to: ? Create working Python scripts following best practices ? Use python data types appropriately ? Read and write files with both text and binary data ? Search and replace text with regular expressions ? Get familiar with the standard library and its work-saving modules ? Use lesser-known but powerful Python data types ? Create 'real-world', professional Python applications ? Work with dates, times, and calendars ? Know when to use collections such as lists, dictionaries, and sets ? Understand Pythonic features such as comprehensions and iterators ? Write robust code using exception handling An introductory and beyond-level practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features. An Overview of Python What is python? 1 -- An overview of Python What is python? Python Timeline Advantages/Disadvantages of Python Getting help with pydoc The Python Environment Starting Python Using the interpreter Running a Python script Python scripts on Unix/Windows Editors and IDEs Getting Started Using variables Built-in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control White space Conditional expressions Relational and Boolean operators While loops Alternate loop exits Sequences About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Generator Expressions Nested sequences Working with files File overview Opening a text file Reading a text file Writing to a text file Reading and writing raw (binary) data Converting binary data with struct Dictionaries and Sets About dictionaries Creating dictionaries Iterating through a dictionary About sets Creating sets Working with sets Functions Defining functions Parameters Global and local scope Nested functions Returning values Sorting The sorted() function Alternate keys Lambda functions Sorting collections Using operator.itemgetter() Reverse sorting Errors and Exception Handling Syntax errors Exceptions Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages The import statement Module search path Creating Modules Using packages Function and Module aliases Classes About o-o programming Defining classes Constructors Methods Instance data Properties Class methods and data Regular Expressions RE syntax overview RE Objects Searching and matching Compilation flags Groups and special groups Replacing text Splitting strings The standard library The sys module Launching external programs Math functions Random numbers The string module Reading CSV data Dates and times Working with dates and times Translating timestamps Parsing dates from text Formatting dates Calendar data Working with the file system Paths, directories, and filenames Checking for existence Permissions and other file attributes Walking directory trees Creating filters with fileinput Using shutil for file operations 17 ? Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Advanced data handling Defaultdict and Counter Prettyprinting data structures Compressed archives (zip, gzip, tar, etc.) Persistent data Network services Grabbing web content Sending email Using SSH for remote access Using FTP Writing real-life applications Parsing command-line options Detecting the current platform Trapping signals Implementing logging Python Timeline Advantages/Disadvantages of Python Getting help with pydoc
Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client⢠to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority⢠to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi⢠host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms
Duration 3 Days 18 CPD hours This course is intended for This class is ideal for integration specialists or Salesforce Administrators who want to learn more about connecting and securing data in Tableau CRM. This course is also great for business analysts or developers interested in creating advanced dashboards. Overview When you complete this course, you will be able to: Determine your user, data, and security requirements, and establish a development process. Set up apps and control what users can do in Tableau CRM by assigning them licenses, permission sets, and app permissions. Load external data to Tableau CRM. Create and run dataflows to load Salesforce data, and join it with data from other datasets. Understand and use Data Sync effectively. Understand Recipes and Data Prep. Understand and implement data security in Tableau CRM, and override security for implementation and testing. Understand how filters on dashboards function and be able to use interactions when necessary. Understand a dashboard's JSON file. Explain the process of dashboard queries and modify a query to meet specific analytic requirements. Modify dataset metadata. Take your Tableau CRM skills to the next level. In this 3-day, expert-led class, you?ll learn how to develop and implement a Tableau CRM environment that contains both Salesforce and non-Salesforce data. Our team of experts will walk you through Tableau CRM features and settings, user setup, how to load and transform data, data security, and how to modify queries to customize dashboards so you can work more efficiently, spot trends, and predict outcomes faster. Discovery and Planning Discovery Meeting Establishing Your Users and Development Process Set Up Users and Apps Overview of User Access on the Tableau CRM Platform Creating Tableau CRM Permission Sets Assigning Licenses and Permission Sets to Users Creating and Sharing Tableau CRM Apps Connect Data Overview of Connecting Data Data Mapping Overview of the Dataflow Process Designing a Dataflow Loading External CSV Data Creating Dataflows Optimizing Dataflows Running, Monitoring, and Scheduling a Dataflow Preparing Datasets with Recipes with Data Prep Data Connectors Additional Transformations Data Security Overview of Security in Tableau CRM Determining Security Requirements Overview of Using Predicate Filters Implementing Ownership-Based Row-Level Security Implementing Role-Based Row-Level Security Implementing Team-Based Row-Level Security Overriding Security for Implementation and Testing Sharing Inheritance Extended Metadata in a Dataset Overview of Extended Metadata (XMD) Updating Field Metadata Adding Quick Action Menus for Records in Tableau CRM Dashboard Templates and Mobile Dashboards Overview of Tableau CRM Dashboard Templates Overview of JSON for Dashboards Building a Dashboard Using a Template Optimizing Dashboards for a Mobile Device Bindings in Dashboards Understanding Filters in Lenses and Dashboards Multi-Dataset Dashboards Filters with Interactions Custom Queries Query Modification Overview of Modifying Queries Maximizing the Use of the Compare Table Salesforce Analytics Query Language (SAQL) SAQL Queries in a Tableau CRM Dashboard Additional course details: Nexus Humans Salesforce Implement and Manage Tableau CRM (ANC301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Implement and Manage Tableau CRM (ANC301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators System engineer Overview By the end of the course, you should be able to meet the following objectives: Configure and manage complex storage solutions in a vSphere environment (including NFS, iSCSI, and so on) Configure and manage complex, scalable vSphere networking operations (vSphere Standard Switch and Distributed Switches) Deploy, manage, and optimize virtual machines (advanced configuration, content library, latency-sensitive workloads, and more) Manage business continuity and operations in your vSphere environment (VMware vCenter Server Appliance⢠file-based backup, VMware vCenter Server profiles, host profiles, and so on) Plan and implement increased vSphere security (use a Key Provider, VM Encryption, CPU scheduler remediations, and so on) Troubleshoot the vSphere environment Use VMware vSphere Lifecycle Manager⢠to upgrade to VMware ESXi⢠hosts and virtual machines (VUM, image-based clusters, and so on) Implement vSphere cluster solutions (Cluster QuickStart wizard, VMware vSphere Distributed Resource Schedulerâ¢, VMware vSphere High Availability, VMware vSANâ¢, and so on) Implement resource optimizations to streamline vSphere deployments Create an advanced configuration of vCenter Server (including an identity source) This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere© 7 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure. Approximately 90% of the class is application-focused and taught through labs. The course aligns fully with the VMware Certified Advanced Professional ? Data Center Virtualization Deploy exam objectives. Course Introduction Introductions and course logistics Course objectives Introduction to fictitious company: VMBeans Configure and Manage Your vSphere Environment Perform various vCenter Server configurations Configure an external identity source Configure virtual networking with advanced options Configure and manage advanced storage configurations Configure vSphere clusters (also using Cluster QuickStart) Management and Operations in Your Data Center Collect vSphere log files Configure vCenter Server file-based backup Working with vCenter Server profiles Configure and manage advanced cluster settings Create and configure advanced host options Create and manage host profiles Manage and remediate clusters using vSphere Lifecycle Manager Create and configure a Content Library Update a managed virtual machine template Configure a central VMware ToolsTM installation repository Manage vSphere roles and permissions Troubleshoot Your Data Center Environment Troubleshoot vSphere configuration issues Troubleshoot resource pool configuration issues Troubleshoot network and storage issues Troubleshoot ESXi host issues Troubleshoot vCenter Server resource issues Increasing Security in Your Data Center Create and manage a Key Management solution Create an encrypted virtual machine Configure CPU scheduler options to achieve security remediations Performance and Optimization in Your Data Center Manage advanced virtual machine configurations Identify and implement vSphere resource optimization opportunities Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Advanced Administration Workshop [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Advanced Administration Workshop [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.