Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those who provide site collection and site administration and are power users or IT professionals who are tasked with supporting or working within the SharePoint 2016 environment on premise and/or in Office 365. Overview After completing this course, students will be able to: - Design and implement a company portal structure using SharePoint 2016 objects including sites, libraries, lists and pages - Explain the role of security and permissions throughout SharePoint 2016 - Implement guidelines for consistency in building a company portal to aid in the day-to-day administration of content in SharePoint 2016 - Enhance the design and content of a company portal using SharePoint 2016 pages and web parts - Explain the importance of governance for the planning and managing future growth of the - SharePoint 2016 implementation - Identify options to integrate data from other systems such as Microsoft Office, as well as preserve existing data - Explain the role of social networking in SharePoint 2016 and its impact on collaboration This course is intended for power users and IT professionals who are tasked with working within the SharePoint 2016 environment and conduct site collection and site administration. Getting Started with SharePoint 2016 Exploring SharePoint 2016 Site Collection and Site Administrator Roles Defining SharePoint Terminology Navigating a SharePoint Site Interacting with the Ribbon Creating and Editing Basic Content What is Metadata? Versions of SharePoint Standard Enterprise O365 Building a Site Collection with Apps The Structure of SharePoint Creating a Site What does a site template come with? Defining SharePoint Apps Customizing Lists and Libraries Creating/Managing Lists and Libraries through SharePoint Designer Explaining Views on Lists and Libraries Creating Views in Lists and Libraries Modifying Navigation Turning Site Features On/Off Reorganizing a Site using Site Content and Structure feature Lab 1: Creating a Structured Company Portal Lab 2: Creating a List Using SharePoint Designer (Optional) Creating Consistency across Sites Defining Site Columns Defining Content Types Implementing a Taxonomy Using Templates to Promote Consistency Lab 1: Creating Site Columns and Content Types Lab 2: Implementing a Taxonomy Lab 3: Configuring the Content Organizer SharePoint Permissions Explaining Permissions and Security in SharePoint Creating SharePoint Groups Managing Permissions within SharePoint Sharing versus Traditional Security Sharing as different permission levels Lab 1: Managing Permissions in SharePoint Working with Pages and Web Parts Changing the Appearance of the Portal Editing a Page wiki web part Working with Web Parts and App Parts App Parts Content Search Web Part Relevant Documents Content query Table of Contents Pictures Web Part Connections Filter web parts Web parts with Targeting Audience Lab 1: Adding and Configuring Web Parts Lab 2: Connecting Web Parts Lab 3: Applying Themes to Your Company Portal Document and Records Management Basic Content Approval Versioning Check In/Out Holds Retention Policy Document ID Content Organizer Compliance Policy Center Site Template EDiscovery Records Center Lab 1: Working with Advanced Document Management Features Lab 2: Leveraging Records Management to Preserve Data Workflow Alerts Out of the Box Workflow Activating Workflow Features Approval Workflow Creating a Workflow in SharePoint Designer Lab 1: Creating an Approval Workflow from SharePoint Lab 2: Creating a Custom Workflow in SharePoint Designer (Optional) Office Integration Outlook Calendar Contacts Excel Word PowerPoint OneDrive for Business OneNote Access Lab 1: Importing and Exporting Excel Data with SharePoint Lab 2: Linking Outlook and SharePoint Creating Publishing Sites Why use a publishing site? Publishing Pages Enabling Web Content Management Managing the Structure of Web Content Navigating a Site Using Managed Metadata Lab 1: Creating a Rich Publishing Sit Lab 2: Configuring a Publishing Approval Process Lab 3: Implementing a Managed Navigation Site Bridging the Social Gap My Sites Configuring Social Features in SharePoint Posts, Tags and Mentions Creating a Community Site Lab 1: Designing a Social Experience in SharePoint 2016 Lab 2: Creating a Community Site Finding Information Using Search Exploring the Search Features in SharePoint Configuring Search Settings Search Analytics Search Visibility Lab 1: Configuring an Advanced Search Center Planning a Company Portal Using SharePoint Defining SharePoint Governance Working with Information Architecture Implementing Site Hierarchies Discussing the Execution of Governance Site Collection Administrator Settings Exploring Settings for Site Collection Administrators Exploring Settings for Site Administrators Site Closure Policies Additional course details: Nexus Humans 55234 SharePoint 2016 Site Collections and Site Owner Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55234 SharePoint 2016 Site Collections and Site Owner Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs with basic Oracle 19c skills. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs andexercises. Working in a hands-on learning environment led by our expert facilitator, students will explore: Creating CDBs and Regular PDBs Managing CDBs and PDBs Backup and Duplicate Upgrading and Transporting CDBs and Regular PDBs Backup Strategies and Terminology Restore and Recovery Concepts Using Flashback Technologies Duplicating a Database Installing Grid Infrastructure and Oracle Database Patching Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Using General Overall Database Enhancements Monitoring and Tuning Database Performance Managing Application PDBs Managing Security in Multitenant databases Recovery and Flashback Configuring and Using RMAN Diagnosing Failures Performing Recovery Transporting Data RMAN Troubleshooting and Tuning Creating an Oracle Database by using DBCA Oracle Restart Upgrading the Oracle Database Installing Grid Infrastructure for a Standalone server Using Availability Enhancements Tuning SQL Statements Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases. Creating CDBs and Regular PDBs Configure and create a CDB Create a new PDB from the CDB seed Explore the structure of PDBs Manage CDBs and PDBs Manage PDB service names and connections Manage startup, shutdown and availability of CDBs and PDBs Change the different modes and settings of PDBs Evaluate the impact of parameter value changes Performance management in CDBs and PDBs Control CDB and PDB resource usage with the Oracle Resource Manager Backup and Duplicate Perform Backup and Recover CDBs and PDBs Duplicate an active PDB Duplicate a Database Upgrading and Transporting CDBs and Regular PDBs Upgrade an Oracle Database Transport Data Backup Strategies and Terminology Perform Full and Incremental Backups and Recoveries Compress and Encrypt RMAN Backups Use a media manager Create multi-section backups of exceptionally large files Create duplexed backup sets Create archival backups Backup of recovery files Backup non database files Back up ASM meta data Restore and Recovery Concepts Employ the best Oracle Database recovery technology for your failure situation Describe and use Recovery technology for Crash, Complete, and Point-in-time recovery Using Flashback Technologies Configure your Database to support Flashback Perform flashback operations Duplicating a Database Duplicate Databases Install Grid Infrastructure and Oracle Database Install Grid Infrastructure for a Standalone server Install Oracle Database software Patching Grid Infrastructure and Oracle Database Patch Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Upgrade Oracle Grid Infrastructure Using General Overall Database Enhancements Install Oracle Database software Create, Delete and Configure Databases using DBCA Creating CDBs and Regular PDBs Use Miscellaneous 19c New Features Monitoring and Tuning Database Performance Managing Memory Components Understanding the Automatic Workload Repository (AWR) Understanding the Advisory Framework Monitoring Wait Events, Sessions, and Services Managing Metric Thresholds and Alerts Understanding and Using the Performance Tuning Methodology Performing Performance Planning Understanding the Automatic Database Diagnostic Monitor (ADDM) Manage Application PDBs Explain the purpose of application root and application seed Define and create application PDBs Install, upgrade and Patch applications Create and administer Application PDBS Clone PDBs and Application containers Plug and unplug operations with PDBs and application containers Comparing Local Undo Mode and Shared Undo Mode Manage Security in Multitenant databases Manage Security in Multitenant databases Manage PDB lockdown profiles Audit Users in CDBs and PDBs Manage other types of policies in application containers Recovery and Flashback Restore and Recovering Databases with RMAN Perform CDB and PDB flashback Configuring and Using RMAN Configure RMAN and the Database for Recoverability Configure and Using an RMAN recovery catalog Diagnosing Failures Detect and repair database and database block corruption Diagnosing Database Issues Performing Recovery Restore and Recovering Databases with RMAN Perform Non RMAN database recovery Transporting Data Transport Data RMAN Troubleshooting and Tuning Interpret the RMAN message output Diagnose RMAN performance issues Creating an Oracle Database by using DBCA Create, Delete and Configure Databases using DBCA Oracle Restart Configure and use Oracle Restart to manage components Upgrade the Oracle Database Plan for Upgrading an Oracle Database Upgrade an Oracle Database Perform Post-Upgrade tasks Install Grid Infrastructure for a Standalone server Rapid Home Provisioning Using Availability Enhancements Use an RMAN recovery catalog Use Flashback Database Tuning SQL Statements Understanding the Oracle Optimizer Using the SQL Tuning Advisor Managing Optimizer Statistics Using the SQL Access Advisor Understanding the SQL Tuning Process Additional course details: Nexus Humans Oracle 19c Database Administration II (DBA II) (TTOR20619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Administration II (DBA II) (TTOR20619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture⢠concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences
Duration 5 Days 30 CPD hours This course is intended for This course is intended for students new to computer programming or experienced programmers who are new to client-side web development. Overview After completing this course, you will be able to: Describe the technologies involved in web development. Create HTML pages with links and images. Explain the benefits of CSS. Style HTML pages with CSS. Explain the concepts of objects, methods, and properties. Work with JavaScript variables. Create their own custom functions in JavaScript. Write flow control logic in JavaScript. Write JavaScript code that listens for and handles events, such as mouse clicks and page loads. Create forms with HTML and validate them with JavaScript. Use regular expressions in JavaScript for advanced form validation. This course is intended for IT professionals interested in becoming client-side web developers. who need to get a jump start on all three technologies. The course includes more than 30 exercises, providing a rapid hands-on introduction to the three major client-side languages: HTML, CSS, and JavaScript. Students should be prepared to cover a lot of ground quickly.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Quick Overview of Web Development HTML is Part of a Team Client-side Programming Server-side Programming Web Development Technologies Module 2: Introduction to HTML Exercise: A Simple HTML Document Getting Started with a Simple HTML Document HTML Elements, Attributes, and Comments The HTML Skeleton Viewing the Page Source Special Characters HTML Elements and Special Characters History of HTML The lang Attribute Module 3: Paragraphs, Headings, and Text Paragraphs Heading Levels Breaks and Horizontal Rules Exercise: Paragraphs, Headings, and Text The div Tag Creating an HTML Page Quoted Text Preformatted Text Inline Semantic Elements Exercise: Adding Inline Elements Module 4: HTML Links Links Introduction Text Links Absolute vs. Relative Paths Targeting New Tabs Email Links Exercise: Adding Links Lorem Ipsum The title Attribute Linking to a Specific Location on the Page Targeting a Specific Location on the Page Module 5: HTML Images Inserting Images Image Links Adding Images to the Document Exercise: Adding Images to the Page Providing Alternative Images Module 6: HTML Lists Unordered Lists Ordered Lists Definition Lists Exercise: Creating Lists Module 7: Crash Course in CSS Benefits of Cascading Style Sheets CSS Rules Selectors Combinators Precedence of Selectors How Browsers Style Pages CSS Resets CSS Normalizers External Stylesheets, Embedded Stylesheets, and Inline Styles Exercise: Creating an External Stylesheet Exercise: Creating an Embedded Stylesheet Exercise: Adding Inline Styles div and span Exercise: Styling div and span Media Types Units of Measurement Inheritance Module 8: CSS Fonts font-family @font-face font-size font-style font-variant font-weight line-height font shorthand Exercise: Styling Fonts Module 9: Color and Opacity About Color and Opacity Color and Opacity Values Color Opacity Exercise: Adding Color and Opacity to Text Module 10: CSS Text letter-spacing text-align text-decoration text-indent text-shadow text-transform white-space word-break word-spacing Exercise: Text Properties Module 11: JavaScript Basics JavaScript vs. EcmaScript The HTML DOM JavaScript Syntax Accessing Elements Where Is JavaScript Code Written? JavaScript Objects, Methods, and Properties Exercise: Alerts, Writing, and Changing Background Color Module 12: Variables, Arrays, and Operators JavaScript Variables A Loosely Typed Language Google Chrome DevTools Storing User-Entered Data Exercise: Using Variables Constants Arrays Exercise: Working with Arrays Associative Arrays Playing with Array Methods JavaScript Operators The Modulus Operator Playing with Operators The Default Operator Exercise: Working with Operators Module 13: JavaScript Functions Global Objects and Functions Exercise: Working with Global Functions User-defined Functions Exercise: Writing a JavaScript Function Returning Values from Functions Module 14: Built-In JavaScript Objects Strings Math Date Helper Functions Exercise: Returning the Day of the Week as a String Module 15: Conditionals and Loops Conditionals Short-circuiting Switch / Case Ternary Operator Truthy and Falsy Exercise: Conditional Processing Loops while and do?while Loops for Loops break and continue Exercise: Working with Loops Array: forEach() Module 16: Event Handlers and Listeners On-event Handlers Exercise: Using On-event Handlers The addEventListener() Method Anonymous Functions Capturing Key Events Exercise: Adding Event Listeners Benefits of Event Listeners Timers Typing Test Module 17: The HTML Document Object Model CSS Selectors The innerHTML Property Nodes, NodeLists, and HTMLCollections Accessing Element Nodes Exercise: Accessing Elements Dot Notation and Square Bracket Notation Accessing Elements Hierarchically Exercise: Working with Hierarchical Elements Accessing Attributes Creating New Nodes Focusing on a Field Shopping List Application Exercise: Logging Exercise: Adding EventListeners Exercise: Adding Items to the List Exercise: Dynamically Adding Remove Buttons to the List Items Exercise: Removing List Items Exercise: Preventing Duplicates and Zero-length Product Names Manipulating Tables Module 18: HTML Forms How HTML Forms Work The form Element Form Elements Buttons Exercise: Creating a Registration Form Checkboxes Radio Buttons Exercise: Adding Checkboxes and Radio Buttons Fieldsets Select Menus Textareas Exercise: Adding a Select Menu and a Textarea HTML Forms and CSS Module 19: JavaScript Form Validation Server-side Form Validation HTML Form Validation Accessing Form Data Form Validation with JavaScript Exercise: Checking the Validity of the Email and URL Fields Checking Validity on Input and Submit Events Adding Error Messages Validating Textareas Validating Checkboxes Validating Radio Buttons Validating Select Menus Exercise: Validating the Ice Cream Order Form Giving the User a Chance Module 20: Regular Expressions Getting Started Regular Expression Syntax Backreferences Form Validation with Regular Expressions Cleaning Up Form Entries Exercise: Cleaning Up Form Entries A Slightly More Complex Example
Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager⢠to automate driver and firmware installations Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure the vSAN iSCSI target Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration⢠Describe how to setup a stretched and a two-node vSAN cluster Discuss vSAN cluster backup methodology Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health During this five-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail VMware HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN [v7] Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM Storage policy Discuss the impact of vSAN storage policy changes Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN file service architecture and configuration Explain the use cases of vSAN Direct Describe how to setup stretched and two-node vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager⢠to automate driver and firmware installations Detail vSAN resilience and data availability Discuss the vSAN cluster backup methodology Describe the vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health Apply a structured approach to troubleshoot vSAN cluster configuration and operational problems During this five-day, intensive course, you gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations.You also focus on learning the tools and skills necessary to troubleshoot vSAN 7 implementations and gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises.This course is a combination of the following courses: VMware vSAN: Plan and Deploy, VMware vSAN: Management and Operations, and VMware vSAN: Troubleshooting. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Life Cycle Manager to perform upgrades Deploy and configure a vSAN Cluster using Cluster Quickstart wizard Manually configure a vSAN Cluster using vSphere Client Explain and configure vSAN fault domains Using vSphere HA with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN Object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN Datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss Deduplication and Compression techniques Understand Deduplication and Compression overhead Discuss Compression only mode Configure Erasure Coding Configure swap object Thin Provisioning Discuss Reclaiming Storage Space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of Data-in Transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN Nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN Witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN Cluster Health Manage alerts, alarms, and notifications related to vSAN in vSphere Client Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use vSAN Proactive Test to detect and diagnose cluster issues vSAN Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency vSAN Troubleshooting Tools Use Skyline Health for vSAN to identify and correct issues in VMware vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere ESXi Shell Use commands to view, configure, and manage your VMware vSphere environment Discuss the esxcli vsan namespace commands Use log files to help vSAN troubleshooting Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Fast Track (v7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Fast Track (v7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Get to grips with all the features of Teams, including calls and chats, Teams and Channels and Meetings Course overview Duration: 2 hours This session is aimed at those new or self-taught users of Teams to show them the features and how to setup and use it effectively. Objectives By the end of the course you will be able to: Use the core functions of Microsoft Teams Set up Microsoft Teams Make Calls Send Chats to colleagues via teams Set up channels Run Teams meetings Content What is Teams Teams elements Setting up your Teams Setting up audio and video Using voicemail Setting voicemail language Calls and Chats Sending individual and group chats Making and receiving calls Missed call notification Searching Teams and Channels Creating channels Channel settings Setting channel notifications Emailing channels Creating private channels Posting to channels Alerting specific people in a channel Adding files to channels Sending links to channels Teams Meetings Setting up meetings Running meetings from channels Setting backgrounds Screen sharing in meetings Handing over control Creating meeting notes Adding files to teams or meetings Using the meeting chat
Expand your VBA knowledge further and learn some of the more advanced coding features. Course overview Duration: 2 days (13 hours) This course is aimed at experienced VBA users or those who have attended our Part 1 course and have started to use the language. Part 2 expands on the huge array of commands and elements of the data model that can be used and looks at building more complex VBA models Objectives By the end of the course you will be able to: Use comparison operators and system functions Use Arrays Work with ranges Work with the worksheets and workbooks collections and objects Use application objects Use the FileSystemObject Create function procedures Import and save text files Connect to other applications Content Comparison operators Using Comparison operators and functions The LIKE function Wildcards Using SELECT Case System functions The VAL function Case functions Trim functions Text functions Date functions Excel worksheet functions Using Excel functions in VBA Arrays Creating arrays Using arrays Ubound and Lbound Single and multi dimensional arrays Static vs dynamic arrays Working with ranges Creating range objects Passing data between range objects and arrays Using Transpose The Excel object model The object browser Working with collections Collections Creating object variables Setting object variables The For Each . . . Next Loo Sheet collections The worksheets collection The worksheet object The sheets collection Using object Grouping worksheets Using Typename The Workbook collection The workbooks collection Setting workbook variables Application objects Excel default information Display/alerts Screen updating Status bar On Time Using Wait Systems dialog boxes Showing dialog boxes Using dialog boxes Working with files Searching for files and folders The DIR function The FileSystemObject Function procedures Creating functions Adding arguments Calling functions Working with text files Searching for files and folders The DIR function The FileSystemObject Using the FILE and FOLDER collections Sharing data with other applications Early vs Late Binding Setting references to other applications Creating application variables Setting application variables