• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25 Application Performance Monitoring (APM) courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

AN510 IBM Power Systems for AIX IV - Performance Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This advanced course is for: AIX technical support personnel Performance benchmarking personnel AIX system administrators Overview Define performance terminology Describe the methodology for tuning a system Identify the set of basic AIX tools to monitor, analyze, and tune a system Use AIX tools to determine common bottlenecks in the Central Processing Unit (CPU), Virtual Memory Manager (VMM), Logical Volume Manager (LVM), internal disk Input/Output (I/O), and network subsystems Use AIX tools to demonstrate techniques to tune the subsystems In this course, students will develop the skills to measure, analyze, and tune common performance issues on IBM Power Systems running AIX. DAY 1 * Performance analysis and tuning overview * Data collection * Monitoring, analyzing, and tuning CPU usage DAY 2 * Virtual memory performance monitoring and tuning DAY 3 * Physical and logical volume performance * File system performance monitoring and tuning DAY 4 * File system performance monitoring and tuning * Network performance DAY 5 * NFS performance * Performance management methodology

AN510 IBM Power Systems for AIX IV - Performance Management
Delivered on-request, onlineDelivered Online
Price on Enquiry

BSM120 - Application Performance Management 9.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for New users of BSM 9.0 -- 9.2,including:? IT Tools engineers? Database administrators? System administrators? Network administrators? Operations managers? Availability engineers Overview After completing this course, you should be able to:? Identify HP Business Service Management (BSM)deployment scenarios? Monitor application performance and availability fromthe end user perspective? Integrate HP SiteScope with the BSM environment? Monitor the real-time status of Key PerformanceIndicators (KPIs), view performance metrics, and workwith reports containing historical performance data? Configure and work with an IT model to build atopology of your system, populate the model withconfiguration items (CIs) and relationships, and use themodel to measure and manage critical businessprocesses? Create and analyze reports that present and organizespecific data your organization might need? Create and manage service level agreements (SLAs)representing your department contracts with serviceproviders, customers, and internal business units? Perform administrative tasks to enable user access,configure licenses, and enhance system performance? Work with the following applications: End UserManagement (EUM), Business Process Monitor (BPM),SiteScope/System Availability Manager (SAM), Run-Time Service Model (RTSM), BSM applications ? ServiceHealth (SH), MyBSM, Service Level Management (SLM). This entry-level, instructor-led classroom training offers technical personnel, who are new to HP Business Service Management (BSM) 9.0 ? 9.21, the opportunity to develop hands-on experience in applying the fundamental concepts, principles This entry-level, instructor-led classroom training offers technical personnel, who are new to HP Business Service Management (BSM) 9.0 ? 9.21, the opportunity to develop hands-on experience in applying the fundamental concepts, principles

BSM120 - Application Performance Management 9.x Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. MODULE 1: SETTING UP THE BIG-IP SYSTEM * Introducing the BIG-IP System * Initially Setting Up the BIG-IP System * Archiving the BIG-IP Configuration * Leveraging F5 Support Resources and Tools MODULE 2: CONFIGURING WEB APPLICATION ACCESS * Review of BIG-IP LTM * Introduction to the Access Policy * Web Access Application Configuration Overview * Web Application Access Configuration in Detail MODULE 3: EXPLORING THE ACCESS POLICY * Navigating the Access Policy MODULE 4: MANAGING BIG-IP APM * BIG-IP APM Sessions and Access Licenses * Session Variables and sessiondump * Session Cookies * Access Policy General Purpose Agents List MODULE 5: USING AUTHENTICATION * Introduction to Access Policy Authentication * Active Directory AAA Server * RADIUS * One-Time Password * Local User Database MODULE 6: UNDERSTANDING ASSIGNMENT AGENTS * List of Assignment Agents MODULE 7: CONFIGURING PORTAL ACCESS * Introduction to Portal Access * Portal Access Configuration Overview * Portal Access Configuration * Portal Access in Action MODULE 8: CONFIGURING NETWORK ACCESS * Concurrent User Licensing * VPN Concepts * Network Access Configuration Overview * Network Access Configuration * Network Access in Action MODULE 9: DEPLOYING MACROS * Access Policy Macros * Configuring Macros * An Access Policy is a Flowchart * Access Policy Logon Agents * Configuring Logon Agents MODULE 10: EXPLORING CLIENT-SIDE CHECKS * Client-Side Endpoint Security MODULE 11: EXPLORING SERVER-SIDE CHECKS * Server-Side Endpoint Security Agents List * Server-Side and Client-Side Checks Differences MODULE 12: USING AUTHORIZATION * Active Directory Query * Active Directory Nested Groups * Configuration in Detail MODULE 13: CONFIGURING APP TUNNELS * Application Access * Remote Desktop * Network Access Optimized Tunnels * Landing Page Bookmarks MODULE 14: DEPLOYING ACCESS CONTROL LISTS * Introduction to Access Control Lists * Configuration Overview * Dynamic ACLs * Portal Access ACLs MODULE 15: SIGNING ON WITH SSO * Remote Desktop Single Sign-On * Portal Access Single Sign-On MODULE 16: USING IRULES * iRules Introduction * Basic TCL Syntax * iRules and Advanced Access Policy Rules MODULE 17: CUSTOMIZING BIG-IP APM * Customization Overview * BIG-IP Edge Client * Advanced Edit Mode Customization * Landing Page Sections MODULE 18: DEPLOYING SAML * SAML Conceptual Overview * SAML Configuration Overview MODULE 19: EXPLORING WEBTOPS AND WIZARDS * Webtops * Wizards MODULE 20: USING BIG-IP EDGE CLIENT * BIG-IP Edge Client for Windows Installation * BIG-IP Edge Client in Action MODULE 21: CONFIGURATION PROJECT * Configuration Project ADDITIONAL COURSE DETAILS: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - INTRODUCTION TO CORE PROGRAMMING CONCEPTS * Computer Data Storage and Processing * Application Types * Application Lifecycle * Code Compilation 2 - CORE PROGRAMMING LANGUAGE CONCEPTS * Syntax * Data Types * Variables and Constants 3 - PROGRAM FLOW * Introduction to Structured Programming Concepts * Introduction to Branching * Using Functions * Using Decision Structures * Introducing Repetition 4 - ALGORITHMS AND DATA STRUCTURES * Understand How to Write Pseudocode * Algorithm Examples * Introduction to Data Structures 5 - ERROR HANDLING AND DEBUGGING * Introduction to Program Errors * Introduction to Structured Error Handling * Introduction to Debugging 6 - INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING * Introduction to Complex Structures * Introduction to Structs * Introduction to Classes * Introducing Encapsulation 7 - MORE OBJECT-ORIENTED PROGRAMMING * Introduction to Inheritance * Introduction to Polymorphism * Introduction to .NET and the Base Class Library 8 - INTRODUCTION TO APPLICATION SECURITY * Authentication and Authorization * Code Permissions on Computers * Introducing Code Signing 9 - CORE I/O PROGRAMMING * Using Console I/O * Using File I/O 10 - APPLICATION PERFORMANCE AND MEMORY MANAGEMENT * Value Types vs Reference Types * Converting Types * The Garbage Collector ADDITIONAL COURSE DETAILS: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered Online6 days, Jun 3rd, 13:00 + 2 more
£2975

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: * Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. * Both Azure administration and Azure development with proven expertise in at least one of these areas. * Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. * AZ-104T00 - Microsoft Azure Administrator * AZ-204T00: Developing Solutions for Microsoft Azure 1 - INTRODUCTION TO DEVOPS * What is DevOps? * Explore the DevOps journey * Identify transformation teams * Explore shared goals and define timelines 2 - CHOOSE THE RIGHT PROJECT * Explore greenfield and brownfield projects * Decide when to use greenfield and brownfield projects * Decide when to use systems of record versus systems of engagement * Identify groups to minimize initial resistance * Identify project metrics and key performance indicators (KPIs) 3 - DESCRIBE TEAM STRUCTURES * Explore agile development practices * Explore principles of agile development * Define organization structure for agile practices * Explore ideal DevOps team members * Enable in-team and cross-team collaboration * Select tools and processes for agile practices 4 - CHOOSE THE DEVOPS TOOLS * What is Azure DevOps? * What is GitHub? * Explore an authorization and access strategy * Migrate or integrate existing work management tools * Migrate or integrate existing test management tools * Design a license management strategy 5 - PLAN AGILE WITH GITHUB PROJECTS AND AZURE BOARDS * Link GitHub to Azure Boards * Configure GitHub Projects * Manage work with GitHub Project boards * Customize Project views * Collaborate using team discussions * Agile Plan and Portfolio Management with Azure Boards 6 - INTRODUCTION TO SOURCE CONTROL * Explore DevOps foundational practices * What is source control? * Explore benefits of source control * Explore best practices for source control 7 - DESCRIBE TYPES OF SOURCE CONTROL SYSTEMS * Understand centralized source control * Understand distributed source control * Explore Git and Team Foundation Version Control * Examine and choose Git * Understand objections to using Git * Describe working with Git locally 8 - WORK WITH AZURE REPOS AND GITHUB * Migrate from TFVC to Git * Use GIT-TFS * Develop online with GitHub Codespaces 9 - STRUCTURE YOUR GIT REPO * Explore monorepo versus multiple repos * Implement a change log 10 - MANAGE GIT BRANCHES AND WORKFLOWS * Explore branch workflow types * Explore feature branch workflow * Explore Git branch model for continuous delivery * Explore GitHub flow * Explore fork workflow * Version Control with Git in Azure Repos 11 - COLLABORATE WITH PULL REQUESTS IN AZURE REPOS * Collaborate with pull requests * Examine GitHub mobile for pull request approvals 12 - IDENTIFY TECHNICAL DEBT * Examine code quality * Examine complexity and quality metrics * Measure and manage technical debt * Integrate other code quality tools * Plan effective code reviews 13 - EXPLORE GIT HOOKS * Implement Git hooks 14 - PLAN FOSTER INNER SOURCE * Explore foster inner source * Implement the fork workflow * Describe inner source with forks 15 - MANAGE GIT REPOSITORIES * Work with large repositories * Purge repository data * Manage releases with GitHub Repos * Automate release notes with GitHub 16 - EXPLORE AZURE PIPELINES * Explore the concept of pipelines in DevOps * Describe Azure Pipelines * Understand Azure Pipelines key terms 17 - MANAGE AZURE PIPELINE AGENTS AND POOLS * Choose between Microsoft-hosted versus self-hosted agents * Explore job types * Explore predefined agent pool * Understand typical situations for agent pools * Communicate with Azure Pipelines * Communicate to deploy to target servers * Examine other considerations * Describe security of agent pools * Configure agent pools and understanding pipeline styles 18 - DESCRIBE PIPELINES AND CONCURRENCY * Understand parallel jobs * Estimate parallel jobs * Describe Azure Pipelines and open-source projects * Explore Azure Pipelines and Visual Designer * Describe Azure Pipelines and YAML 19 - EXPLORE CONTINUOUS INTEGRATION * Learn the four pillars of continuous integration * Explore benefits of continuous integration * Describe build properties * Enable Continuous Integration with Azure Pipelines 20 - IMPLEMENT A PIPELINE STRATEGY * Configure agent demands * Implement multi-agent builds * Explore source control types supported by Azure Pipelines 21 - INTEGRATE WITH AZURE PIPELINES * Describe the anatomy of a pipeline * Understand the pipeline structure * Detail templates * Explore YAML resources * Use multiple repositories in your pipeline 22 - INTRODUCTION TO GITHUB ACTIONS * What are Actions? * Explore Actions flow * Understand workflows * Describe standard workflow syntax elements * Explore events * Explore jobs * Explore runners * Examine release and test an action 23 - LEARN CONTINUOUS INTEGRATION WITH GITHUB ACTIONS * Describe continuous integration with actions * Examine environment variables * Share artifacts between jobs * Examine Workflow badges * Describe best practices for creating actions * Mark releases with Git tags * Create encrypted secrets * Use secrets in a workflow * Implement GitHub Actions for CI/CD 24 - DESIGN A CONTAINER BUILD STRATEGY * Examine structure of containers * Work with Docker containers * Understand Dockerfile core concepts * Examine multi-stage dockerfiles * Examine considerations for multiple stage builds * Explore Azure container-related services * Deploy Docker containers to Azure App Service web apps 25 - INTRODUCTION TO CONTINUOUS DELIVERY * Explore traditional IT development cycle * What is continuous delivery? * Move to continuous delivery * Understand releases and deployments * Understand release process versus release 26 - CREATE A RELEASE PIPELINE * Describe Azure DevOps release pipeline capabilities * Explore release pipelines * Explore artifact sources * Choose the appropriate artifact source * Examine considerations for deployment to stages * Explore build and release tasks * Explore custom build and release tasks * Explore release jobs * Configure Pipelines as Code with YAML 27 - EXPLORE RELEASE RECOMMENDATIONS * Understand the delivery cadence and three types of triggers * Explore release approvals * Explore release gates * Use release gates to protect quality * Control Deployments using Release Gates 28 - PROVISION AND TEST ENVIRONMENTS * Provision and configure target environments * Configure automated integration and functional test automation * Understand Shift-left * Set up and run availability tests * Explore Azure Load Testing * Set up and run functional tests 29 - MANAGE AND MODULARIZE TASKS AND TEMPLATES * Examine task groups * Explore variables in release pipelines * Understand variable groups 30 - AUTOMATE INSPECTION OF HEALTH * Automate inspection of health * Explore events and notifications * Explore service hooks * Configure Azure DevOps notifications * Configure GitHub notifications * Explore how to measure quality of your release process * Examine release notes and documentation * Examine considerations for choosing release management tools * Explore common release management tools 31 - INTRODUCTION TO DEPLOYMENT PATTERNS * Explore microservices architecture * Examine classical deployment patterns * Understand modern deployment patterns 32 - IMPLEMENT BLUE-GREEN DEPLOYMENT AND FEATURE TOGGLES * What is blue-green deployment? * Explore deployment slots * Describe feature toggle maintenance 33 - IMPLEMENT CANARY RELEASES AND DARK LAUNCHING * Explore canary releases * Examine Traffic Manager * Understand dark launching 34 - IMPLEMENT A/B TESTING AND PROGRESSIVE EXPOSURE DEPLOYMENT * What is A/B testing? * Explore CI-CD with deployment rings 35 - INTEGRATE WITH IDENTITY MANAGEMENT SYSTEMS * Integrate GitHub with single sign-on (SSO) * Explore service principals * Explore Managed Identity 36 - MANAGE APPLICATION CONFIGURATION DATA * Rethink application configuration data * Explore separation of concerns * Understand external configuration store patterns * Examine Key-value pairs * Examine App configuration feature management * Integrate Azure Key Vault with Azure Pipelines * Manage secrets, tokens and certificates * Examine DevOps inner and outer loop * Integrate Azure Key Vault with Azure DevOps * Enable Dynamic Configuration and Feature Flags 37 - EXPLORE INFRASTRUCTURE AS CODE AND CONFIGURATION MANAGEMENT * Explore environment deployment * Examine environment configuration * Understand imperative versus declarative configuration * Understand idempotent configuration 38 - CREATE AZURE RESOURCES USING AZURE RESOURCE MANAGER TEMPLATES * Why use Azure Resource Manager templates? * Explore template components * Manage dependencies * Modularize templates * Manage secrets in templates * Deployments using Azure Bicep templates 39 - CREATE AZURE RESOURCES BY USING AZURE CLI * What is Azure CLI? * Work with Azure CLI 40 - EXPLORE AZURE AUTOMATION WITH DEVOPS * Create automation accounts * What is a runbook? * Understand automation shared resources * Explore runbook gallery * Examine webhooks * Explore source control integration * Explore PowerShell workflows * Create a workflow * Examine checkpoint and parallel processing 41 - IMPLEMENT DESIRED STATE CONFIGURATION (DSC) * Understand configuration drift * Explore Desired State Configuration (DSC) * Explore Azure Automation State configuration (DSC) * Examine DSC configuration file * Explore hybrid management * Implement DSC and Linux Automation on Azure 42 - IMPLEMENT BICEP * What is Bicep? * Install Bicep * Understand Bicep file structure and syntax 43 - INTRODUCTION TO SECURE DEVOPS * Describe SQL injection attack * Understand DevSecOps * Explore Secure DevOps Pipeline * Explore key validation points * Explore continuous security validation * Understand threat modeling 44 - IMPLEMENT OPEN-SOURCE SOFTWARE * Explore how software is built * What is open-source software * Explore corporate concerns with open-source software components * Explore common open-source licenses * Examine license implications and ratings 45 - SOFTWARE COMPOSITION ANALYSIS * Inspect and validate code bases for compliance * Explore software composition analysis (SCA) * Integrate Mend with Azure Pipelines * Implement GitHub Dependabot alerts and security updates * Integrate software composition analysis checks into pipelines * Examine tools for assess package security and license rate * Interpret alerts from scanner tools * Implement security and compliance in an Azure Pipeline 46 - STATIC ANALYZERS * Explore SonarCloud * Explore CodeQL in GitHub * Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP AND DYNAMIC ANALYZERS * Plan Implement OWASP Secure Coding Practices * Explore OWASP ZAP penetration test * Explore OWASP ZAP results and bugs 48 - SECURITY MONITORING AND GOVERNANCE * Implement pipeline security * Explore Microsoft Defender for Cloud * Examine Microsoft Defender for Cloud usage scenarios * Explore Azure Policy * Understand policies * Explore initiatives * Explore resource locks * Explore Azure Blueprints * Understand Microsoft Defender for Identity 49 - EXPLORE PACKAGE DEPENDENCIES * What is dependency management? * Describe elements of a dependency management strategy * Identify dependencies * Understand source and package componentization * Decompose your system * Scan your codebase for dependencies 50 - UNDERSTAND PACKAGE MANAGEMENT * Explore packages * Understand package feeds * Explore package feed managers * Explore common public package sources * Explore self-hosted and SaaS based package sources * Consume packages * Publish packages * Package management with Azure Artifacts 51 - MIGRATE CONSOLIDATING AND SECURE ARTIFACTS * Identify existing artifact repositories * Migrate and integrating artifact repositories * Secure access to package feeds * Examine roles * Examine permissions * Examine authentication 52 - IMPLEMENT A VERSIONING STRATEGY * Understand versioning of artifacts * Explore semantic versioning * Examine release views * Promote packages * Explore best practices for versioning 53 - INTRODUCTION TO GITHUB PACKAGES * Publish packages * Install a package * Delete and restore a package * Explore package access control and visibility 54 - IMPLEMENT TOOLS TO TRACK USAGE AND FLOW * Understand the inner loop * Explore Azure Monitor and Log Analytics * Examine Kusto Query Language (KQL) * Explore Application Insights * Implement Application Insights * Monitor application performance with Application Insights 55 - DEVELOP MONITOR AND STATUS DASHBOARDS * Explore Azure Dashboards * Examine view designer in Azure Monitor * Explore Azure Monitor workbooks * Explore Power BI * Build your own custom application 56 - SHARE KNOWLEDGE WITHIN TEAMS * Share acquired knowledge within development teams * Integrate with Azure Boards * Share team knowledge using Azure Project Wiki 57 - DESIGN PROCESSES TO AUTOMATE APPLICATION ANALYTICS * Explore rapid responses and augmented search * Integrate telemetry * Examine monitoring tools and technologies 58 - MANAGE ALERTS, BLAMELESS RETROSPECTIVES AND A JUST CULTURE * Examine when get a notification * Explore how to fix it * Explore smart detection notifications * Improve performance * Understand server response time degradation * Reduce meaningless and non-actionable alerts * Examine blameless retrospective * Develop a just culture

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions
Delivered Online5 days, Jun 3rd, 13:00 + 2 more
£2975

F5 Configuring BIG-IP APM - Access Policy Manager v13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. SETTING UP THE BIG-IP SYSTEM * Introducing the BIG-IP System * Initially Setting Up the BIG-IP System * Archiving the BIG-IP Configuration * Leveraging F5 Support Resources and Tools * CONFIGURING WEB APPLICATION ACCESS * Review of BIG-IP LTM * Introduction to the Access Policy * Web Access Application Configuration Overview * Web Application Access Configuration in Detail * EXPLORING THE ACCESS POLICY * Navigating the Access Policy * MANAGING BIG-IP APM * BIG-IP APM Sessions and Access Licenses * Session Variables and sessiondump * Session Cookies * Access Policy General Purpose Agents List USING AUTHENTICATION * Introduction to Access Policy Authentication * Active Directory AAA Server * RADIUS * One-Time Password * Local User Database * UNDERSTANDING ASSIGNMENT AGENTS * List of Assignment Agents * * CONFIGURING PORTAL ACCESS * Introduction to Portal Access * Portal Access Configuration Overview * Portal Access Configuration * Portal Access in Action * * CONFIGURING NETWORK ACCESS * Concurrent User Licensing * VPN Concepts * Network Access Configuration Overview * Network Access Configuration * Network Access in Action * DEPLOYING MACROS * Access Policy Macros * Configuring Macros * An Access Policy is a Flowchart * Access Policy Logon Agents * Configuring Logon Agents * EXPLORING CLIENT-SIDE CHECKS * Client-Side Endpoint Security * EXPLORING SERVER-SIDE CHECKS * Server-Side Endpoint Security Agents List * Server-Side and Client-Side Checks Differences * USING AUTHORIZATION * Active Directory Query * Active Directory Nested Groups * Configuration in Detail * CONFIGURING APPTUNNELS * Application Access * Remote Desktop * Network Access Optimized Tunnels * Landing Page Bookmarks * DEPLOYING ACCESS CONTROL LISTS * Introduction to Access Control Lists * Configuration Overview * Dynamic ACLs * Portal Access ACLs * SIGNING ON WITH SSO * Remote Desktop Single Sign-On * Portal Access Single Sign-On * USING IRULES * iRules Introduction * Basic TCL Syntax * iRules and Advanced Access Policy Rules * CUSTOMIZING BIG-IP APM * Customization Overview * BIG-IP Edge Client * Advanced Edit Mode Customization * Landing Page Sections * DEPLOYING SAML * SAML Conceptual Overview * SAML Configuration Overview * EXPLORING WEBTOPS AND WIZARDS * Webtops * Wizards * USING BIG-IP EDGE CLIENT * BIG-IP Edge Client for Windows Installation * BIG-IP Edge Client in Action * LESSON * Configuration Project * ADDITIONAL TRAINING AND CERTIFICATION * Getting Started Series Web-Based Training * F5 Instructor Led Training Curriculum * F5 Professional Certification Program * F5 Instructor Led Training Curriculum * F5 Professional Certification Program * ADDITIONAL COURSE DETAILS: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Configuring BIG-IP APM - Access Policy Manager v13.x
Delivered on-request, onlineDelivered Online
Price on Enquiry

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. INTRODUCTION TO GOOGLE CLOUD MONITORING TOOLS * Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring * Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler AVOIDING CUSTOMER PAIN * Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation * Measure customer pain with SLIs * Define critical performance measures * Create and use SLOs and SLAs * Achieve developer and operation harmony with error budgets ALERTING POLICIES * Develop alerting strategies * Define alerting policies * Add notification channels * Identify types of alerts and common uses for each * Construct and alert on resource groups * Manage alerting policies programmatically MONITORING CRITICAL SYSTEMS * Choose best practice monitoring project architectures * Differentiate Cloud IAM roles for monitoring * Use the default dashboards appropriately * Build custom dashboards to show resource consumption and application load * Define uptime checks to track aliveness and latency CONFIGURING GOOGLE CLOUD SERVICES FOR OBSERVABILITY * Integrate logging and monitoring agents into Compute Engine VMs and images * Enable and utilize Kubernetes Monitoring * Extend and clarify Kubernetes monitoring with Prometheus * Expose custom metrics through code, and with the help of OpenCensus ADVANCED LOGGING AND ANALYSIS * Identify and choose among resource tagging approaches * Define log sinks (inclusion filters) and exclusion filters * Create metrics based on logs * Define custom metrics * Link application errors to Logging using Error Reporting * Export logs to BigQuery MONITORING NETWORK SECURITY AND AUDIT LOGS * Collect and analyze VPC Flow logs and Firewall Rules logs * Enable and monitor Packet Mirroring * Explain the capabilities of Network Intelligence Center * Use Admin Activity audit logs to track changes to the configuration or metadata of resources * Use Data Access audit logs to track accesses or changes to user-provided resource data * Use System Event audit logs to track GCP administrative actions MANAGING INCIDENTS * Define incident management roles and communication channels * Mitigate incident impact * Troubleshoot root causes * Resolve incidents * Document incidents in a post-mortem process INVESTIGATING APPLICATION PERFORMANCE ISSUES * Debug production code to correct code defects * Trace latency through layers of service interaction to eliminate performance bottlenecks * Profile and identify resource-intensive functions in an application OPTIMIZING THE COSTS OF MONITORING * Analyze resource utilization cust for monitoring related components within Google Cloud * Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered on-request, onlineDelivered Online
Price on Enquiry

CompTIA A+ Certification Core 2 (220-1102)

By Packt

This comprehensive course is designed to prepare you to take and pass the CompTIA A+ Certification Core (220-1102) certification exam. This is the second of a two-course series. To become fully A+ certified, you will need to pass both the 220-1101 and 220-1102 exams.

CompTIA A+ Certification Core 2 (220-1102)
Delivered Online On Demand
£131.99

AZ-303 Azure Architecture Technologies Exam Prep 2021

By Packt

This course covers all the requirements of the Microsoft AZ-300 and AZ-303 exams. You will get a detail-oriented approach to all the important concepts that will help you pass the exams and design solutions for the Microsoft Azure platform.

AZ-303 Azure Architecture Technologies Exam Prep 2021
Delivered Online On Demand
£103.99

Learn JMeter from Scratch on Live Applications - Performance Testing

By Packt

This course will help you to get up and running with JMeter. You will learn how to monitor the performance of web applications and REST APIs by load testing, using the features of the JMeter tool.

Learn JMeter from Scratch on Live Applications - Performance Testing
Delivered Online On Demand
£104.99

Educators matching "Application Performance Monitoring (APM)"

Show all 35
Construction Study Centre

construction study centre

London

CSC Training has been providing training for 30 years supporting project, programme and portfolio delivery across all industries. We have a reputation for the delivery of high-quality public and in-house courses. Our experts are experienced practitioners, currently working in their specialist fields. All of our experts have strong training skills and are able to blend excellent practical insight, lived experience and theoretical learning to bring topics to life. We incorporate the latest industry insights into our training and this is just one of the reasons why some of the UK’s top performing companies have been coming to us for flexible training solutions. Our training courses are specially designed by our experts to share their detailed knowledge and experience. Our courses cover: Commercial & Contract Law, Health and Safety and CDM, Project Management, Soft Skills, Environment, property and regulation. In-house training: we can tailor content to meet the specific needs of your business, ensuring that your people have the relevant information and skills to deliver your work. Our courses can take place at a time, location and date convenient to you, avoiding disruption to your business and unnecessary impact on your staff, We can work with you to identify the most appropriate training solutions for your teams’ needs and subsequently support you to embed your teams’ learning outcomes into their working environment. We are proud to have already delivered over 3,750 public and in-company courses across the UK for over 48,000 delegates over the last 30 years.