Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager⢠and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX-T Data Center Explain the features and benefits of NSX-T Data Center Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠and KVM hosts to participate in NSX-T Data Center networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX-T Data Center Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T? Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.2 release, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and NSX-T Data Center Introduce the VMware Virtual Cloud Network vision Discuss NSX-T Data Center solutions, use cases, and benefits Explain NSX-T Data Center architecture and components Describe the VMware NSXTM product portfolio and features Explain the management, control, data, and consumption planes and function Preparing the NSX-T Data Center Infrastructure Describe NSX Management Cluster Deploy VMware NSXTM ManagerTM nodes on VMware ESXi and KVM hypervisors Navigate through the NSX Manager UI Explain data-plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and establish the data center infrastructure Verify transport node status and connectivity NSX-T Data Center Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the GENEVE encapsulation Configure logical segments and attach hosts using NSX Manager UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX-T Data Center Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 Gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 Gateways Examine the single-tier and multitier packet flow Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on Tier-0 Gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX-T Data Center Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX-T Data Center Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX-T Data Center Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy the NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of NSX Intelligence Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX-T Data Center Services Describe NSX-T Data Center services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX Manager UI NSX-T Data Center User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX-T Data Center Integrate VMware Identity Manager with NSX-T Data Center Integrate LDAP with NSX-T Data Center Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access NSX-T Data Center Federation Introduce the NSX-T Data Center Federation key concepts, terminology, and use-cases. Explain the onboarding process of NSX-T Data Center Federation Describe the NSX-T Data Center Federation switching and routing functions. Describe the NSX-T Data Center Federation security concepts.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations⢠for Logs and VMware Aria Operations⢠for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager⢠to automate driver and firmware installations Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure the vSAN iSCSI target Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration⢠Describe how to setup a stretched and a two-node vSAN cluster Discuss vSAN cluster backup methodology Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health During this five-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail VMware HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct Configuration vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN [v7] Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM Storage policy Discuss the impact of vSAN storage policy changes Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN file service architecture and configuration Explain the use cases of vSAN Direct Describe how to setup stretched and two-node vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager⢠to automate driver and firmware installations Detail vSAN resilience and data availability Discuss the vSAN cluster backup methodology Describe the vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health Apply a structured approach to troubleshoot vSAN cluster configuration and operational problems During this five-day, intensive course, you gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations.You also focus on learning the tools and skills necessary to troubleshoot vSAN 7 implementations and gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises.This course is a combination of the following courses: VMware vSAN: Plan and Deploy, VMware vSAN: Management and Operations, and VMware vSAN: Troubleshooting. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Life Cycle Manager to perform upgrades Deploy and configure a vSAN Cluster using Cluster Quickstart wizard Manually configure a vSAN Cluster using vSphere Client Explain and configure vSAN fault domains Using vSphere HA with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN Object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN Datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss Deduplication and Compression techniques Understand Deduplication and Compression overhead Discuss Compression only mode Configure Erasure Coding Configure swap object Thin Provisioning Discuss Reclaiming Storage Space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of Data-in Transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN Nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN Witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN Cluster Health Manage alerts, alarms, and notifications related to vSAN in vSphere Client Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use vSAN Proactive Test to detect and diagnose cluster issues vSAN Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency vSAN Troubleshooting Tools Use Skyline Health for vSAN to identify and correct issues in VMware vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere ESXi Shell Use commands to view, configure, and manage your VMware vSphere environment Discuss the esxcli vsan namespace commands Use log files to help vSAN troubleshooting Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Fast Track (v7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Fast Track (v7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Tier 1 system administrators, and integrators responsible for managing and maintaining VMware Horizon Infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Describe the installation, architecture, and requirements of Horizon Connection Server Describe the authentication and certificate options for a VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access and VMware Horizon Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in VMware Horizon Discuss the scalability options available in VMware Horizon Describe the different security options for VMware Horizon environments Discuss the advanced configurations of Horizon Connection Server List the troubleshooting techniques for common Horizon Connection Server issues Interpret the Horizon Connection Server logs Identify Unified Access Gateway configuration and certificate issues List the troubleshooting steps for common Unified Access Gateway common issues Describe Blast configuration verification using logs and settings Describe the Blast optimization recommendations for different use cases Describe VMware Horizon connections and how to troubleshoot related problems Describe VMware Horizon certificates List the troubleshooting steps for common VMware Horizon certificates issues Describe Cloud Pod Architecture troubleshooting scenarios Identify and fix problems in a VMware Horizon environment VMware Horizon 8: Infrastructure Administrator and Troubleshooting is a five-day combination course of VMware Horizon 8: Infrastructure Administration & VMware Horizon 8: Infrastructure Troubleshooting. This training collection gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon© through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Also, this course provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting Horizon Connection Server, Unified Access Gateway, protocols, connections, and certificates. This course provides a challenge lab designed to present participants with infrastructure issues that may arise in actual Horizon environments. The lab objective is to put into practice the contents covered during the training to create a working environment. Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the supported features of Horizon Connection Server Identify the recommended system requirements for Horizon Connection Server Configure the VMware Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD Lightweight Directory Service (LDS) database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the smart card authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Describe the features of the Workspace ONE Access console Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace ONE services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe Blast Describe the Blast display protocol codecs Summarize the Blast codec options List the ideal applications for each Blast codec Describe Blast and PCoIP ADMX GPO common configurations Graphics Cards Describe the 3D rendering options available in Vmware Horizon Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List the Unified Access Gateway firewall rules Describe the situations in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Troubleshooting Horizon Connection Server Identify the general troubleshooting techniques for Horizon Connection Server Explain how to use logs to identify common Horizon Connection Server problems Describe AD LDS replication Discuss common Horizon Connection Server replication issues Explain how to interpret Horizon Connection Server logs Compare successful and unsuccessful logs from common infrastructure administration tasks Troubleshooting Unified Access Gateway Identify common Unified Access Gateway deployment issues Explain how to monitor the health of a Unified Access Gateway deployment Identify and troubleshoot Unified Access Gateway certificate issues Explain how to monitor, test, and troubleshoot network errors using tcpdump and curl Detail the general Unified Access Gateway troubleshooting methods Blast Configuration Discuss Blast codecs and Encoder Switch settings Describe how to verify BLAST configuration using logs and settings Optimizing Blast List general Blast optimization recommendations Summarize Blast tuning recommendations that apply to WAN connections Summarize Blast tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe the recommended tuning options to increase display protocol quality for all use cases and applications Troubleshooting VMware Horizon Connections Explain VMware Horizon connections Describe the role of primary and secondary protocols in VMware Horizon connections Describe HTML client access connections Describe Horizon Connections load balancing Describe timeout settings, supported health monitoring strings, and suitable load balancer persistence values Identify the troubleshooting steps for failing VMware Horizon load balancer connections List the steps for troubleshooting VMware Horizon connections Troubleshooting VMware Horizon Certificates List the functions of VMware Horizon certificates Describe VMware Horizon certificate scenarios Discuss potential challenges related to certificates in VMware Horizon Describe the troubleshooting approach to VMware Horizon certificates issues Cloud Pod Architecture Describe Cloud Pod Architecture troubleshooting scenarios Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Administration and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Administration and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series, including: Data center architects Data center engineers IT directors IT managers Network architects Network engineers Solutions architects Systems engineers Overview After taking this course, you should be able to: Describe Cisco MDS SAN features and advantages Define fixed and modular platforms Understand Cisco MDS architecture and high-availability mechanisms Identify technologies used in modern SANs Describe SAN management with Cisco Data Center Network Manager (DCNM) Explain key value-add features that distinguish Cisco MDS switches The Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you?ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. Define Cisco MDS Platform Overview Introduction and Advantages of Cisco MDS Fixed Platforms Modular Platforms Describe Cisco MDS Architecture Store-and-Forward Architecture High Availability Redundancy Explore Cisco MDS Key Features Virtual Storage Area Networks Port Channels Slow Drain Device and Path Analysis Using Congestion Control Mechanisms Cisco DCNM SAN Insights for SAN Analytics Zoning Smart Zoning Other Differentiating Features Examine Cisco MDS Management Cisco Data Center Network Manager Additional course details: Nexus Humans Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for #NAME? Overview The learning objectives for CDA include a practical understanding of: Goals, history, terminology, and pipeline The importance, practices, and transformation of a DevOps collaborative culture Design practices, such as modular design and microservices Continuous Integration (Cl), such as version control, builds, and remediation Tenets and best practices of Continuous Testing (CT) Continuous Delivery and Deployment (CD): packaging, containers, and release Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps Infrastructure and tools: frameworks, tools, and infrastructure as code Security Assurance: DevSecOps The opportunity to hear and share real-life scenarios This course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APls and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.This course prepares you for the Continuous Delivery Ecosystem Foundation(CDEF) certification. Course Introduction Course goals Course agenda CDA Concepts Continuous delivery (CD) definition Architecting for continuous delivery Continuous delivery and DevOps Relationships between CD, Waterfall, Agile, ITIL, and DevOps Benefits of continuous delivery CDA Culture Importance of culture to the CD Architect What a CD Architect can do about culture How to maintain culture Assignment: DevOps culture and practices to create flow Design Practices for Continuous Delivery Why design is important to continuous delivery CD Architect?s role in design Key design principles CD best practices Microservices and containers Continuous Integration Continuous integration (CI) defined CD Architect?s role in CI Importance of CI Benefits of CI CI best practices Assignment: Optimizing CI workflows Continuous Testing Continuous testing (CT) defined Importance of CT Benefits of CT CD Architect?s role in CT Five tenets of CT CT best practices Assignment: Handling environment inconsistencies Continuous Delivery and Deployment Continuous delivery defined Continuous deployment defined Benefits of continuous delivery and deployment CD Architect?s role in continuous delivery and deployment Continuous delivery and deployment best practices Assignment: Distinguishing continuous delivery and deployment Continuous Monitoring Continuous monitoring defined Importance of continuous monitoring CD Architect?s role in continuous monitoring Continuous monitoring best practices Assignment: Monitoring build progress Infrastructure and Tools Importance of infrastructure and tools CD Architect?s role in infrastructure and tools Building a DevOps toolchain Infrastructure/tools best practices Assignment: identifying common infrastructure/tool components Security Assurance Importance of security assurance DevSecOps and Rugged DevOps defined CD Architect?s role in security Security best practices Assignment: Applying security practices Capstone exercise Identifying toolchain and workflow improvements Summary Additional Sources of Information Exam Preparations Exam requirements Sample exam review
Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success