• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2896 ARC courses delivered Online

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Digital Learning Networking

By Nexus Human

Duration 70 Days 420 CPD hours Cisco Learning Library: Networking offers a subscription to all Cisco core online networking training, including product training, technology training, and certifications such as Cisco Routing and Switching, Wireless, Design, and Network Programmability.This comprehensive technical training library includes full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials. Networking Library Certification Courses CCNA Implementing and Administering Cisco Solutions (CCNA) v1.0 CCNP Enterprise Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 CCIE Enterprise Infrastructure Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 CCIE Enterprise Wireless Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Product and Technology Training Implementing and Administering Cisco Solutions (CCNA) v1.0 Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) v1.0 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Cisco Certified Technician Supporting Cisco Routing and Switching Network Devices (RSTECH) v3.0 Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Cisco NCS 2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 Cisco Digital Network Architecture Implementation Essentials (DNAIE) v2.0 Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) v1.0 Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 Deploying Cisco SD-Access (ENSDA) v1.1 Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 Introduction to Cisco IOS XR (IOSXR100) v2.0 Cisco IOS XR System Administration (IOSXR200) v1.1 Cisco IOS XR Basic Troubleshooting (IOSXR201) v1.1 Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 Cisco IOS XR Layer 3 VPN Implementation and Verification (IOSXR301) v1.1 Cisco IOS XRMulticast Routing Implementation and Verification (IOSXR302) v1.1 Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 NSO Essentials for Programmers and Network Architects (NSO201) v3.0 Cisco NSO Administration and DevOps (NSO303) v3.0 Cisco Optical Technology Advanced (OPT300) v2.0 Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 Operating and Implementing Cisco WAN Automation Engine (WAE200) v3.0 Implementing Cisco Virtual Wide Area Application Services (VWAAS) v1.0 Configuring and Operating Cisco EPN Manager (EPNM100) v3.0 Cisco Elastic Services Controller (ESC300) v2.0 Product and Technology Training Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) v1.0 Implementing Cisco Multicast (MCAST) v2.0 Cisco Prime Central Intermediate ? Administration and Operations (CPCI-AO) v1.0 Cisco Prime Network Intermediate ? Administration and Operation (CPNI-AO) v1.1 Cisco Prime Provisioning (CPP) v6.5 Cisco Prime Performance Manager (CPPERF) v1.0 Implementing Cisco Catalyst 9000 Switches (ENC9K) v1.0 Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 Network Convergence System 5500 Series Router (NCS5500HW) v1.0 Cisco DNA Center Fast-Start Use Cases (A-SDA-FASTSTART) Getting Started with DNA Center Assurance (A-DNAC-ASSUR) v1.0 Overview of Cisco DNA Center Fast Start Use Cases for System Engineers (P-SDA-SYSEF) Planning and Deploying SD-Access Fundamentals (For Customers) (CUST-SDA-FUND) v1.0 Preparing the Identity Services Engine (ISE) for SD-Access (For Customers) (CUST-SDA-ISE) v1.0 SD-Access 1.2 Update Supplement (A-SDA-12UPDT) The SD-WAN Mastery Collection - Getting Started (For Customers) v1.0 (A-SDW-START) The SD-WAN Mastery Collection - Deploying the Data Plane (For Customers) v1.0 (A-SDW-DATPLN) The SD-WAN Mastery Collection - Developing the Overlay Topology (For Customers) v1.0 (A-SDW-OVRLAY) The SD-WAN Mastery Collection - Managing the Application Experience (For Customers) v1.0 (A-SDW-APPEXP) The SD-WAN Mastery Collection - Bringing Up the Control Plane Devices (For Customers) v1.0 (A-SDW-CTRPLN) Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC) Programming for Network Engineers (PRNE) v1.0 Cisco Optical Technology Intermediate (OPT200) v2.0 Advanced Implementing and Troubleshooting MPLS VPN Networks (AMPLS) BGP Bootcamp (BGP) Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Configuring BGP on Cisco Routers (BGP) v4.0 Implementing Cisco MPLS v3.0 Internetworking Technology Overview (ITO) Introduction to IP Multicast Bootcamp Introduction to IPsec VPN Bootcamp (IPsec VPN) Introduction to IPv6 Bootcamp (IPv6) Introduction to MPLS-VPN Bootcamp (MPLS-VPN) LAN Switching Bootcamp (LAN-SW) RP Bootcamp Troubleshooting for Network Support Engineers

Cisco Digital Learning Networking
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere Install Configure Manage (Official VMware IT Academy version)

By Nexus Human

Duration 4.875 Days 29.25 CPD hours This course is intended for VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most otherVMware technologies in the software-defined data center. Overview Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Describe the benefits and capabilities of VMware Skyline Install and configure ESXi hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler ™ Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager™ to perform upgrades to ESXi hosts and virtual machines This is an official VMware IT Academy course with official courseware and labs. Course introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concepts Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Describe the ESXi host architecture Navigate the Direct Console User Interface (DCUI) to configure an ESXi host Recognize ESXi host user account best practices Install an ESXi host Use VMware Host Client? to configure ESXi host settings Describe how to proactively manage your vSphere environment using VMware Skyline Virtual Machines Create and provision a virtual machine Explain the importance of VMware Tools? Install VMware Tools Identify the files that make up a VM Recognize the components of a VM Recognize virtual devices supported by a VM Describe the benefits and use cases for containers Identify the parts of a container system vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use VMware vCenter Server© High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping, and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Recognize the components of a VMware vSAN? configuration Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Describe the Enhanced vMotion Compatibility feature Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Describe the benefits of VMware vSphere© Storage APIs ? Data Protection Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster Monitor a vSphere cluster configuration Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Describe the function of the vSphere© Cluster Service vSphere Lifecycle Management Recognize the importance of vCenter Server Update Planner Describe how VMware vSphere© Lifecycle Manager? works Describe how to update ESXi hosts using baselines Validate ESXi host compliance using a cluster image Describe how to upgrade VMware Tools and VM hardware Describe VMware vSphere© Lifecycle Manager? and VMware vSAN? integration

VMware vSphere Install Configure Manage (Official VMware IT Academy version)
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Administration I (DBA I) (TTOR20519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs new to Oracle 19c, who can work in Linux and have basic experience with SQL scripting. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: How to use tools to access an Oracle Database Generate database creation scripts by using DBCA How to create a container database (CDB) by using the CREATE DATABASE command Learn about Startup and shut down Oracle databases Initialization parameter files and initialization parameters Tools that are used to administer Oracle Net Services How to use the Oracle Connection Manager Control utility to administer Oracle Connection Manager How to create a new PDB from the PDB seed. Logical and physical storage structures in an Oracle database Usage of Oracle Database features that save space Explanation of DML and undo data generation Learn about general architecture of Oracle Data Pump and SQL*Loader How to use SQL*Loader to load data from a non-Oracle database (or user files) Bonus Content / Time Permitting: Explanation of maintenance windows Bonus Content / Time Permitting: Employ basic monitoring procedures and manage performance Oracle 19C Database Administration I (Oracle DBA I) is a comprehensive, hands-on course provides concrete information on the design of an Oracle Database instance and database, allowing you to manage your database investment. In this class, you will learn how to create database storage structures that align with your requirements and business models. You will also learn how to create users and administer databases as well as harden the databases to meet your business requirements. This is the foundational course for learning about Oracle Database and it does not assume prior knowledge or Oracle technologies, however you should have incoming experience working with SQL, and be comfortable with Linux and working from the command line. This training is NOT Official Oracle University training. This is independent, adjustable content that aligns with current topics, skills and tools that participants need to excel in these areas. Introduction to Oracle Database Oracle Multitenant Container Database Oracle Database Instance Configurations Database Sharding Oracle Database Server Accessing an Oracle Database Oracle Database Tools Database Tool Choices SQL Developer Enterprise Manager Database Express Creating an Oracle Database by Using DBCA Planning the Database Choosing a Database Template Configuration Assistant Creating an Oracle Database by Using a SQL Command Creating a Container Database Enable Pluggable Database Starting Up and Shutting Down a Database Instance Starting the Oracle Database Instance Shutting Down an Oracle Database Instance Opening and Closing PDBs Managing Database Instances Investigating Initialization Parameter Files Viewing Initialization Parameters by Using SQL*Plus Modifying Initialization Parameters by Using SQL*Plus Viewing Diagnostic Information Oracle Net Services Overview Oracle Net Services Components Oracle Net Listener Configuring Naming Methods Configuring the Oracle Network to Access a Database Creating a Net Service Name for a PDB Configuring and Administering the Listener Exploring the Default Listener Creating a Second Listener Connecting to a Database Service Using the New Listener Configuring a Shared Server Architecture Configuring Shared Server Mode Configuring Clients to Use a Shared Server Configuring Oracle Connection Manager for Multiplexing and Access Control Oracle Connection Manager Processes Filtering Rules Session Multiplexing Creating PDBs Creating a New PDB from the PDB Seed Cloning Remote PDBs in Hot Mode Relocating PDBs Managing PDBs Renaming a PDB Setting Parameter Values for PDBs Database Storage Overview Logical and Physical Database Structures Tablespaces and Data Files Types of Segments Monitoring Tablespace Space Usage Creating and Managing Tablespaces Viewing Tablespace Information Creating a Tablespace Managing Temporary and Permanent Tablespaces Improving Space Usage Managing Space in Tablespaces Using Compression Enabling the Resumable Space Allocation Feature Creating and Managing User Accounts Creating Common and Local Users Creating a Local User for an Application Exploring OS and Password File Authentication Configuring Privilege and Role Authorization Granting a Local Role (DBA) to PDBADMIN Using SQL*Developer to Create Local Roles Configuring User Resource Limits Using SQL*Developer to Create a Local Profile & Users Configuring a Default Role for a User Implementing Oracle Database Auditing Enabling Unified Auditing Creating Audit Users Creating an Audit Policy Introduction to Loading and Transporting Data General Architecture Oracle Data Pump SQL Loader Loading Data into a PDB from an External File Moving Data from One PDB to Another PDB Transporting a Tablespace Using External Tables to Load and Transport Data Querying External Tables Unloading External Tables Automated Maintenance Tasks Overview Automated Maintenance Tasks Maintenance Windows Predefined Maintenance Windows Bonus: Managing Tasks and Windows Enabling and Disabling Automated Maintenance Tasks Modifying the Duration of a Maintenance Window Bonus: Database Monitoring and Performance Tuning Overview Performance Planning Considerations Automatic Workload Repository (AWR) Advisory Framework Bonus: Monitoring Database Performance & Processes Server-Generated Alerts Setting Metric Thresholds Performance Monitoring Examining the Database Background Processes Bonus: Tuning Database Memory Viewing Memory Configurations Bonus: Analyzing SQL and Optimizing Access Paths Using the Optimizer Statistics Advisor

Oracle 19c Database Administration I (DBA I) (TTOR20519)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Management Suite 7.6 - Implementation

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the professional tasked with implementing, designing, architecting, installing, and configuring Symantec Client Management Suite (CMS) to manage the software and hardware in their company. Overview At the completion of the course, you will be able to: Identify the types of information you need to collect to help determine what type of CMS configuration to implement. Install Client Management Suite. Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Create Organizational Views and Groups and assign resources to them. Create and configure policies, tasks, and jobs and assign them to targets. Troubleshoot common problems with installation and managing of Client Management Suite. Creating reports and installing and configuring IT Analytics. This course teaches students theory and concepts, and provides technical know-how on implementing Client Management Suite. Course Introduction Course objectives Course overview Lab environment introduction Understanding the Symantec Management Platform Introducing the Symantec Management Platform Symantec management Platform components used by Client Management Suite Symantec Management Platform concepts How Client Management Suite works Architecture of Client Management Suite Understanding Architecture Hardware Recommendations Installing and configuring Client Management Suite Installing and using the Symantec Installation Manager Installing the Notification Server, suite and solution software The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Configuring the Notification Server after installation Getting to know the ITMS Management views Discovering resources Introducing resource discovery methods Importing resources from Microsoft Active Directory Discovering computers using domain resource discovery Discovering network resources using Network Discovery Creating and Managing Organizational Views and Groups Learning about organizational views and groups Creating custom organizational views and groups Managing organizational views and groups Installing and Configuring the Agents and Plug-ins Managing computers with the Symantec Management Agent Installing the Symantec Management Agent Verifying the Symantec Management Agent installation Configuring the Symantec Management Agent settings Introducing solution plug-ins for the Symantec Management Agent Upgrading Client Management Suite Introducing agent, Notification Server and site server communications Introducing Notification Server event queues Resource Filters Introducing resource filters Managing and working with existing filters Creating and modifying filters Filters and Targets Introducing targets Working with targets in the computer management view Policies Getting to know policies Understanding user-based policies Understanding how the Symantec Management Agent receives policies Configuring automation policies Managing shared schedules Creating and Managing Tasks and Jobs Overview of task management Creating and scheduling tasks and jobs Task management communication and processing Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Reporting Introducing reports Using and creating classic reports Configuring and using IT Analytics Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Cloud-enabled Management (CeM) Introducing Cloud-enabled Management (CeM) Understanding the cloud-enabled agent Preparing the Notification Server and agents for CeM Configuring site management for CeM Installing and Configuring the SMP Internet Gateway and configuring a CeM Settings policy Configuring the SMP Internet Gateway with the SMP IG Manager Configuring the CeM Settings policy Creating a cloud-enabled agent installation package Installing a cloud-enabled agent from a package Replication Understanding replication Setting up and configuring replication Running replication Hierarchy Understanding hierarchy Setting up a Notification Server hierarchy Configuring hierarchy replication Changing the hierarchy topology Migration Migrating Symantec Management Platform Agent registration (trust)Post installation checklist Readiness checklist for CMS Migration Post migration checklist for a CMS Migration Migrating from 6.x to 7.6 Migrating from 7.x to 7.6 Troubleshooting Learning about Symantec Management Platform troubleshooting tools Using NSConfigurator Using Remote Altiris Agent Diagnostics Introducing Notification Server event queues Troubleshooting Cloud-enabled Management (CeM) Backing up the server and database Symantec Management Platform components needed for recovery Backing up the IIS default web site virtual directories Backing up the Configuration Management Database Customizing the Console Customizing the Symantec Management Console Personalizing the Symantec Management Console SQL Basics Learning SQL basics Obtaining Technical Support from Symantec Using self-help resources Obtaining customer support Additional course details: Nexus Humans Symantec Management Suite 7.6 - Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Management Suite 7.6 - Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Management Suite 7.6 - Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Advanced Features and Troubleshooting [v8.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators responsible for using the advanced features of vRealize Automation in enterprise deployments. Overview By the end of the course, you should be able to meet the following objectives Describe and configure the vRealize Automation in a clustered enterprise deployment using VMware vRealize Suite Lifecycle Manager™ Scale VMware Identity Manager™ to support High Availability. Configure security certificates in vRealize Automation from external Certificate Authorities. Describe the clustered deployment architecture, including Kubernetes pods and services. Create and configure advanced blueprints with complex YAML and cloudConfig. Use vRealize Automation advanced blueprints to deploy an actual 2-tier DB-Server using MySQL and phpMyAdmin. Practice troubleshooting techniques with advanced YAML blueprints in vRealize Automation. Use advanced VMware NSX-TTM Data Center networking features including NAT, routed networks, load balancers, security groups, and tags. Use VMware Code Stream™ to integrate vRealize Automation with Kubernetes. Create Code Stream pipelines. Create and use Ansible playbooks that integrate with vRealize Automation. Configure vRealize Automation to integrate with Puppet. Configure and use ABX actions to create day-2 actions and interface with PowerShell scripts. Use vracli commands, log files, and VMware vRealize Log Insight™ to troubleshoot vRealize Automation and vRealize Automation deployments. This five-day course is a follow-on to the VMware vRealize© Automation? Install, Configure, Manage course. In this course you go deeper into the advanced features of vRealize Automation to deploy user systems and interface vRealize Automation with other platforms and you learn how to deploy an enterprise-level cluster environment using LCM. This course relies heavily on hands-on labs. Course Introduction Introductions and course logistics Course objectives vRealize Automation Clustered Deployment Use LCM in a clustered deployment Configure External Certificates Configure NSX-T Data Center load balancer Install vRealize Automation using Clustered Deployment Scale VMware Identity Manager to support High Availability vRealize Automation Clustered Deployment Architecture List of Kubernetes Pods The vRealize Automation Kubernetes Architecture Relationship of Kubernetes Pods to Services Logs and their locations Blueprint deployment workflow with Kubernetes Service interaction Backup strategies and potential problems Advanced Blueprints Use advanced YAML and cloudConfig to deploy a functioning 2-tier application with a phpMyAdmin front-end server and a MySQL database server Use troubleshooting techniques to debug problems in advanced YAML blueprints List the log files that can aid in troubleshooting blueprint deployment Advanced Networking Use VMware NSX-T Data Center advanced features in blueprints Interfacing to IPAMs Use NSX-T Data Center NAT in blueprints Use NSX-T Data Center routed networks Use NSX-T Data Center load balancers Use NSX-T Data Center security groups Use tags with NSX-T Data Center network profiles Using vRealize Orchestrator Create Day-2 Actions with vRealize Orchestrator workflows Troubleshoot vRealize Orchestrator cluster issues Use vRealize Orchestrator to add computer objects to Active Directory when vRealize Automation deploys blueprints Use a tagging approach to vRealize Orchestrator workflows Use dynamic forms with vRealize Orchestrator Using ABX Actions Determine when to use ABX and when to use vRealize Orchestrator Use ABX to create day-2 Actions Call PowerShell from ABX Kubernetes Integration Create a Kubernetes namespace from vRealize Automation Connect to an existing Kubernetes cluster Automate the deployment of an application to a Kubernetes cluster with Code Stream Use Kubernetes in Extensibility Code Stream Create and use CI/CD pipelines Use the Code Stream user interface Add states and tasks to a Code Stream pipeline Integrate code from Code Stream with Git Using GitLab Integration Configure the GitLab Integration Use Gitlab with blueprints Configuration Management Describe the use case of Ansible and Ansible Tower Connect to Ansible Tower Use Ansible playbooks Use Puppet in configuration management Troubleshooting vracli commands and when to use them Check the status of Kubernetes pods and services Correct the state of pods and services Diagnose and solve vRealize Automation infrastructure problems Diagnose and solve vRealize Automation failures to deploy blueprints and services Use vRealize Log Insight for troubleshooting Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Automation: Advanced Features and Troubleshooting [v8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Automation: Advanced Features and Troubleshooting [v8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Automation: Advanced Features and Troubleshooting [v8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Systems Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview In this course, you will learn to: Recognize the AWS services that support the different phases of Operational Excellence, a WellArchitected Framework pillar. Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM). Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config. Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment. Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog. Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches. Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance. Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand. Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment. Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config. Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service. State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment. Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier. Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report. This course teaches systems operators and anyone performing system operations functions how to install, configure, automate, monitor, secure, maintain and troubleshoot the services, networks, and systems on AWS necessary to support business applications. The course also covers specific AWS features, tools, andbest practices related to these functions. Module 1: Introduction to System Operations on AWS Systems operations AWS Well-Architected Framework AWS Well-Architected Tool Module 2a: Access Management Access management Resources, accounts, and AWS Organizations Module 2b: System Discovery Methods to interact with AWS services Introduction to monitoring services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Troubleshooting scenario Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config Module 3: Deploying and Updating Resources Systems operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower Troubleshooting scenario Module 4: Automating Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Troubleshooting scenario Hands-On Lab: Infrastructure as Code Module 5: Manage Resources AWS Systems Manager Troubleshooting scenario Hands-On Lab: Operations as Code Module 6a: Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 Module 6b: Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager Troubleshooting scenario Module 7: Monitor and Maintaining System Health Monitoring and maintaining healthy workloads Monitoring distributed applications Monitoring AWS infrastructure Monitoring your AWS account Troubleshooting scenario Hands-On Lab: Monitoring Applications and Infrastructure Module 8: Data Security and System Auditing Maintain a strong identity and access foundation Implement detection mechanisms Automate incident remediation Troubleshooting scenario Hands-On Lab: Securing the Environment Module 9: Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC Troubleshooting scenario Module 10a : Mountable Storage Configuring Amazon Elastic Block Storage (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Module 10b: Object Storage Deploying Amazon Simple Storage Service (Amazon S3) with Access Logs, Cross-Region Replication, and S3 Intelligent-Tiering Hands-On Lab: Automating with AWS Backup for Archiving and Recovery Module 11: Cost Reporting, Alerts, and Optimization Gain AWS expenditure awareness Use control mechanisms for cost management Optimize your AWS spend and usage Hands-On Lab: Capstone lab for SysOps Additional course details: Nexus Humans Systems Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Systems Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Systems Operations on AWS
Delivered OnlineFlexible Dates
Price on Enquiry