• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2390 Architect courses delivered Online

Solidworks: CSWA Exam Preparation

4.5(3)

By Studyhub UK

The course 'Solidworks: Complete CSWA Preparation' is designed to equip learners with the essential skills and knowledge required to pass the Certified SolidWorks Associate (CSWA) exam. Participants will gain proficiency in using SolidWorks software and develop a strong foundation in 3D modeling. Learning Outcomes: Master the fundamentals of SolidWorks software and its user interface. Acquire proficiency in 3D modeling techniques for creating complex parts and assemblies. Prepare effectively for the CSWA exam and be ready to demonstrate your competence in SolidWorks. Why buy this Solidworks: CSWA Exam Preparation? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Solidworks: CSWA Exam Preparation there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Solidworks: CSWA Exam Preparation course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Solidworks: CSWA Exam Preparation does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Solidworks: CSWA Exam Preparation was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Solidworks: CSWA Exam Preparation is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum INTRODUCTION 1.1. About the course 00:03:00 1.2. Tips for CSWA Exam 00:01:00 2. EXAM 1 2.1. Part 1 00:01:00 2.2. Part 2 00:18:00 2.3. Part 3 00:09:00 3. EXAM 2 3.1. Part 1 00:01:00 3.2. Part 2 00:18:00 3.3. Part 3 00:11:00 4. EXAM 3 4.1. Part 1 00:01:00 4.2. Part 2 00:22:00 4.3. Part 3 00:08:00 5. EXAM 1 5.1. Part 1 00:01:00 5.2. Part 2 00:17:00 5.3. Part 3 00:05:00 6 Official exam sample 6.1. Exam 00:00:00 Assignment Assignment - Solidworks: CSWA Exam Preparation 00:00:00

Solidworks: CSWA Exam Preparation
Delivered Online On Demand1 hour 56 minutes
£10.99

SA120 - Server Automation 10.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence

SA120 - Server Automation 10.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Troubleshooting [V8.6]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and cloud administrators who are already familiar with vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Learn installation best practices and troubleshoot installation failures Verify the correct DNS configuration Examine main logs and collect log bundles Examine the Kubernetes pods in the vRealize Automation architecture Troubleshoot common errors that prevent successful deployments Troubleshoot YAML code errors in VMware cloud templates Troubleshoot cloudConfig code errors in VMware cloud templates Troubleshoot VMware Identity Manager™ configuration errors Troubleshoot common errors in VMware vRealize Orchestrator™ workflows Use the vRealize Orchestrator debugger Use log outputs from vRealize Orchestrator Troubleshoot problems in custom resources Troubleshoot problems in resource actions Troubleshoot action-based extensibility (ABX) actions Integrate vRealize Automation with VMware vRealize Log Insight™ Integrate vRealize Automation with VMware vRealize Operations Manager™ Use VMware vRealize Lifecycle Manager™ to troubleshoot vRealize Automation problems with licenses and certificates Configure and replace certificates This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in troubleshooting VMware vRealize Automation™. vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. This course will enable you to troubleshoot common problems with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives Troubleshooting vRealize Automation Installation Issues vRealize Automation installation overview vRealize Automation installation best practices Troubleshooting installation failures vRealize Automation General Troubleshooting Verifying the DNS configuration settings in vRealize Automation and vSphere Examining the main logs in the user interface Collecting a log bundle Using vracli commands Examining the pods in the vRealize Automation Kubernetes architecture Dumping a log from a vRealize Automation Kubernetes pod Stopping and restarting a vRealize Automation Kubernetes pod vRealize Automation Cloud Templates and Deployment Troubleshooting Overview of provisioning and placement workflows Examining a deployment history Troubleshooting deployment issues Using deployment Dev mode Troubleshooting YAML code Troubleshooting problems with cloudConfig vRealize Automation Identity Manager Architecture and Cluster Architecture Authentication workflow in vRealize Automation Connector high availability for the authentication Architecture of a VMware Identity Manager cluster Key VMware Identity Manager commands and log files Troubleshooting a VMware Identity Manager problem Key vRealize Automation components Architecture of the vRealize Automation cluster vRealize Automation node failover scenario vRealize Automation cluster shutdown and startup process Virtual machine provisioning workflow Troubleshooting vRealize Orchestrator Workflows Overview of vRealize Orchestrator and vRealize Automation communications Using the vRealize Orchestrator debugger Using vRealize Orchestrator log output Troubleshooting vRealize Orchestrator binding errors Troubleshooting vRealize Orchestrator logic errors Troubleshooting vRealize Orchestrator payload errors Troubleshooting custom resource errors Troubleshooting resource action errors Troubleshooting Action Based Extensibility (ABX) Actions Overview of ABX actions Troubleshooting ABX actions vRealize Automation Integration with vRealize Tools Integrating vRealize Automation and vRealize Log Insight Integrating vRealize Automation and vRealize Operations Manager Using vRealize Operations Manager to monitor vRealize Automation vRealize Automation Certificate Management Managing vRealize Automation certificates Creating certificate requests with vRealize Lifecycle Manager Using Microsoft Certificate Services to create vRealize Automation certificates Replacing vRealize Automation certificates Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Automation: Troubleshooting [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Automation: Troubleshooting [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Automation: Troubleshooting [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Install, Configure, Manage [v8.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the vRealize Automation architecture and use cases in cloud environments Manage vRealize Automation entities on VMware and third-party virtual and cloud infrastructures Configure and manage Cloud Accounts, Projects, Flavor Mappings, Image Mappings, Network Profiles, Storage Profiles, Volumes, Tags, and Services Create, modify, manage, and deploy Cloud Templates Connect to a Kubernetes Cluster and manage namespaces Customize services and virtual machines with cloudConfig Configure and manage the Service Broker Configure and manage ABX actions, custom properties, event broker subscriptions, and vRealize Orchestrator workflows Integrate with vRealize Orchestrator Install vRealize Automation with Lifecycle Configuration Manager Describe Cloud Automation Services (Cloud Assembly and Code Stream). Integrate Cloud Assembly with Terraform and SaltStack Use logs and CLI commands to monitor and troubleshoot vRealize Automation During this five-day course, you focus on installing, configuring, and managing VMware vRealize© Automation?. You learn about how vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how to manage both on-premise systems and cloud services. The course covers how vRealize Automation Service Broker can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing vRealize Automation with other systems using VMware vRealize© Orchestrator? and how to use vRealize Automation to manage Kubernetes systems and leverage other systems. The course also covers integrating with Terraform and using SaltStack as a configuration management tool. Course Introduction Introductions and course logistics Course objectives vRealize Automation Overview and Architecture Describe the purpose and functionality of vRealize Automation Describe the vRealize Automation architecture Describe the use of VMware Workspace ONE© AccessTM Describe the relationship between Kubernetes clusters, containers, and vRealize Automation services Describe CLI commands for vRealize Automation 8 cluster management Describe Cloud Assembly Describe Service Broker Describe Code Stream Installing vRealize Automation List the different vRealize Automation deployment types Describe the purpose of vRealize easy installer Describe the vRealize Automation installation process Authentication and Authorization Identity the steps involved in integrating Workspace One with Active Directory Describe features of Workspace One Describe the user roles available in vRealize Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Quickly create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping. VMware Cloud Templates Configure and deploy a basic cloud template Create cloud templates that can run on any cloud Use cloudConfig to run commands, install software, and create users Use YAML for inputs, variables, and conditional deployments Tags and Storage Configuration Configure tags Describe different types of tags Manage tags Configure storage profiles Use tags and storage profiles Integrating NSX-T Data Center List the capabilities and use cases of NSX-T Data Center Describe the NSX-T Data Center architecture and components Integrate NSX-T Data Center with vRealize Automation List the supported network profiles in vRealize Automation Use NSX-T Data Center components to design a multitier application Cloud Template Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX-T day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation accounts Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Using Service Broker for Catalog Management Release a VMware Cloud Template? Define content source and content sharing Define Service Broker policy enforcement Use custom forms for catalog items vRealize Automation Extensibility Describe Extensibility Use event topics Create a subscription Call a vRealize Orchestrator workflow Create ABX actions Using Code Stream Introduction to Code Stream The CI/CD process Integrate GitLab with Code Stream and Cloud Assembly Use Code Stream to install software Using Terraform Integrate Cloud Assembly with Terraform Use Terraform with a VMware Cloud Template Use Terraform with Code Stream Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Integrate VMware Tanzu? Grid Integrated Edition Create a Supervisor Namespace as a catalog item Using SaltStack for Configuration Management Introduction SaltStack with vRealize Automation Use SaltStack for software deployment Use SaltStack for configuration management Use SaltStack with event-driven orchestration vRealize Automation Troubleshooting and Integration Location of logs Using Activity Monitoring deployment history Basic troubleshooting CLI commands Collecting logs (VAMI console) Integration with VMware vRealize© Log Insight? Integration with vRealize Operations Migrating vRealize Automation 7.x to 8

VMware vRealize Automation: Install, Configure, Manage [v8.3]
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-223: Implement Citrix ADC 13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting

CNS-223: Implement Citrix ADC 13.x
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Administrator (CKA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Professionals who need to maintain or set up a Kubernetes cluster Container Orchestration Engineers DevOps Professionals Overview Cluster architecture, installation, and configuration Rolling out and rolling back applications in production Scaling clusters and applications to best use How to create robust, self-healing deployments Networking configuration on cluster nodes, services, and CoreDNS Persistent and intelligent storage for applications Troubleshooting cluster, application, and user errors Vendor-agnostic cloud provider-based Kubernetes Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will go back to work with the knowledge, skills, and abilities to design, implement, and maintain a production-grade Kubernetes cluster. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Administrator (CKA) exam. You will be provided the components necessary to assemble your own high availability Kubernetes environment and configure, expand, and control it to meet the demands made of cluster administrators. Your week of intensive, hands-on training will conclude with a mock CKA exam that simulates the real exam. Cluster Architecture, Installation & Configuration Each student will be given an environment that allows them to build a Kubernetes cluster from scratch. After a detailed discussion on key architectural components and primitives, students will install and compare two production grade Kubernetes clusters. Review: Kubernetes Fundamentals After successfully instantiating their own Kubernetes Cluster, students will be guided through foundational concepts of deploying and managing applications in a production environment. Workloads & Scheduling After establishing a solid Kubernetes command line foundation, students will be led through discussion and hands-on labs which focus on effectively creating applications that are easy to configure, simple to manage, quick to scale, and able to heal themselves. Services & Networking Thoroughly understanding the underlying physical and network infrastructure of a Kubernetes cluster is an essential skill for a Certified Kubernetes Administrator. After an in-depth discussion of the Kubernetes Networking Model, students explore the networking of their cluster?s Control Plane, Workers, Pods, and Services. Storage Certified Kubernetes Administrators are often in charge of designing and implementing the storage architecture for their clusters. After discussing many common cluster storage solutions and how to best use each, students practice incorporating stateful storage into their applications. Troubleshooting A Certified Kubernetes Administrator is expected to be an effective troubleshooter for their cluster. The lecture covers a variety of ways to evaluate and optimize available log information for efficient troubleshooting, and the labs have students practice diagnosing and resolving several typical issues within their Kubernetes Cluster. Certified Kubernetes Administrator Practice Exam Just like the Cloud Native Computing Foundation CKA Exam, the students will be given two hours to complete hands-on tasks in their own Kubernetes environment. Unlike the certification exam, students taking the Alta3 CKA Practice Exam will have scoring and documented answers available immediately after the exam is complete, and will have built-in class time to re-examine topics that they wish to discuss in greater depth.

Certified Kubernetes Administrator (CKA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Deploying Cisco SD-Access (ENSDA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers Network Engineers Technical Architects Technical Support Personnel Channel Partners Resellers Overview Upon completing the course, the learner will be able to meet these overall objectives: Describe Cisco SD-Access and how it relates to Cisco DNA Orchestrate a Cisco SD-Access solution using the Cisco DNA Center™ orchestration platform Use the Network Data Platform to demonstrate the assurance and analytics capabilities of SD-Access The Deploying Cisco SD-Access (ENSDA) v1.0 course is an instructor-led, lab based, hands-on course that teaches students how to successfully deploy the Cisco© Software-Defined Access (SD-Access) solution within their enterprise networks. The course discusses how Cisco SD-Access fits into the Cisco Digital Network Architecture (Cisco DNA?). It covers SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. Module 1: Cisco SD-Access Overview Lesson 1: Exploring Cisco SD-Access Lesson 2: Describing the Cisco SD-Access Architecture Lesson 3: Exploring Cisco DNA Center Lesson 4: Configuring Underlay Automation Module 2: Cisco SD-Access Implementation Lesson 1: ISE Integration in DNA Center Lesson 2: Policy Provisioning Basics Lesson 3: Navigating and Managing the Policy Application Workflows Module 3: Cisco SD-Access Border Operations Lesson 1: Cisco SD-Access Deployment Models Lesson 2: Connecting the Fabric to External Domains Module 4: Wireless Integration Orchestration Lesson 1: Integrating Wireless with the Cisco SD-Access Solution Lesson 2: Workflow of Cisco SD-Access Wireless Lesson 3: Cisco SD-Access Wireless Network Design Lesson 4: Cisco SD-Access Wireless Basic Operation Module 5: Cisco SD-Access Assurance and Migration Lesson 1: Cisco Network Data Platform Lesson 2: Cisco SD-Access Migration Strategies

Cisco Deploying Cisco SD-Access (ENSDA)
Delivered OnlineFlexible Dates
Price on Enquiry