• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2390 Architect courses delivered Online

Cisco Intersight Overview (DCISO)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Intersight Overview (DCISO)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

KM213 IBM InfoSphere QualityStage Essentials v11.5

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data Analysts responsible for data quality using QualityStageData Quality ArchitectsData Cleansing Developers Overview List the common data quality contaminantsDescribe each of the following processes: Investigation, Standardization, Match. & SurvivorshipDescribe QualityStage architectureDescribe QualityStage clients and their functionsImport metadataBuild and run DataStage/QualityStage jobs, review resultsBuild Investigate jobsUse Character Discrete, Concatenate, and Word Investigations to analyze data fieldsDescribe the Standardize stageIdentify Rule SetsBuild jobs using the Standardize stageInterpret standardization resultsInvestigate unhandled data and patternsBuild a QualityStage job to identify matching recordsApply multiple Match passes to increase efficiencyInterpret and improve match resultsBuild a QualityStage Survive job that will consolidate matched records into a single master recordBuild a single job to match data using a Two-Source match This course teaches how to build QualityStage parallel jobs that investigate, standardize, match, and consolidate data records. Students will gain experience by building an application that combines customer data from three source systems. Data Quality Issues Listing the common data quality contaminants Describing data quality processes QualityStage Overview Describing QualityStage architecture Describing QualityStage clients and their functions Developing with QualityStage Importing metadata Building DataStage/QualityStage Jobs Running jobs Reviewing results Investigate Building Investigate jobs Using Character Discrete, Concatenate, and Word Investigations to analyze data fields Reviewing results Standardize Describing the Standardize stage Identifying Rule Sets Building jobs using the Standardize stage Interpreting standardize results Investigating unhandled data and patterns Match Building a QualityStage job to identify matching records Applying multiple Match passes to increase efficiency Interpreting and improving Match results Survive Building a QualityStage survive job that will consolidate matched records into a single master record Two-Source Match Building a QualityStage job to match data using a reference match Additional course details: Nexus Humans KM213 IBM InfoSphere QualityStage Essentials v11.5 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM213 IBM InfoSphere QualityStage Essentials v11.5 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

KM213 IBM InfoSphere QualityStage Essentials v11.5
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Cisco Partner Sales Engineers and Field engineers supporting customers with 802.1x solutions. The primary audience for this course is Cisco Channel Partner SEs and FEs that are seeking to meet the education requirements to attain ATP authorization to sell Cisco ISE. The secondary audience for this course is security architects, design engineers, and others seeking hands-on experience with Cisco TrustSec 802.1X deployments with Cisco ISE Overview Upon completing this course, students will be able to meet these objectives:- Describe identity-based networking concepts and components - Define the components and processes of port-based authentication - Identify the 802.1X components and their interrelation at a high level - Identify requirements and options for non-supplicant devices - Position individual components of an 802.1X network and identify compatibilities Students will gain the foundational knowledge of IEEE 802.1X protocol; the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation; hands-on experience configuring a network for 802.1X-based network services. Cisco TrustSec Surveying Cisco TrustSec Surveying Cisco TrustSec Architecture Components Port-Based Authentication Surveying the IEEE 802.1X Standard Surveying 802.1X and EAP Surveying 802.1X and EAP Configure Devices for 802.1X Operation Identifying 802.1X Components and Topologies Identifying 802.1X Components and Topologies Configuring Network Devices for 802.1X Configuring Supplicants for 802.1X Operation Configure Guest Access Configuring Cisco TrustSec for Non-Supplicant Devices Configuring Cisco WebAuth for Non-Supplicant Devices Design Cisco TrustSec Networks with Cisco ISE and 802.1X Identifying Component Compatibilities with 802.1X Reviewing 802.1X Design Considerations that Impact Implementation Reviewing Scalable 802.1X Architectures Additional course details: Nexus Humans Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Operations: Advanced Use Cases [v8.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Use the applications to group objects Create the logical groups of objects in the vRealize Operations environment Create and design advanced dashboards Discuss about widget and its settings Define a vRealize Operations policy Outline the components of a vRealize Operations policy Create the custom alerts Describe the troubleshooting workbench Review the advanced capacity concepts Discuss the what-if analysis scenarios Describe how to integrate vRealize Operations with VMware vRealize© Suite products Import the VMware vRealize© Network Insight? applications Describe the super metrics use cases Outline the vRealize Operations REST API architecture Discuss the vRealize Operations traversal spec Create and query objects using the REST API This two-day hands-on training course provides advanced knowledge, skills, and tools to achieve competency in operating VMware vRealize© Operations? 8.X. This course explains the design and creation of advanced dashboards, capacity concepts, and the REST API with real-world use cases. Course Introduction Introduction and course logistics Course objectives Custom Groups and Applications Outline the use cases for custom groups Create the custom groups Assign the objects to custom groups Identify the use cases for applications Create the custom applications Identify the vRealize Network Insight applications Custom Dashboard Design Design the dashboards Discuss the types of widgets and widget?s settings Select the widgets based on the scenario Explain the advanced dashboards Discuss the use cases of dashboards Custom Policies Outline the components of a vRealize Operations policy Review the policies applied to the objects in vRealize Operations Outline how the policy hierarchy is implemented Design a vRealize Operations Policy Understand how a policy supports the business objectives Alerts, Symptoms and Troubleshooting workbench Identify the use case for custom alerts and symptoms Create the custom alerts and symptoms Access the troubleshooting workbench feature Use the troubleshooting workbench feature to identify problems Outline the metric correlation options in vRealize Operations Capacity Models and What-if Scenarios Review the capacity planning concepts Describe the demand based and allocation-based model Discuss the use cases of capacity models Discuss the use cases of what-if analysis scenarios vRealize Operations integration Integrate vRealize Operations with products in vRealize Suite Identify the advantages of integrating vRealize Operations with vRealize Log Insight Import the vRealize Network Insight applications Configure the integration with vRealize Automation Super Metrics Create super metrics Explain the depth value Discuss the use cases of super metrics vRealize Operations REST API Outline the REST API architecture Navigate the REST API landing page Discuss the Swagger response codes Explain the vRealize Operations traversal specification Create and query objects using the REST API Discuss some of the examples of the REST API

VMware vRealize Operations: Advanced Use Cases [v8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Advanced Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Identify the architecture for a cluster configuration and Carbon Black EDR cluster communication Describe the Carbon Black EDR server data types and data locations Use the API to interact with the Carbon Black EDR server without using the UI Create custom threat feeds for use in the Carbon Black EDR server Perform the integration with a syslog server Use different server-side scripts for troubleshooting Troubleshoot sensor-side configurations and communication This course teaches you how to use the advanced features of the VMware Carbon Black© EDR? product. This usage includes gaining access to the Linux server for management and troubleshooting in addition to configuring integrations and using the API. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. This class focuses exclusively on advanced technical topics related to the technical back-end configuration and maintenance Course Introduction Introductions and course logistics Course objectives Architecture Data flows and channels Sizing considerations Communication channels and ports Server Datastores SOLR database Storage configurations and data aging Partition states Postgres Modulestore EDR API CBAPI overview Viewing API calls in the browser Utilizing the API to access data Threat Intelligence Feeds Feed structure Report indicator types Custom threat feed creation and addition Syslog Integration SIEM support Configuration Troubleshooting Server-side scripts Server logs Sensor operations Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR Advanced Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR Advanced Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR Advanced Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

DevOps Engineering Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Engineering Foundation course are individuals involved in engineering and technical practices such as: DevOps Practice owners and process designers Developers, QA engineers and Managers who are interested in understanding how DevOps works. Employees and managers responsible for engineering or improving processes. Consultants guiding their clients through process improvement and DevOps initiatives. Anyone responsible for: Managing process-related requirements Ensuring the efficiency and effectiveness of processes Maximizing the value of processes Overview The learning objectives for DevOps Engineering Foundation include an understanding of: How to engineer DevOps solutions DevOps Technologies Applications Architectures Continuous Integration Continuous Testing Ephemeral Elastic Infrastructures Continuous Delivery and Deployment Metrics, Monitoring, Observability and Governance DevOps Humans Future Trends This course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution. DevOps Engineering Introduction DevOps Foundations Principles and Practices Related Frameworks Performance and Benefits DevOps Technology Source and Artifacts Control CI/CD pipelines Tools and Toolchains Application Release Automation Value Stream Management Applications Architectures and Continuous Integration Application Architectures Containers Continuous integration Continuous Testing CT Tenets Test creation & TDD Test acceleration Test results Test management Test environment management Ephemeral Elastic Infrastructures Virtual and Cloud Configuration management Infra-as-code Containers Orchestration GitOps Continuous Delivery and Deployment Continuous Delivery and Deployment Release Automation Deployment Strategies Metrics, Monitoring, Observability, Governance DevOps Metrics Monitoring Observability Governance DevOps Engineering Humans Culture Team Topologies Continuous Learning Future DevOps Trends Additional course details: Nexus Humans DevOps Engineering Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Engineering Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Engineering Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware SD-WAN: Deploy and Manage [V4.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, network administrators, and system integrators responsible for designing and implementing networking solutions Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Discuss the SD-WAN architecture and platform deployment model options Identify and describe the SD-WAN solution components Explain the interaction between the SD-WAN Edge, Orchestrator, and Gateway components Describe the SD-WAN Software-Defined Networking (SDN) approach, traffic, and network flows Explore SD-WAN core features and evaluate how these dramatically improve operational automation Use SD-WAN features to perform simple, agile, and secure SD-WAN operations Simplify branch infrastructure by inserting network services on the branch edge, in the cloud, or in the regional and enterprise data centers This course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud environment. In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud. Course Introduction Introductions and course logistics Course objectives Introduction to VMware SD-WAN Solution Revisit the traditional WAN technology, WAN topologies and downsides Explain the challenges solved by Secure Access Service Edge (SASE) and use cases List the components of the VMware SASE? solution Describe the VMware SD-WAN solution and list its capabilities VMware SD-WAN Components and Architecture Understand the architecture of the VMware SD-WAN solution and list all its components Explain the function of VMware SD-WAN Edges, Hub, Gateways, controllers, and Orchestrator Explain how the components of the VMware SD-WAN solution interact with each other Using VMware SD-WAN Orchestrator Describe key attributes of the VMware SD-WAN Orchestrator List primary features of the VMware SD-WAN Orchestrator Navigate the main menus of the VMware SD-WAN Orchestrator portal Deploy and Configure VMware SD-WAN Understand the deployment process of VMware SD-WAN components like VMware SD-WAN Edges, Hubs, Gateways, and more Understand the workflow of the VMware SD-WAN configuration List the optional network services that are supported by VMware and the steps to configure the same Understand the profiles and their application in the VMware SD-WAN infrastructure Describe the VMware SD-WAN Edge activation process Path and Traffic Management List the routing options supported by VMware SD-WAN: Static, BGP, OSPF Understand the Dynamic Multipath Optimization (DMPO) feature and its advantages Explain the Quality of Service and its configuration to manage traffic Securing VMware SD-WAN Environment Explain various options available to secure VMware SD-WAN environments. Understand the firewall capabilities and configuration Monitoring, Maintenance, and Troubleshooting List and understand the various features available to monitor the VMware SD-WAN infrastructure List and understand the various options available to troubleshoot and investigate issues in VMware SD-WAN

VMware SD-WAN: Deploy and Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry