• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

838 Architecture courses in Haslingden delivered Live Online

Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network designers Sales engineers Wireless network engineers Overview Objectives After taking this course, you should be able to: Implement network settings to provide a secure wireless network infrastructure Implement a secure wireless client and troubleshoot wireless client connectivity issues Implement and troubleshoot QoS in wireless networks Implement and troubleshoot advanced capabilities in wireless network services The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You?ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.This course provides hands-on labs to reinforce concepts including deploying Cisco Prime Infrastructure Release 3.5, Cisco Catalyst© 9800 Wireless Controller Release, Cisco IOS XE Gibraltar 16.10, Cisco Digital Network Architecture (Cisco DNA) Center Release 1.2.8, Cisco Connected Mobile Experiences (CMX) Release 10.5, Cisco Mobility Services Engine (MSE) Release 8.0 features, and Cisco ISE Release 2.4.This course also helps you prepare to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the new CCNP© Enterprise certification and the Cisco Certified Specialist - Enterprise Wireless Implementation certification. Course Outline Securing and Troubleshooting the Wireless Network Infrastructure Implementing and Troubleshooting Secure Client Connectivity Implementing and Troubleshooting Quality of Service (QoS) in Wireless Networks Implementing and Troubleshooting Advanced Wireless Network Services Lab Outline Lab Familiarization (Base Learning Lab) Configure Secure Management Access for Cisco Wireless LAN Controllers (WLCs) and Access Points (APs) Add Network Devices and External Resources to Cisco Prime Infrastructure Customize Cisco Prime Infrastructure for Network Monitoring Capture a Successful AP Authentication Implement Authentication, Authorization, and Accounting (AAA) Services for Central Mode WLANs Implement AAA Services for FlexConnect Mode Wireless LANs (WLANs) Configure Guest Services in the Wireless Network Configure Bring Your Own Device (BYOD) in the Wireless Network Capture Successful Client Authentications Configure QoS in the Wireless Network for Voice and Video Services Configure Cisco Application Visibility and Control (AVC) in the Wireless Network Configure multicast DNS (mDNS) in the Wireless Network Capture Successful QoS Traffic Marking in the Wireless Network Configure, Detect, and Locate Services on the Cisco CMX Additional course details: Nexus Humans Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI)
Delivered OnlineFlexible Dates
Price on Enquiry

ISTQB Certified Tester, Advanced Level - Technical Test Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers, Functional Testers, Test Automation Specialists, Performance Specialists, Environment and Data Specialists, Security Specialists Prerequisites for taking part in the workshop: It is recommended that participants should have completed the ISTQB© Certified Tester Foundation Level certification, or have attended the workshop. Overview Defined tasks need to be structured according to the technical requirements and the internal structure of the system needs to be analysed in detail in order to achieve the expected level of quality and detect errors during development. The ISTQB© Advanced Level Technical Test Analyst certification will teach you on the basis of the current ISTQB© Advanced Level syllabus. The various procedures, techniques and tools for non-functional system testing will be explained, and you will then be in a position to apply these in your future work as a Technical Test Analyst. The three-day certification will be followed by a two-hour examination. During the workshop, our experienced trainers will fully prepare you for the ISTQB© Advanced Level Technical Test Analyst examination. Following on from the ISTQB© Certified Tester Foundation Level training, this workshop covers the increasing technical challenges faced by system testing in particular. Topic 1 Tasks of a Technical Test Analyst in risk-based testing Topic 2 Structure-based testing: Simple condition test, condition/decision test, modified condition/decision test, multiple condition test, path test, API test, selection of structure-based procedures Topic 3 Analytical testing methods: static analysis (control flow analysis, data flow analysis, improved maintainability/adaptability with static analysis, call graphs), dynamic analysis (detection of memory leaks/?rogue? pointers, analysis of system performance) Topic 4 Quality features in technical tests (ISO 25000 standard): Planning aspects of technical testing, security testing, reliability testing, performance testing, resource usage, maintainability testing, portability testing Topic 5 Review checklists (architecture and code reviews) Topic 6 Testing tools and automation, tool integration, test automation projects, specific testing tools Topic 7 Practical exercises on all core topics Notes In order to take the examination, you must show at least 18 months? practical experience as a tester and be certified at ISTQB© Foundation Level. Confirmation from your employer or from your reference customers are accepted as proof of practical experience. Additional course details: Nexus Humans ISTQB Certified Tester, Advanced Level - Technical Test Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Certified Tester, Advanced Level - Technical Test Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ISTQB Certified Tester, Advanced Level - Technical Test Analyst
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Application Development I: Programming in Java EE (AD183)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE), Proficiency in developing Java SE applications, with 2+ years of experience required, Proficiency in using an IDE such as Red Hat Developer Studio or Eclipse, Experience with Maven is recommended but not required. Overview Red Hat Application Development I: Programming in Java EE Virtual Training exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). As an experienced Java Standard Edition (Java SE) developer, this course introduces you to the world of Java Enterprise Edition (Java EE). You will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. This course is based on Red Hat© Enterprise Application Platform 7.0. 1 - TRANSITION TO MULTI-TIERED APPLICATIONS Describe Java EE features and distinguish between Java EE and Java SE applications. 2 - PACKAGE AND DEPLOY APPLICATIONS TO AN APPLICATION SERVER Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. 3 - CREATE ENTERPRISE JAVA BEANS Develop Enterprise Java Beans, including message-driven beans. 4 - MANAGE PERSISTENCE Create persistence entities with validations. 5 - MANAGE ENTITY RELATIONSHIPS Define and manage JPA entity relationships. 6 - CREATE REST SERVICES Create REST APIs using the JAX-RS specification. 7 - IMPLEMENT CONTEXTS AND DEPENDENCY INJECTION Describe typical use cases for using CDI and successfully implement it in an application. 8 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 9 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 10 - COMPREHENSIVE REVIEW OF RED HAT JBOSS DEVELOPMENT I: JAVA EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE (AD183) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE (AD183) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Application Development I: Programming in Java EE (AD183)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Certified Engineer (VMCE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants are any IT specialist eager to become an industry recognized expert on Veeam software solutions:System Engineer / Administrator Backup / Virtualization Administrators Pre-Sales / Post-Sales / Solution Architects / Consultants Overview This certification is an excellent investment for an IT professional looking to increase productivity, reduce operating costs, increase potential for personal career advancement and gain recognition from the employer and customers. By completing the Veeam Certified Engineer (VMCE) course you should be able to:Get more functionality out of Veeam solutionsIdentify and resolve issues more efficientlyGain a distinction from your peers The Veeam Certified Engineer (VMCE) course is a 3 day technical deep-dive focused on teaching consultants and engineers to architect, implement, optimize and troubleshoot the Veeam software solution. Introduction Introduction Overview of Veeam products Hypervisor Support Veeam Backup & Replication key features Veeam One key features Veeam Management Pack vCloud Director Support Key concepts Backup Methods Scheduling Changed Block Tracking (CBT) Compression and Deduplication Retention Policy Veeam ONE features and functionality Auto Discovery of Backup and Virtual Infrastructure Business Categorization Pre-Defined Alerting Unattended monitoring Reporting and dashboards Agentless data gathering Hyper-V specific features Veeam One Deployment Veeam One assessment Tool Deployment Solution Architecture Deployment Scenarios Prerequisites Upgrading Veeam Backup & Replication Initial Configuration Adding Servers Adding a VMware Backup Proxy Adding a Hyper-V Offhost Backup Proxy Adding Backup Repositories Performing Configuration Backup and Restore Getting to Know User Interface Performing Backup Creating Backup Jobs Creating VM Copy Jobs Instant VM Recovery Replication (Replication Job, Failover, Failback) Insight into Replication Insight into Failover Insight into Failback SureBackup, SureReplica SureBackup Recovery Verification SureReplica Restore your VMs and Objects Data Recovery Restoring Microsoft Exchange and SharePoint objects Working with Veeam Backup & Replication Utilities 3-2-1 rule (Backup to tape, WAN, Backup Copy) Wan Accelerator Offsite Backup Copy Job Delegate file and VM restores with Veeam Backup Enterprise Manager Veeam Backup Enterprise Manager RESTful API HP StoreVirtual VSA Product Editions Product Editions Comparison Full and Free Troubleshooting How to review and analyze the issue Search for additional information Veeam Support Additional course details: Nexus Humans Veeam Certified Engineer (VMCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Certified Engineer (VMCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Certified Engineer (VMCE)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-314 Citrix App Layering and WEM Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment or Citrix Cloud looking to expand their Citrix Virtual Apps and Desktops skills to an advanced level. Potential students include administrators or engineers responsible for the Citrix Apps and Desktop 7 Site. Overview After completing this course you should be able to: Configure Workspace Environment Management to improve the end user environment and virtual resource consumption Implement App Layering skills, for example how to create and administer OS, platform, application, elastic and user layers Migrate to Workspace Environment Management Students will learn to build and combine App Layers to optimize management of your app and desktop images and to implement Workspace Environment Management to improve log-on times, centralize user settings management, and optimize the performance of machines. Students will leave this course with a good understanding of how to manage more complex solutions and features in their Citrix Virtual Apps and Desktop 7 site. Introduction to App Layering App Layering Introduction Architecture and How it Works The OS Layer Creating an OS Layer The Platform Layer Creating a Platform Layer The App Layers Creating App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Environment Management Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Security Features Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations Additional course details: Nexus Humans CWS-314 Citrix App Layering and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-314 Citrix App Layering and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-314 Citrix App Layering and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Enterprise Advanced Routing and Services v1.0 (ENARSI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Enterprise network engineers System engineers System administrators Network administrators Overview After taking this course, you should be able to: Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP service level agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course may earn a Credly Badge Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Troubleshooting DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Lab Outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication LAB: Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Implement PBR Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Control Plane Policing Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2

Cisco Implementing Cisco Enterprise Advanced Routing and Services v1.0 (ENARSI)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified IT Specialist (CITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified IT Specialist (CITS)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting Adv HPE Server Solutions Rev 16.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidate for this course Consultants Pre-sales Engineers Sales Engineers Systems Engineers Solutions Architects Overview This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills Recognizing Industry Trends Describe trends affecting enterprises and explain how these trends lead to the four Transformation Describe key business challenges enterprises are facing. Review the role of a server architect, emphasizing how the architect helps companies. Provide an overview of the HPE enterprise server solutions covered in this course: Apollo solutions Moonshot Integrity Superdome X Gathering Customer Requirements Identify key decision makers and explain how to engage them in a discussion about the company?s business requirements and challenges Obtain data and documentation required to understand the company? business requirements Explain best practices for creating requirements statements and documents Advanced Architecture for Server Solutions Analyze the special needs of data, High Performance Computing (HPC), and mission-critical workloads Given a customers? specific requirements, architect a solution for a data, HPC, and mission critical workloads HPE Apollo Solutions for HPC Explain the features and benefits of HPE Apollo 2000, 6000, and 8000 solutions Position HPE Apollo 2000 and 6000 solutions for the right use cases and workloads Create an implementation plan for an HPE Apollo 2000 or 6000 solution, including plans for the proper performance, scalability, high availability, and management HPE Apollo 4000 for Data-Driven Organizations Briefly describe the HPE Apollo 4000 portfolio Position HPE Apollo 4000 solutions for the right use cases Create an implementation plan for an HPE Apollo 4000 solution, including plans for the proper performance, scalability, and high availability HPE Moonshot Solutions Briefly describe the HPE Moonshot portfolio Position HPE Moonshot solutions for the right use cases Explain options and best practices for designing the networking component of an HPE Moonshot solution HPE Moonshot Workloads Position HPE Moonshot cartridges for the right use cases and workloads Create an implementation plan for the following solutions, including plans for the proper performance, scalability, and high availability: Big data and analytics solution Video processing solution Mobile workspace solution Web infrastructure solution HPE Integrity Superdome X Solutions Explain the benefits of the HPE Integrity Superdome X and describe its available options Explain the benefits of nPar and RAS features for HPE Integrity X solutions Position HPE Integrity Superdome X solutions for the right use cases Create an implementation plan for HPE Integrity X solutions, including plans for the proper performance, scalability, fault tolerance, high availability, and manageability Monitoring and Managing HPE Solutions Recommend and substantiate the HPE management tools that optimize administrative operations for various customer environments Explain the benefits of the HPE Representational State Transfer (REST) application program interface (API) Working with Customer Business Financials Demonstrate business acumen through an ability to analyze financial statements Define basic financial terms used when talking with a customer's executive officers Calculate key performance indicators (KPIs) to analyze a customer's financial health and understand industry and company trends Use HPE tools analyze a company's financial position Additional course details: Nexus Humans Architecting Adv HPE Server Solutions Rev 16.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting Adv HPE Server Solutions Rev 16.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting Adv HPE Server Solutions Rev 16.21
Delivered OnlineFlexible Dates
Price on Enquiry