• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

838 Architecture courses delivered Live Online

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Oracle Database 12c - Administration Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase AdministratorsDatabase DesignersSupport EngineerTechnical Administrator Overview Monitor the DatabaseManage Database PerformanceImplement Database AuditingConfigure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and TasksSchedule Jobs to Run Inside or Outside of the DatabaseConfigure Oracle Net ServicesConfigure your Database For Backup and Recovery OperationsDescribe Oracle Database ArchitectureManage the Oracle Database InstanceManage Oracle Database Storage structuresCreate and Administer User Accounts The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance. The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.

Oracle Database 12c - Administration Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

SAPTEC Technology Fundamentals for SAP S/4HANA and SAP Business Suite

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System Administrators, System Architects, Database Administrators, Help Desk/COE Support, and Program/Project Managers. Overview Presentation in detail of the architecture of SAP NetWeaver Application Server (SAP NetWeaver AS).Learn effective techniques for navigating.Receive an overview of the development process in an SAP system landscape In this course, students gain knowledge about the fundamentals of SAP NetWeaver Application Server. SAP Systems Explaining the Key Capabilities of SAP NetWeaver Explaining the Architecture of an SAP System, Application Server (AS) ABAP and Application Server (AS) Java Navigation Basics Navigating with SAP Graphical User Interface (GUI) for Windows in AS ABAP Systems Navigating with a Browser in AS Java Systems System Core Explaining AS ABAP and AS Java System Architecture Identifying the Processes of an AS ABAP System Processing User Requests in AS ABAP Using Additional Processes of an AS ABAP System Explaining the Processes of an AS Java System Software Development in SAP Systems Outlining the Data Structure of an AS ABAP System Managing Transports in the ABAP Environment Explaining ABAP Workbench Tools Developing and Transporting an ABAP Repository Object Developing Applications in AS Java Developing Applications in Eclipse for ABAP Communication and Integration Technologies Describing Communication with Remote Function Call-Based (RFC) Technology Describing the Basics of Web Services Describing OData in SAP Gateway Application Lifecycle Management (ALM) Explaining Application Lifecycle Management (ALM) Describing the Installation of an SAP System Describing the Maintenance of an SAP System SAP Portfolio Overview Identifying the Platform, Database, and User Experience in the SAP Technology Portfolio Outlining Additional Components of the SAP Technology Portfolio Identifying the Components of the SAP Applications Portfolio SAP User Interfaces Accessing AS ABAP Systems with SAP GUI Accessing SAP Systems Using Other User Interfaces Additional Information Sources Accessing the SAP Service Marketplace (SMP) Accessing the SAP Community Network (SCN)

SAPTEC Technology Fundamentals for SAP S/4HANA and SAP Business Suite
Delivered OnlineFlexible Dates
Price on Enquiry

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Customers and systems operators that want to learn fundamental AOS concepts and navigate Prism on AHV. Junior IT administrators and business leaders who manage Nutanix clusters in the datacenter and want a formal, hands-on, detailed introduction to Nutanix datacenter administration. The Nutanix Hybrid Cloud Fundamentals course introduces you to the products, capabilities, and technologies that serve as the foundation of Nutanix?s Hybrid Cloud solution.Begin by exploring the history of this technology space, including different types of clouds, and how on-prem and public infrastructures came together to create hybrid operating models. Then, delve deeper into essential Nutanix products ? AOS, AHV, and Prism ? while discussing how these products were designed to solve business challenges.And conclude by discussing certain fundamental aspects involved in operating the Nutanix Hybrid Cloud, such as cluster updates, managing virtual machines, reporting and performance metrics, and more Module 1: Introduction Describe course terminology, such as three-tier architecture, hyperconverged architecture, and public, private, and hybrid clouds. Module 2: Understanding AOS Concepts Describe self-healing architecture Describe replication factor Describe Nutanix multicloud solutions Module 3: Understanding Cluster Management Concepts Explain Prism Element features and benefits Explain Prism Central features and benefits Manage the Image Repository Upgrade the hypervisor and AOS on a cluster Describe Life Cycle Manager. Module 4: Understanding Storage Concepts Define a storage pool and storage container Identify components of AOS Distributed Storage Identify space-saving technologies Module 5: Managing VMs Create and manage virtual machines (VMs) Add a VM to a category Describe Acropolis Dynamic Scheduler (ADS) Describe data locality Module 6: Monitoring VMs and Cluster Health Use metrics to identify performance issues Measure VM performance using Nutanix tools: Health dashboard, Analysis dashboard, Alerts dashboard Use the Support Portal and Insights Module 7:Understanding Data Protection Concepts Describe how to enable data protection on a VM Define a retention policy Define Nutanix Mine Identify the different types of replication targets

NHCF Nutanix Hybrid Cloud Fundamentals (v5.15)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-115 Citrix Virtual Apps and Desktops 7 Help Desk Support

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for those supporting a Citrix Virtual Apps and Desktops solution in a help desk or service desk capacity. An ideal candidate for this course interacts with end users to troubleshoot and resolve issues. Overview How to support end-users connecting to Citrix Virtual Apps and Desktops through Citrix Workspace App. How to use Citrix Director to gather information and interact with user sessions. A methodology to approach user related issues to minimize time to resolution. An understanding of the Citrix Virtual Apps and Desktops solution and the role of the components Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team. Gain foundational knowledge about the Citrix Virtual Apps and Desktops technology and an understanding of how components interact. You will learn about each component focusing on common user related issues that may arise, and how to apply a methodical approach to solve them using real world scenarios. By the end of the course, you will be able to solve or escalate end-user issues appropriately Fundamental Architecture for the Help Desk Role Citrix Site Infrastructure and Deployment Models The Help Desk Role in the Fundamental Architecture Problem Resolution Methodology Citrix Director and its role in Help Desk Support Citrix Director Role and Purpose Access to Director for Help Desk Administrators Common Director Monitoring Tasks Common Help Desk AdministratorTroubleshooting Tasks Providing and Troubleshooting End User Access End User Access Overview Components between end users and published resources on VDAs User Experience Support End User Access Citrix Workspace App Workspace App Types Deploying Citrix Workspace app Pass though Authentication Supporting Citrix Workspace App User Sessions FlexCast Architecture User Sessions App and Desktop Launch Process User Profiles HDX Technologies Printing Introduction to Printing Printing Components Overview Supporting Printing

CWS-115 Citrix Virtual Apps and Desktops 7 Help Desk Support
Delivered OnlineFlexible Dates
Price on Enquiry

MySQL Course Intermediate, 3 DAYS

4.6(12)

By PCWorkshops

Practical MySQL Course Intermediate, to leave you fully conversant with queries, DML and DDL statements. Hands-on, Practical MySQL Course Intermediate. PCWorkshops MySQL Course Intermediate Certificate. Max 4 people per course, we keep it personalised.

MySQL Course Intermediate, 3 DAYS
Delivered OnlineFlexible Dates
£600

3D AutoCAD Basics to Advanced Training Course

By ATL Autocad Training London

Why Choose 3D AutoCAD Basics to Advanced Training Course? Students learn how to create and modify both solid and surface models. This AutoCAD Training course also teaches students how to present their designs in 3D products and designs. Check our Website Duration: 16 hours Approach: 1-on-1, Book your own day and time. We are open Monday to Saturday 9 am to 7 pm.  How to Book this course? Call us on 02077202581 and we will book the dates and times you like. Flexible Schedule: 1-on-1 Face to Face or Live Online. AutoCAD 3D Training: Comprehensive Course Overview Exploration of 3D Modeling and Imaging Generating 3D Drawings Navigating the 3D Modeling Workspace Crafting 3D Shapes using Solid Tools Extruding Polylines into 3D Forms Isolating Coordinates with Point Filters Navigating and Orienting Your Model Achieving Visual Effects Converting 3D Views into 2D AutoCAD Drawings Advanced 3D Techniques Setting Up AutoCAD for 3D Mastering the User Coordinate System Leveraging UCS Options Utilizing Viewports for 3D Drawing Employing Array Tools Crafting Complex 3D Surfaces Constructing Spiral Forms Developing Surface Models Manipulating Objects in 3D Space Rendering and Visualization of 3D Drawings Introduction to Rendering Rapid Rendering Techniques Simulating Sunlight and Shadows Application and Adjustment of Materials Creating Effects with Lights and Materials Texture Mapping and Adjustments Exploration of Rendering Options Enhancing Views with Cameras Printing Rendered Drawings Simulating Natural Lighting Editing and Visualizing 3D Solids Overview of Solid Modeling Creation of Basic and Complex Solids Editing Solid Forms Improving the 2D Drawing Process Visualization and Analysis of Solids Exploration of 3D Mesh and Surface Modeling Introduction to 3D Meshes and Surfaces Creation and Editing of 3D Meshes Crafting Mesh Surfaces Conversion of Meshes to Solids Understanding and Editing 3D Surfaces Customization of Interface and Tools Customization of Workspaces Personalization of the User Interface Creation of Macros in Tools and Menus Working with Expanded Text Boxes Saving and Managing Customizations Exploration of the Diesel Macro Language Designing Custom Linetypes and Hatch Patterns Management and Sharing of Your Drawings Sharing Drawings Online ePublishing Your Work Managing Drawings with DesignCenter and Tool Palettes Exploring the Drawing Library with Content Explorer Establishment of Office Standards Conversion of Layer Settings https://www.autodesk.co.uk  Download a free 30-day trial of AutoCAD Learning outcomes after completing the AutoCAD 3D course. Professional Presentation: Create dynamic walkthroughs and presentations that effectively communicate your 3D models and designs. Certification: Obtain a certification as proof of your proficiency in AutoCAD 3D modeling, validating your skills in the industry. Mastery of 3D Modeling: Possess comprehensive skills, from fundamental concepts to advanced techniques in 3D modeling. Enhanced Career Prospects: Improve your career opportunities and prospects in various design-related fields such as architecture, engineering, and product design. Realistic Rendering: Be able to create highly realistic visualizations that enhance the quality of your designs. Practical Hands-On Experience: Gain practical experience and confidence in 3D modeling through extensive hands-on practice. Personalized Learning: Benefit from one-on-one attention and tailored training to meet your specific learning needs and pace. Lifetime Email Support: Continue to receive assistance and guidance through lifetime email support, ensuring you are supported even after completing the course. 3D AutoCAD Training Courses Gain confidence and proficiency in AutoCAD. Discover the fundamentals of 3D modeling and object creation in this introductory AutoCAD 3D course. Booking Your Training Course: Experience personalized training with our adaptable 1-on-1 sessions. You have the freedom to customize your schedule by reserving a convenient hour at your discretion. Our booking slots are available from Monday to Saturday, spanning from 9 a.m. to 7 p.m. You can also reach us at 02077202581 to make a booking over the phone. Course Duration: 10 hours "You have the flexibility to divide these 10 hours across multiple days to suit your ideal schedule." Training Method: 1-on-1 (In-person face-to-face or Live Online) Expect personalized attention, tailor-made content, a flexible learning pace, and dedicated individual support throughout your training journey. This hands-on course provides ample opportunities to experiment with newly acquired techniques and seek answers to your questions. Key Features: An introductory course tailored to AutoCAD 3D's essential features. Abundant one-on-one guidance and dedicated question time. Friendly expert trainers, small class sizes, and a comfortable learning environment. Comprehensive course materials and additional resources. Ongoing support and assistance with post-course challenges. What Will You Learn? This course will equip you with the foundational knowledge and workflows necessary to create 3D models within AutoCAD 3D. You will delve into the creation and modification of both solid and surface models. Upon completion, you will be able to: Effortlessly fashion intricate shapes by combining simple elements. Precisely extract geometries and dimensions from your creations. Easily customize the view and presentation style of your objects. Is This Course Right for You? No prior experience with AutoCAD 3D is required. This course caters to individuals proficient in working with 2D objects who aspire to construct 3D models of their designs. Gain proficiency in the fundamental tools and functionalities to create precise and professional 2D and 3D drawings, advancing to more complex techniques. Enhanced Efficiency: Discover time-saving strategies, tips, and workflows that will boost your productivity and streamline your design process within AutoCAD 3D. Versatility in Design: Develop the skills needed to undertake a wide range of projects, from architectural plans and engineering drawings to mechanical components and electrical schematics. Industry-Recognized Expertise: Cultivate in-demand skills relevant to architecture, engineering, construction, and manufacturing, paving the way for career advancement and professional development. Accessible Lesson Recordings: Access recorded lessons at your convenience to review and reinforce course material whenever necessary. Continuous Email Support: Benefit from ongoing assistance with lifetime email support, ensuring you have access to guidance, answers, and clarifications even beyond the completion of the course.

3D AutoCAD Basics to Advanced Training Course
Delivered in London or OnlineFlexible Dates
£696

Oracle Database 12c - RAC Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Database Administrators Administrator Overview Describe the Oracle Clusterware architecture Describe how Grid Plug and Play affects Clusterware Describe the benefits of Oracle RAC Explain the necessity of global resources Describe global cache coordination Install the Oracle database software Create a cluster database Perform post-database-creation tasks Convert a single-instance Oracle database to RACs Explain the principles and purposes of clusters Define redo log files in a RAC environment Define undo tablespaces in a RAC environment Start and stop RAC databases and instances Modify initialization parameters in a RAC environment Configure the RAC database to use ARCHIVELOG mode and the fast recovery area Configure RMAN for the RAC environment This Oracle Database 12c: RAC Administration training will teach you about Oracle RAC database architecture. Expert Oracle University instructors will deep dive into Global Resources and Cache Fusion. This Oracle Database 12c: RAC Administration training will teach you about Oracle RAC database architecture. Expert Oracle University instructors will deep dive into Global Resources and Cache Fusion. Additional course details: Nexus Humans Oracle Database 12c - RAC Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c - RAC Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c - RAC Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware App Volumes and Dynamic Environment Manager: Configure and Manage

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon who are responsible for the creation, maintenance, and delivery of remote and virtual desktop services Overview By the end of the course, you should be able to meet the following objectives: Describe the features, functions, and architecture of App Volumes Create and deliver application packages in App Volumes Deliver App Volumes published applications to virtual desktops and on-demand, using Horizon Run the App Volumes Application Capture Command-Line Program using appcapture.exe Perform advanced configuration of App Volumes Scale App Volumes to multiple locations and sites Describe the features, functions, and architecture of VMware Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings using VMware Dynamic Environment Manager Create predefined configurations for applications by using the Application Profiler Create predefined configurations for applications by using the Application Profiler Manage multiple environments using VMware Dynamic Environment Manager. Enable and synchronize the offline use of VMware Dynamic Environment Manager by using SyncTool Using VMware Horizon Smart Policies on the VMware Horizon platform This three-day course builds your skills in application management with VMware App Volumes? and VMware Dynamic Environment Manager?. You learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles across installation, update, and replacement. You also learn how to use VMware Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Overview of App Volumes Explain features and benefits of App Volumes Identify benefits of VMware ThinApp© Identify App Volumes components and architecture Manage application management stages using App Volumes. Working with Application Packages Differentiate between Application, Package and Program Create an Application Package Assign an Application to an entity Use markers to assign the new version of an Application Package Differentiate between Classic and On-Demand delivery of applications Update an Application with a new Package Published Applications Identify the benefits of delivering Published Applications On-Demand List the steps and prerequisites for creating Published Applications on Demand Integrate Horizon Connection Server and App Volumes Manager Associate App Volumes Manager with an automated farm Add Application Pools from App Volumes Manager Advanced App Volumes Configuration Perform advanced configuration of App Volumes Scale App Volumes to multiple locations and sites Run the App Volumes Application Capture Command-Line Program using appcapture.exe Overview of VMware Dynamic Environment Manager Explain features and benefits of Dynamic Environment Manager Identify the components of Dynamic Environment Manager architecture Differentiate between user profile scenarios Management Console User Interface Configure Personalization settings Create Condition sets Perform Application migration Configure User environment settings Advanced Dynamic Environment Manager Configuration Scale Dynamic Environment Manager to multiple locations and sites Use Silos Run the App Volumes Application Capture Command-Line Program using appcapture.exe Application Configuration Management Predefined and user-customized application settings Using Application Profiler Privilege Elevation SyncTool Identify the features of SyncTool Implement SyncTool VMware Horizon Smart Policies Identify the scope of Horizon Smart Policies Configure Horizon Smart Policies settings Define Smart Policies Conditions

VMware App Volumes and Dynamic Environment Manager: Configure and Manage
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry