• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1292 BA courses in Liverpool

Network design

5.0(3)

By Systems & Network Training

Network design training course description This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. What will you learn Create HA enterprise network designs. Develop optimum Layer 3 designs. Design effective modern WAN and data center networks. Develop effective migration approaches to IPv6. Create effective network security designs. Network design training course details Who will benefit: Anyone involved with network design. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Network design training course contents Part I Reliable, resilient enterprise L2/3 network designOptimal Enterprise Campus Design:Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency.EIGRP design:EIGRP Design, Should you use EIGRP?OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design:The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design:BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design.Part II Enterprise IPv6 Design ConsiderationsIPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. Part III Modern Enterprise Wide-Area Networks DesignService Provider-Managed VPNs:Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. Part IV Enterprise Data Center DesignsMultitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture.Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN:SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections:Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. Part V Design QoS for Optimized User ExperienceQoS Overview:QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS.MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. Part VI IP Multicast DesignEnterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. Part VII Designing Optimum Enterprise Network SecurityDesigning Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection.Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions:IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. Part VIII Design scenariosDesign Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.

Network design
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete C programming

5.0(3)

By Systems & Network Training

Complete C programming training course description A hands-on introduction to programming in the ANSI C programming language. The course initially moves at a fast pace in order to spend as much time as possible on the subject of pointers - the area which cause the most bugs in C programs. What will you learn Write ANSI C programs Use the C libraries Debug C programs Examine existing code and determine its function. Complete C programming training course details Who will benefit: Programmers wishing to learn C. Programmers wishing to learn C++ or Java. Prerequisites: None, although experience in another high level language would be useful. Duration 5 days Complete C programming training course contents Getting started The compilation process, comments, main(), statement blocks, printf(). C data types and operators char, int, float and double, qualifiers, arithmetic and assignment operators, precedence, Associativity. Basic I/O C libraries, stdin and stdout, getchar(), putchar(), printf() formatting. Flow control if else, dangling elses, else if, while and for loops. switch statements, the null statement, break, continue and gotos. Functions Function calls, arguments and return types, function declarations (prototypes), function definitions, scope of variables. The preprocessor Preprocessor actions, macros, #include. Libraries and their relationship with header files. Conditional compilation. More data types and operators Logical, bitwise and other operators, type conversion, casting, typedefs and access modifiers. Arrays Declaring and handling arrays, common gotchas, multidimensional arrays. Pointers What are pointers? Why they are so important, declaring and using pointers,The three uses of the *,pointer example - scanf, pointers as arguments. More pointers Golden rules of pointers and arrays, pointers to arrays, pointer arithmetic, arrays of pointers, multiple indirection. Character/string manipulation Arrays of characters, string definition, working with strings, String library. Program arguments argc and argv, example uses,char *argv[] versus char ** argv. Program structure and storage classes Globals (externals), multi source programs, the look of a C program. Structures Declaration, the . and - operators, unions and bitfields. Library functions File handling, fopen and fclose, reading from and writing to files, fseek().calloc() and malloc()

Complete C programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete VBA programming

5.0(3)

By Systems & Network Training

Complete VBA programming training course description This course helps you extend the capabilities of the entire Office suite using Visual Basic for Applications (VBA). Even if you have no programming experience, you'll be automating routine computing processes quickly using the simple, yet powerful VBA programming language. We start at the beginning to get you acquainted with VBA so you can start recording macros right away. You'll then build upon that foundation to utilize the full capabilities of the language in Word, Excel, Outlook, and PowerPoint. What will you learn Record, write and run macros. Work with VBA Editor. Use the huge library of built-in functions. Create simple dialog boxes and complex forms. Customize Word, Excel, PowerPoint, Outlook, and Access. Program the Office 2016 ribbon. Complete VBA programming training course details Who will benefit: Anyone looking to extend the capabilities of the entire Office suite using VBA. Prerequisites: None. Duration 5 days Complete VBA programming training course contents Macros and getting started in VBA VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. Working with VBA 1 VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. Decisions, loops and functions Built-in functions, creating your own functions, making decisions in your code, using loops to repeat actions. Using message boxes, input boxes, and dialog boxes Getting user input with message boxes and input boxes, creating simple custom dialog boxes, creating complex forms. Creating effective code Building modular code and using classes, debugging your code and handling errors, building well-behaved code, exploring VBA's security features. Programming the Office applications The Word object model and key objects, working with widely used objects in Word, the Excel object model and key objects, working with widely used objects in Excel, the PowerPoint object, model and key objects, working with shapes and running slide shows, the Outlook object model and key objects, working with events in Outlook, the Access object model and key objects, manipulating the data in an Access database via VBA, accessing one application from another application, programming the Office 2016 ribbon.

Complete VBA programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive WANs for engineers

5.0(3)

By Systems & Network Training

WAN training course description A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory What will you learn Describe the seven-layer model and realise how it applies to the real world. Evaluate and describe WAN technologies. Describe the architecture of WANs in the core. Use WANS to interconnect LANS. WAN training course details Who will benefit: Technical staff wishing to find out more about how their WAN works. Prerequisites: Intro to data communications & networking Duration 5 days WAN training course contents Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. Service provider technologies The transport plane, SDH, SONET, DWDM. WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. The Internet VPNs, IPSEC, QOS. What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.

Definitive WANs for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced TCP/IP

5.0(3)

By Systems & Network Training

Advanced TCP/IP training course description An intensive advanced TCP/IP course focusing on the details of the protocols according to the RFCs. This course is designed to go into the technical details of the protocols and is not for those that are new to TCP/IP. A particular focus is on TCP and performance. Those more interested in routing protocols should see our Definitive IP routing for engineers course. It is expected that delegates are totally familiar with configuration addressing. Hands on sessions consist of protocol analysis using Wireshark. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. Advanced TCP/IP training course details Who will benefit: Advanced technical staff. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Advanced TCP/IP training course contents IP Fragmentation and MTU issues, Path MTU discovery, Geolocation, unusual IP addresses, forwarding broadcasts, DiffServ, DSCP, ECN, assured and expedited forwarding. TTL usage in traceroute, Protocol field. Sanitising IP addresses in trace files. Wireshark and checksum errors. IPv6 The header. Extension headers. Traffic class and flow labels. Tunnelling. IPv6 and fragmentation. ARP Requests, responses, gratuitous ARP, Proxy ARP, ARP poisoning. ICMP ping, Round Trip Times, ICMP redirect, ICMP router advertisement and solicitation, Time Exceeded, Destination unreachable. ICMPv6: Similarity to ICMPv4, Neighbor discovery and the replacement of ARP. MLD. First hop redundancy ICMP discovery, HSRP, VRRP, GLBP. IGMP Multicast overview, multicast architecture, multicast addresses, IGMP v1, IGMPv2, IGMPv3. UDP Use in broadcasts and multicasts. Port numbers. TCP Connections, RST, FIN, sequence numbering, packet loss recovery, Fast recovery, RTO timeout, SACK, TCP flow control, receive window, congestion window, van Jacobsen, nagle, delayed ACKs, PSH, URG, TCP options, MSS, Window scaling, TCP timestamps. Congestion notification. Hands on Troubleshooting with sequence numbers, Wireshark IO and TCP graphs to analyse performance. Window size issues. DHCP DHCP header. Relationship to BOOTP. Discover, offer, request, decline, ACK, release. Lease, renewal and rebind times. Relay agents. DHCPv6 DNS Names and addresses, Resource Records, queries, responses, problems. MDNS. HTTP Requests, methods, request modifiers, response codes. HTTPS. SSL, TLS. Proxies. Hands on Redirects, recreating pages from packets. FTP Commands, responses, passive/active mode. Email SMTP, POP3, IMAP, commands responses. Voice and Video RTP, RTCP, SIP. IP PBXs. Traffic flows. Hands on Voice playback. SNMP MIBs, GET, TRAP, polling. Performance Baselining, high latency, Wireshark and timings, packet loss, redirections, small packets, congestion, name resolution. Security Network forensics, scanning and discovery, suspect traffic. IPsec, SSH.

Advanced TCP/IP
Delivered in Internationally or OnlineFlexible Dates
£3,697

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Supporting Windows 10

5.0(3)

By Systems & Network Training

Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in Internationally or OnlineFlexible Dates
£3,697

Hyper V for engineers

5.0(3)

By Systems & Network Training

Hyper V for engineers training course description This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server Virtualization solutions using Hyper-V and System Center. Please note that due to the nature of the lab / environment build delegates may be required to work in pairs. What will you learn Install and configure the Hyper-V server role. Create virtual machines, create and manage virtual hard disks and work with snapshots. Create and configure virtual machine networks in a Hyper-V environment. Provide high availability for Hyper-V environment by implementing failover clustering. Use System Center 2012 R2 Virtual Machine Manager. Create and manage virtual machines by using VMM. Hyper V for engineers training course details Who will benefit: Anyone designing, implementing, managing and maintaining a virtualization infrastructure. Prerequisites: Supporting Windows server 2012 Duration 5 days Hyper V for engineers training course contents Evaluating the environment for virtualization Overview of Microsoft virtualization, Overview of system center 2012 R2 components, Evaluating current environment for virtualization, Extending virtualization to the cloud environment. Selecting the appropriate virtualization method, Assessing the environment by using MAP. Installing and configuring the Hyper-V role Installing the Hyper-V role, Managing Hyper-V, Configuring Hyper-V settings, Hyper-V Host storage and networking, Installing the Hyper-V server role, Configuring Hyper-V settings, Accessing and managing Hyper-V remotely. Creating and managing virtual hard disks, virtual machines, and checkpoints Creating and configuring virtual hard disks, Creating and configuring virtual machines, Installing and Importing virtual machines, Managing virtual machine checkpoints, Monitoring Hyper-V, Designing virtual machines for server roles and services, Creating and managing virtual hard disks, Creating and managing virtual machines, Importing virtual machines and working with checkpoints monitoring Hyper-V. Creating and configuring virtual machine networks Creating and using Hyper-V virtual switches, Advanced Hyper-V networking features, Configuring and using Hyper-V network virtualization, Creating and using Windows Server 2012 R2 Hyper-V virtual switches, Configuring and using advanced virtual switch features, Configuring Hyper-V Network virtualization. Virtual machine movement and Hyper-V replica Providing high availability and redundancy for virtualization, Implementing virtual machine movement, Implementing and managing Hyper-V replica, Moving Hyper-V storage and virtual machines, Configuring and managing Hyper-V replica. Implementing failover clustering with Hyper-V Overview of failover clustering, Configuring and using shared storage, Implementing and managing failover clustering with Hyper-V, Creating a Hyper-V failover cluster, Managing a Hyper-V failover cluster. Installing and configuring System Center 2012 R2 virtual machine manager Integrating system center and server virtualization, Overview of VMM, Installing VMM, Adding hosts and managing host groups, Installing and configuring System Center 2012 R2 VMM, Managing hosts and host groups. Managing the Networking and storage infrastructure in System Center 2012 R2 VMM Managing networking infrastructure managing storage infrastructure, Managing infrastructure updates, Implementing a network infrastructure, Implementing a storage infrastructure, Managing infrastructure updates. Creating and managing VM using MS System Center 2012 R2 VMM VMM tasks in VMM, Creating, cloning, and converting VMs, Overview of VM updating, Creating a VM and modifying it's properties, Cloning a VM. Configuring and managing the MS System Center 2012 R2 VMM library and library objects Overview of the VMM library, Working with profiles and templates, Configuring and managing the VMM library, Creating and managing profiles and templates. Managing clouds in MS System Center 2012 R2 VMM Introduction to clouds, Creating and managing a cloud, Working with user roles in VMM, Creating a cloud, Working with user roles, Deploying VMs to a private cloud. Managing services in MS System Center 2012 R2 VMM and app controller Understanding services in VMM, Creating and managing services in VMM, Using app controller Creating a service template, Deploying a service and updating a service template, Configuring app controller, Deploying a VM in app controller. Protecting and monitoring virtualization infrastructure Overview of backup and restore options for VM, Protecting virtualization Infrastructure using DPM, Using Operations Manager for monitoring and reporting, Integrating VMM with Operations Manager, Implementing MS System Center 2012 R2 Operations Manager agents, Configuring Operations Manager monitoring components, Configuring Operations Manager integration with System Center 2012 R2 VMM.

Hyper V for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Diploma in Architecture and Interior Design Diploma 1-2-1

By Real Animation Works

Face to face One to one.

Diploma in Architecture and Interior Design Diploma 1-2-1
Delivered in Internationally or OnlineFlexible Dates
£4,000