• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

67 Business Continuity courses in Belfast delivered Live Online

M20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS

M20742 Identity with Windows Server 2016
Delivered OnlineFlexible Dates
Price on Enquiry

VMware HCX: Management and Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System administrators System engineers Migration engineers Migration architects Overview By the end of the course, you should be able to meet the following objectives: Describe core VMware HCX use cases and common triggers for mobility Describe the core components and features of VMware HCX Describe a real-life example of a VMware HCX project Identify all major Cloud Providers offering and supporting VMware HCX Describe the features of VMware HCX services Explain the different deployment types for VMware HCX and choose the correct components to deploy for a particular use case Understand the resource, network, and VMware ESXi™ and VMware vCenter requirements for VMware HCX Install and configure VMware HCX Understand, deploy, and manage the HCX Service Mesh Understand Network Extension and Traffic Engineering Create Network Extension and enable Mobility Optimized Networking Understand WAN Optimization Understand the different migration types and be able to choose the best one for different applications and workloads Incorporate VMware HCX into a disaster recovery strategy Design a VMware HCX deployment for different use cases Manage the lifecycle of VMware HCX This four-day course gives you knowledge and practical exercises sufficient to manage VMware HCX© and to migrate virtual machines using VMware HCX. The course focuses on configuration and management of VMware HCX. The course equips system administrators with the knowledge, skills, and abilities to achieve competence in migrating virtual machines. Course Introduction Introductions and course logistics Course objectives Introduction to VMware HCX Describe workload mobility challenges that VMware HCX addresses Recognize use cases for VMware HCX Identify all major Cloud providers offering and supporting VMware HCX HCX Services and Deployment Types Describe the functions of VMware HCX components Recognize the services provided by VMware HCX Recognize when to use different deployment types for VMware HCX Be able to choose which components to install and configure for a different VMware HCX service HCX Deployment Identify the resource, network, and ESXi/VMware vCenter server requirements for VMware HCX Understand the VMware vCenter user roles and access requirements Describe the installation workflow Install, activate, and configure VMware HCX manager Understand the compute and network profile requirements for VMware HCX and its services Create site pair, compute, and network profiles Describe and manage the HCX Service Mesh Create and configure a HCX Service Mesh Network Extension Describe network extension use case and benefits Compare the HCX-Network extension service with other solutions Examine Network Extension capabilities and topology Create a Network Extension Describe network traffic packet flow Describe Mobility Optimized Networking Enable Mobility Optimized Networking Describe the TCP Flow Conditioning and Application path resiliency feature of VMware HCX Recognize the key benefits of TCP flow conditioning and Application path resiliency Describe WAN optimization Workload Mobility Describe different migration types Recognize the limitation of each migration method and consideration when planning a migration Understand Bulk and Replication Assisted VMware HCX© vMotion© migration methods Migrate a VM using Bulk migration Describe cold and vMotion migration method Migrate a VM using HCX vMotion migration Examine non VMware vSphere© workload migration Migrate a VM using an OS assisted migration method Business Continuity and Disaster Recovery Examine disaster recovery concepts Describe disaster recovery networks Plan and create disaster recovery networks Describe VM protection operations Protect, recover, and test recovery and reverse replication of a VM Understand VMware HCX and SRM integration and value HCX Lifecycle Management Backup and restore the VMware HCX manager Locate and access VMware HCX logs Troubleshoot VMware HCX Plan for VMware HCX manager and component updates Customer Design Scenarios Design a VMware HCX deployment Choose workload mobility methods for the migration Discuss customer requirements and proposed design Discuss components, services, and migration methods for the scenario

VMware HCX: Management and Operations
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-304T00 - Microsoft Azure Architect Design

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities

AZ-304T00 - Microsoft Azure Architect Design
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Advanced Administration Workshop [v7]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineer Overview By the end of the course, you should be able to meet the following objectives: Configure and manage complex storage solutions in a vSphere environment (including NFS, iSCSI, and so on) Configure and manage complex, scalable vSphere networking operations (vSphere Standard Switch and Distributed Switches) Deploy, manage, and optimize virtual machines (advanced configuration, content library, latency-sensitive workloads, and more) Manage business continuity and operations in your vSphere environment (VMware vCenter Server Appliance™ file-based backup, VMware vCenter Server profiles, host profiles, and so on) Plan and implement increased vSphere security (use a Key Provider, VM Encryption, CPU scheduler remediations, and so on) Troubleshoot the vSphere environment Use VMware vSphere Lifecycle Manager™ to upgrade to VMware ESXi™ hosts and virtual machines (VUM, image-based clusters, and so on) Implement vSphere cluster solutions (Cluster QuickStart wizard, VMware vSphere Distributed Resource Scheduler™, VMware vSphere High Availability, VMware vSAN™, and so on) Implement resource optimizations to streamline vSphere deployments Create an advanced configuration of vCenter Server (including an identity source) This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere© 7 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure. Approximately 90% of the class is application-focused and taught through labs. The course aligns fully with the VMware Certified Advanced Professional ? Data Center Virtualization Deploy exam objectives. Course Introduction Introductions and course logistics Course objectives Introduction to fictitious company: VMBeans Configure and Manage Your vSphere Environment Perform various vCenter Server configurations Configure an external identity source Configure virtual networking with advanced options Configure and manage advanced storage configurations Configure vSphere clusters (also using Cluster QuickStart) Management and Operations in Your Data Center Collect vSphere log files Configure vCenter Server file-based backup Working with vCenter Server profiles Configure and manage advanced cluster settings Create and configure advanced host options Create and manage host profiles Manage and remediate clusters using vSphere Lifecycle Manager Create and configure a Content Library Update a managed virtual machine template Configure a central VMware ToolsTM installation repository Manage vSphere roles and permissions Troubleshoot Your Data Center Environment Troubleshoot vSphere configuration issues Troubleshoot resource pool configuration issues Troubleshoot network and storage issues Troubleshoot ESXi host issues Troubleshoot vCenter Server resource issues Increasing Security in Your Data Center Create and manage a Key Management solution Create an encrypted virtual machine Configure CPU scheduler options to achieve security remediations Performance and Optimization in Your Data Center Manage advanced virtual machine configurations Identify and implement vSphere resource optimization opportunities Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Advanced Administration Workshop [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Advanced Administration Workshop [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Advanced Administration Workshop [v7]
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-303T00 - Microsoft Azure Architect Technologies

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. Implement Azure Active Directory Overview of Azure Active Directory Users and Groups Domains and Custom Domains Azure AD Identity Protection Implement Conditional Access Configure Fraud Alerts for MFA Implement Bypass Options Configure Guest Users in Azure AD Configure Trusted IPs Manage Multiple Directories Implement and Manage Hybrid Identities Install and Configure Azure AD Connect Configure Password Sync and Password Writeback Configure Azure AD Connect Health Implement Virtual Networking Virtual Network Peering Implement VNet Peering Implement VMs for Windows and Linux Select Virtual Machine Size Configure High Availability Implement Azure Dedicated Hosts Deploy and Configure Scale Sets Configure Azure Disk Encryption Implement Load Balancing and Network Security Implement Azure Load Balancer Implement an Application Gateway Understand Web Application Firewall Implement Azure Firewall Implement Azure Front Door Implementing Azure Traffic Manager Implement Storage Accounts Storage Accounts Blob Storage Storage Security Managing Storage Accessing Blobs and Queues using AAD Implement NoSQL Databases Configure Storage Account Tables Select Appropriate CosmosDB APIs Implement Azure SQL Databases Configure Azure SQL Database Settings Implement Azure SQL Database Managed Instances High-Availability and Azure SQL Database In this module, you will learn how to Create an Azure SQL Database (single database) Create an Azure SQL Database Managed Instance Recommend high-availability architectural models used in Azure SQL Database Automate Deployment and Configuration of Resources Azure Resource Manager Templates Save a Template for a VM Evaluate Location of New Resources Configure a Virtual Hard Disk Template Deploy from a template Create and Execute an Automation Runbook Implement and Manage Azure Governance Create Management Groups, Subscriptions, and Resource Groups Overview of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) Roles Azure AD Access Reviews Implement and Configure an Azure Policy Azure Blueprints Manage Security for Applications Azure Key Vault Azure Managed Identity Manage Workloads in Azure Migrate Workloads using Azure Migrate VMware - Agentless Migration VMware - Agent-Based Migration Implement Azure Backup Azure to Azure Site Recovery Implement Azure Update Management Implement Container-Based Applications Azure Container Instances Configure Azure Kubernetes Service Implement an Application Infrastructure Create and Configure Azure App Service Create an App Service Web App for Containers Create and Configure an App Service Plan Configure Networking for an App Service Create and Manage Deployment Slots Implement Logic Apps Implement Azure Functions Implement Cloud Infrastructure Monitoring Azure Infrastructure Security Monitoring Azure Monitor Azure Workbooks Azure Alerts Log Analytics Network Watcher Azure Service Health Monitor Azure Costs Azure Application Insights Unified Monitoring in Azure

AZ-303T00 - Microsoft Azure Architect Technologies
Delivered OnlineFlexible Dates
Price on Enquiry

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support Introduction The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. Managing the Nutanix Cluster In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. Securing the Nutanix Cluster This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. Acropolils Networking This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM Management This section shows you how to upload images, and how to create and manage virtual machines. Health Monitoring and Alerts In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. Distributed Storage Fabric This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV Workload Migration Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. File and Volumes This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. Understanding Infrastructure Resiliency This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. Data Protection Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. Prism Central Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. Monitoring the Nutanix Cluster This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. Cluster Management and Expansion This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. Remote Office Branch Office (ROBO) Deployments In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. Additional course details: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. Course Introduction Introductions and course logistics Course objectives VMware cloud foundation overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe the VMware Cloud Foundation topology VMware Cloud Foundation+ and VMware Cloud Connectivity Describe the VMware Cloud Foundation+ architecture Identify the pre-requisites for VMware Cloud Foundation+ Describe VMware Cloud Foundation+ value added features Configure subscription-based licensing parameters Describe the vCenter Cloud Gateway functionality Identify the vCenter Cloud Gateway components Describe the vCenter Cloud Gateway architecture Connect the vCenter Cloud Gateway to VMware Cloud Describe the VMware Cloud platform Describe the VMware vSphere+ services used in VMware Cloud Foundation+ Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Describe the VMware Cloud Foundation bring-up process Identify the information required for the Planning and Preparation Workbook Complete the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Identify the configuration validation process performed by VMware Cloud Builder Describe the deployment of the management domain Post-Deployment Operations Complete the Onboarding Wizard Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources for VMware Cloud Foundation Perform the SDDC Manager backup and restore process Identify steps in the NSX backup and restore process Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Manage and secure a primary password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation Networking with NSX Describe network virtualization with NSX Recognize NSX operational planes Identify NSX components Describe logical switching Describe NSX Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX Identify NSX Edge functions Describe data plane preparation for NSX Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Managing Workload Domains Define workload domains List the types of workload domains Identify workload domain prerequisites Understand the scalability limits for workload domains Identify use cases for multiple clusters in a workload domain Create network pools Size network pools Commission hosts with SDDC Manager Create workload domains Scale workload domains Decommission hosts from a workload domain Remove workload domains Describe distinctive design decisions for VMware Cloud Foundation components vSphere with Tanzu in VMware Cloud Foundation Explain vSphere with Tanzu Define the role of the Spherelet Describe the supervisor cluster control plane Create vSphere with Tanzu namespaces Describe the role of NSX networking components in vSphere with Tanzu Discuss vSphere with Tanzu networking topology Describe control plane VM management networking requirements Plan appropriate IP address ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace VMware Cloud Foundation Storage Management Identify storage use cases in VMware Cloud Foundation Determine the most appropriate storage option for a workload domain Describe different vSphere-native storage design options Identify vSAN architecture and components Describe vSAN requirements for the management and workload domains Configure deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Configure storage policies for vSAN Explain storage policy failure tolerance rules Identify a virtual machine storage policy compliance status Explain how vSAN storage policies protect VMware Cloud Foundation components Availability and Business Continuity Explain the importance of external service availability Describe availability options native to VMware vSphere Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Learn the basics of public key infrastructure (PKI) Describe the purpose of certificate signing requests (CSRs) Describe available options in SDDC Manager for certificate authorities View certificates for VMware Cloud Foundation components Install and replace certificates for VMware Cloud Foundation components Configure the integrated Certificate Authorities in SDDC Manager Configure a certificate template in Microsoft Certificate Authority server Configure the OpenSSL certificate authority in SDDC Manager Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMware Cloud Foundation Lifecycle Management Describe VMware Cloud Foundation Life Cycle Management List the products managed by VMware Cloud Foundation Lifecycle management Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation Understand vSphere Lifecycle Manager features Understand how and when to use cluster images Describe the importance of Hardware Support Managers Describe the upgrade prerequisites Outline the upgrade precheck process Describe the order of upgrade for VMware Cloud Foundation components VMware Cloud Foundation Troubleshooting Use the SoS command-line tool to create log bundles, perform health checks, and check password validity List VMware Cloud Foundation services Identify VMware Cloud Foundation log files Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Certificate in Intellectual Property (CIP)

By EMG Associates UK Limited

Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success

Certificate in Intellectual Property (CIP)
Delivered OnlineFlexible Dates
£3,822

Business Resilience Fundamentals

By IIL Europe Ltd

In our VUCA (Volatile, Uncertain, Complex, Ambiguous) world, organizational resilience is key to adapting, surviving, and thriving. The world is experiencing a level of disruption and business risk not seen in generations. Some companies freeze and fail, while others innovate, advance, and even thrive. The difference is resilience. As crises become more frequent, the ability to thrive in crises is now essential. The Oxford English Dictionary defines resilience - in an organizational context - as 'the capacity to recover quickly from difficulties'. A resilient business is one which is capable not of just withstanding shocks and disruptions in the business environment, but also capable of adapting to and taking advantage of them. It is more than simply bouncing back after a crisis or being an agile organization. Business Resilience Fundamentals training and supporting certification are underpinned by the publication BUSINESS RESILIENCE: A practical guide to sustained progress delivered at pace. It provides a cohesive, practical guide to building business resilience, enabling leaders to implement an effective framework in an inclusive and sustainable way. Participants will be guided on implementing and adapting a range of tools to build and enhance organizational resilience. This course will help participants to ensure their organization is better prepared for the next crisis and to anticipate fluctuations in the business environment to take advantage.

Business Resilience Fundamentals
Delivered OnlineFlexible Dates
£1,850 to £1,950