Duration 2 Days 12 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Prepare the Azure environment for secure integration with Citrix DaaS. Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services. Integrate Citrix Cloud and Citrix DaaS with Microsoft Azure Active Directory. Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you willLearn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft's public cloud and get hands-on practice deploying those machines using Machine Creation Services. You will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, you will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix DaaS sites. Module 1: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 2: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 3: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 4: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 5: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 6: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 7: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 8: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Student Exercise - Calculate a case Additional course details: Nexus Humans CWS-251 Implement Citrix DaaS on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-251 Implement Citrix DaaS on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft 365 and want to incorporate digital note taking and note collaboration by using Microsoft OneNote. Overview In this course, you will develop note-taking skills by creating, modifying, and managing OneNote notebooks that work with other Microsoft 365 applications. You will: Navigate and customize the OneNote environment and create your first notebook. Add and format various types of notes and note elements, including text, links, and drawing objects. Add images, video, audio, Excel spreadsheets, and other types of files to a notebook. Organize, categorize, and search notebook content. Finalize notebook content by checking spelling, printing copies, and password-protecting notebooks. Manage notebooks by exporting content and working with history and backups. Share notebooks using Outlook and collaborate with colleagues using OneDrive. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft's OneNote app provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will help you use OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Additionally, learning how OneNote and other applications in the Microsoft 365 suite are integrated will increase your productivity. Lesson 1: Getting Started with OneNote Topic A: Navigate the OneNote Environment Topic B: Create Notebook Pages from Page Templates Topic C: Customize the OneNote User Interface Lesson 2: Adding and Formatting Notebook Content Topic A: Format Notebook Content Topic B: Add Quick Notes and Linked Notes to a Notebook Topic C: Use Drawing Tools in a Notebook Topic D: Use Dictation in a Notebook Lesson 3: Adding Files to Notebooks Topic A: Insert Images, Video, and Audio into a Notebook Topic B: Embed Excel Spreadsheets in a Notebook Topic C: Attach Other File Types to a Notebook Lesson 4: Organizing Notebook Content Topic A: Use Tags to Categorize Notes Topic B: Organize and Search Notebooks Lesson 5: Finalizing Notebooks Topic A: Proof and Print a Notebook Topic B: Configure Password Protection and Notebook Properties Lesson 6: Managing Notebooks Topic A: Export Content from a Notebook Topic B: Manage Notebook History Lesson 7: Sharing OneNote Content Topic A: Send Notebook Pages to Others Topic B: Work with Integrated Outlook Features Topic C: Collaborate on Notebooks Additional course details: Nexus Humans Microsoft OneNote (Desktop App) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft OneNote (Desktop App) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Create Citrix DaaS workloads. Deliver app and desktop resources to users. Migrate existing on-premises Citrix Virtual Apps and Desktops 2203 LTSR infrastructure to Citrix Cloud. In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and resource locations that the host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. Module 1: Introduction to Citrix DaaS New Citrix Workspace Packaging Citrix Virtual Apps and Desktops - On- Premises Site What is Citrix Cloud? Why Citrix DaaS? What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? Citrix Cloud Administration Module 2: Planning - Citrix DaaS Architecture, Security, and Operations Architecture and Deployment Options Citrix DaaS Security Citrix DaaS Operations Module 3: Planning - Citrix Cloud Connectors Cloud Connector Architecture Cloud Connector Services and Communications Overview Cloud Connector Operations in a Resource Location Cloud Connector Resiliency Installing, Updating, and Removing Cloud Connectors Supported Domain Scenarios for Cloud Connectors Securing Cloud Connector Communications Local Host Cache (LHC) Citrix Cloud Connector vs Delivery Controller Operations Module 4: Planning - Citrix DaaS Resource Locations Citrix DaaS Resource Locations Citrix DaaS Hosting Connections Zones Module 5: Active Directory, Authentication, and Authorization Active Directory Design Options Desktops from Non-Domain Joined VDAs Citrix Federated Authentication Service and Identity Provider Services Module 6: Planning - Provisioning VDA Workloads and Delivering Resources Master Images Machine Creation Services (MCS) in Citrix DaaS Citrix Provisioning in Citrix DaaS Machine Catalogs Delivery Groups Citrix Cloud Library Module 7: Planning - Provisioning VDA Workloads and Delivering Resources Selecting Between Citrix digital workspace experience and StoreFront Citrix StoreFront and Citrix digital workspace experience Communications Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway Access Layer Communications User Authentication Module 8: Planning - Citrix DaaS Administration Citrix Cloud Manage and Monitor Delegated Administration Citrix DaaS Remote PowerShell Software Development Kit Manage Multiple Resource Locations Module 9: Planning - Public Cloud Considerations General Public Cloud Considerations Using Autoscale to Power Manage Machines in a Public Cloud Microsoft Azure as a Citrix DaaS Resource Location Amazon Web Services as a Citrix DaaS Resource Location Google Cloud as a Citrix DaaS Resource Location Module 10: Planning - Migrating to Citrix DaaS from Citrix Virtual Apps and Desktops Citrix Cloud Migration Options and Considerations Citrix Automated Configuration Tool Citrix Image Portability Service Module 11: Manage - Operations and Support in Citrix Cloud Citrix Cloud Connector Support Updating and Rolling Back Machine Catalogs VDA Restore Citrix Self-Help Strategy Monitor Your Environment Additional course details: Nexus Humans CWS-250 Citrix DaaS Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-250 Citrix DaaS Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The target audience for this course includes: Software testers (both technical and user acceptance testers), Test analysts, Test engineers, Test consultants, Software developers, Managers including test managers, project managers, quality managers. Overview By the end of this course, an attendee should be able to: perform effective testing of software, be aware of techniques and standards, have an awareness of what testing tools can achieve, where to find more information about testing, and establish the basic steps of the testing process. This is an ISTQB certification in software testing for the US. In this course you will study all of the basic aspects of software testing and QA, including a comprehensive overview of tasks, methods, and techniques for effectively testing software. This course prepares you for the ISTQB Foundation Level exam. Passing the exam will grant you an ISTQB CTFL certification. Fundamentals of Testing What is Testing? Typical Objectives of Testing Testing and Debugging Why is Testing Necessary? Testing?s Contributions to Success Quality Assurance and Testing Errors, Defects, and Failures Defects, Root Causes and Effects Seven Testing Principles Test Process Test Process in Context Test Activities and Tasks Test Work Products Traceability between the Test Basis and Test Work Products The Psychology of Testing Human Psychology and Testing Tester?s and Developer?s Mindsets Testing Throughout the Software Development Lifecycle Software Development Lifecycle Models Software Development and Software Testing Software Development Lifecycle Models in Context Test Levels Component Testing Integration Testing System Testing Acceptance Testing Test Types Functional Testing Non-functional Testing White-box Testing Change-related Testing Test Types and Test Levels Maintenance Testing Triggers for Maintenance Impact Analysis for Maintenance Static Testing Static Testing Basics Work Products that Can Be Examined by Static Testing Benefits of Static Testing Differences between Static and Dynamic Testing Review Process Work Product Review Process Roles and responsibilities in a formal review Review Types Applying Review Techniques Success Factors for Reviews Test Techniques Categories of Test Techniques Choosing Test Techniques Categories of Test Techniques and Their Characteristics Black-box Test Techniques Equivalence Partitioning Boundary Value Analysis Decision Table Testing State Transition Testing Use Case Testing White-box Test Techniques Statement Testing and Coverage Decision Testing and Coverage The Value of Statement and Decision Testing Experience-based Test Techniques Error Guessing Exploratory Testing Checklist-based Testing Test Management Test Organization Independent Testing Tasks of a Test Manager and Tester Test Planning and Estimation Purpose and Content of a Test Plan Test Strategy and Test Approach Entry Criteria and Exit Criteria (Definition of Ready and Definition of Done) Test Execution Schedule Factors Influencing the Test Effort Test Estimation Techniques Test Monitoring and Control Metrics Used in Testing Purposes, Contents, and Audiences for Test Reports Configuration Management Risks and Testing Definition of Risk Product and Project Risks Risk-based Testing and Product Quality Defect Management Tool Support for Testing Test Tool Considerations Test Tool Classification Benefits and Risks of Test Automation Special Considerations for Test Execution and Test Management Tools Effective Use of Tools Main Principles for Tool Selection Pilot Projects for Introducing a Tool into an Organization Success Factors for Tools Additional course details: Nexus Humans ISTQB Software Testing Certification Training - Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Software Testing Certification Training - Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Aria Automation architecture and use cases in cloud environments Describe the key services of VMware Cloud Automation Services⢠Manage VMware Aria Automation entities on VMware and third-party virtual and cloud infrastructures Install VMware Aria Automation with VMware Aria Suite Lifecycle Configure and manage cloud accounts, projects, flavor mappings, image mappings, network profiles, storage profiles, volumes, tags, and services Create, modify, manage, and deploy VMware Aria Automation Templates Customize services and virtual machines with cloudConfig and cloudbase-init Configure and manage VMware Aria Automation Consumption Configure and manage ABX actions, custom properties, event broker subscriptions, and VMware Aria Automation Orchestrator workflows Connect to a Kubernetes cluster and manage namespaces Use VMware Aria Automation Config to configure and deploy systems Use logs and CLI commands to monitor and troubleshoot VMware Aria Automation During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10? on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware Aria Automation Consumption? can aggregate content in native formats from multiple clouds and platforms into a common catalog.This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config? as a configuration management tool. Course Introduction Introductions and course logistics Course objectives VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Workspace ONE Access? Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process Authentication and Authorization Identify the steps to integrating Workspace ONE© Access with Active Directory Describe the features of Workspace ONE Access Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments Tags Configure tags Describe functions of tags Manage tags Storage Configuration Configure storage profiles Use tags and storage profiles Integrating NSX With VMware Aria Automation List the capabilities and use cases of VMware NSX© Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation? accounts Integrate VMware Cloud Director? account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Integrate VMware Cloud on AWS cloud account Using VMware Aria Automation Consumption Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Create a VMware Aria Automation template with Kubernetes components Using VMware Aria Automation Config for Configuration Management Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration VMware Aria Automation Troubleshooting and Integration Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware Aria Operations for Logs Describe integration with VMware Aria Operations
Join our webinar and unlock the power of quizzes within Cademy's learning platform. Don't miss this opportunity to become a master of quizzes in Cademy, taking your online assessments to the next level. Join us for this informative webinar and learn how to create and utilise interactive quizzes that enhance the learning experience for your students.