Understand how Docker works and learn its core features with this hands-on course. This is 90% practice without any useless demos! Learn how to create different containers such as Node.js, Python, WordPress, MongoDB, MySQL, Redis, Elasticsearch, and much more.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway⢠platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist⢠In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify
This course is designed to explore creative potential and hone artistic skills using ChatGPT. It covers how to use ChatGPT, generate ideas, research for a novel, create comics, and use other AI tools. Additionally, the course introduces ChatGPT for storytelling by providing prompts and refining its output to generate story ideas and characters.
In this comprehensive course, we will guide you through the world of Oracle Database Administration, starting from the basics and equipping you with the skills to create databases, manage storage, implement backup plans, apply patches, troubleshoot issues, and excel in the role of a professional DBA.
The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
FREE Level 3 QLS Endorsed Certificate | 14 CPD Courses+14 PDF Certificates| 180 CPD Points| CPD & CiQ Accredited
Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.
Overview of Learn Linux in 5 Days The Learn Linux in 5 Days Course is designed to help you understand and use Linux, one of the most powerful operating systems used around the world. Today, Linux runs over 96% of the top one million web servers. Many companies in the UK are now choosing Linux and other open-source tools to save money and make their systems more secure. This course takes you from installing Linux to learning important commands that help you get things done faster and smarter. In the Learn Linux in 5 Days Course, you’ll learn step by step, starting with simple tasks like moving around files and folders. As you go through the lessons, you’ll move on to useful skills like handling running processes, setting up scheduled tasks, and managing system updates. Whether you're learning on a virtual machine at home or setting up a real server at work, this course gives you clear, hands-on training to build your confidence. There is a growing need for people who know how to work with Linux. In fact, UK tech jobs asking for Linux skills are growing 21% every year. The Learn Linux in 5 Days Course helps you stay ahead by teaching you how to work with file permissions, customise the shell, and manage software packages. With this course, Linux becomes simple, useful, and something you can learn in just a few days. By completing this Learn Linux in 5 Days, you will be able to: Move around the Linux file system and manage files with ease Use important command-line tools the right way Set file permissions and control who can access what Customise your shell environment and create your shortcuts Install and manage software on different Linux systems Set up scheduled tasks and manage running programs smoothly Who Should Take the Learn Linux in 5 Days Course IT workers who want to improve their system management skills and understand Linux better Total beginners who want to learn how Linux works and start using the command line in just 5 days Students studying cybersecurity, cloud computing, or web development who need Linux for their future careers Windows users curious about trying Linux using a virtual machine before making a full switch DevOps learners who want to build strong Linux skills for handling servers and automation Process of Evaluation After studying the Learn Linux in 5 Days Course, your skills and knowledge will be tested with an MCQ exam or assignment. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Learn Linux in 5 Days Course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. (Each) Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. (Each) Shipping Charges: Inside the UK: £3.99 International: £10.99 Requirements You don’t need any educational qualification or experience to enrol in the Learn Linux in 5 Days course. Career Path This Learn Linux in 5 Days Course will lead you to many different career opportunities. Here are a few prospects: Linux System Administrator – £35K to £65K per year DevOps Engineer – £45K to £85K per year Network Security Specialist – £40K to £70K per year Cloud Infrastructure Engineer – £50K to £80K per year Web Server Administrator – £32K to £60K per year Course Curriculum Unit 01: Overview Course Overview 00:03:00 Unit 02: Day 1 Background and Introduction 00:07:00 Linux Distributions 00:05:00 Installing VirtualBox on Windows 00:03:00 Installing VirtualBox on Mac 00:03:00 Installing Linux Using an Image for VirtualBox 00:05:00 VirtualBox Troubleshooting Tips 00:02:00 When to Install Linux from Scratch 00:15:00 Installing CentOS from Scratch / CentOS Manual Installation Process 00:23:00 Getting Connected 00:11:00 Connect Directly 00:02:00 Unit 03: Day 2 The Linux Directory Structure 00:10:00 The Shell 00:08:00 Basic Linux Commands 00:05:00 Teach Yourself to Fish 00:06:00 Working with Directories 00:09:00 Listing Files and Understanding LS Output 00:12:00 Unit 04: Day 3 File and Directory Permissions Explained - Part One 00:11:00 File and Directory Permissions Explained - Part Two 00:09:00 View Files and the Nano Editor 00:05:00 Editing Files in Vi 00:10:00 Editing Files with Emacs 00:06:00 Finding Files and Directories 00:07:00 Graphical Editors 00:04:00 Unit 05: Day 4 Deleting, Copying, Moving, and Renaming Files 00:11:00 Wildcards - Part One 00:05:00 Wildcards - Part Two 00:07:00 Input, Output, and Redirection 00:08:00 Comparing Files 00:04:00 Searching in Files and Using Pipes 00:10:00 Transferring and Copying Files over the Network 00:07:00 Customizing the Shell Prompt 00:05:00 Shell Aliases 00:04:00 Unit 06: Day 5 Environment Variables 00:08:00 Processes and Job Control 00:12:00 Scheduling Repeated Jobs with Cron 00:06:00 Switching Users and Running Commands as Others 00:08:00 Shell History and Tab Completion 00:13:00 Installing Software on RPM Based Linux Distros: RedHat, CentOS, AlmaLinux, Rocky 00:21:00 Installing Software on Debian Based Linux Distros: Debian, Ubuntu, Kali Linux 00:12:00 Conclusion - Congratulations and Thank You! 00:01:00 Unit 07: Addendum - Connecting to a Linux Virtual Machine over the Network Connecting to a Linux Virtual Machine over the Network 00:11:00 Unit 08: Bonus Bonus - Installing NGINX, MySQL, PHP, and WordPress on Ubuntu 00:09:00 Unit 09: Resources Resources 00:15:00