• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1703 Cloud courses

VMware Ultimate Bootcamp vSphere 5.5

4.3(43)

By John Academy

Description: VMware vSphere 5.5 is a vital component of the VMware vCloud 5.5 Suite. Currently, it is the industry-leading virtualization technology platform accelerating the shift to cloud computing. The Ultimate Bootcamp has become known to be the most comprehensive VMware training and certification course in the industry. This VMware Ultimate Bootcamp vSphere 5.5 covers everything you need to know about the VMware vSphere 5.5 Ultimate Bootcamp. You will learn about virtualization, planning and installing ESXi, using tools to administer a VMware environment, vCenter Server 5.5 and licensing, configuring networking, configuring storage, VM creation, configuration, and snapshots, security and permissions, server and VM monitoring, advanced ESXi and vCenter server management, patching and upgrading ESXi, and disaster recovery and backup.  You can join this course to Experience the comprehensive content included in multiple VMware vSphere. Assessment & Certification: To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware Ultimate Bootcamp vSphere 5.5 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Series Introduction and Methodology Series Introduction and Methodology FREE 00:08:00 Virtualization Overview VMware Virtualization 00:14:00 Other VMware & 3rd Party Virtualization Technologies 00:09:00 Planning and Installing ESXi Planning the ESXi Deployment 00:12:00 vSphere 5.x Deployment Guidelines 00:08:00 vSphere Hypervisor (ESXi) Installation 00:13:00 Configuring Hostname Resolution and NTP999 00:01:00 Troubleshooting ESXi 00:07:00 Troubleshooting ESXi Overview of 3rd Party Tools 00:08:00 ESXi Management 00:27:00 Linux Command Review 00:04:00 Troubleshooting the vSphere Client (VIC) 00:13:00 vCenter Server 5.5 and Licensing Licensing 00:09:00 vCenter Server Installation 00:37:00 vSphere Web Client 00:05:00 vCenter Server Inventory 00:25:00 Managing vCenter Server 00:14:00 Planning vCenter Server Deployment 00:05:00 Troubleshooting vCenter Server and Database 00:10:00 Configuring Networking Creating & Modifying Virtual Networks 00:52:00 vSphere Distributed Switches 00:39:00 Creating & Modifying Virtual Networks Using CLI 00:20:00 Configuring Storage Storage Concepts 00:28:00 iSCSI Storage (GUI & Command Line) 00:30:00 Fibre Channel Storage 00:09:00 VMFS Datastores (GUI & Command Line) 00:37:00 NAS Storage and NFS Datastores (GUI & Command Line) 00:18:00 Raw Device Mapping (RDM) 00:06:00 Solid State Disks (SSD) 00:07:00 Storage & Management Solutions 00:02:00 VM Creation, Configuration, and Snapshots Create a VM 00:48:00 Create Multiple VMs, Templates & Clones 00:13:00 Virtual Appliances 00:28:00 Configuration and Use of vApps 00:03:00 VMware Converter (P2V - V2V) 00:26:00 Manage VMs 00:51:00 Virtual Machine Startup/Shutdown 00:07:00 Virtual Machine Snapshots 00:14:00 Virtual Machine Troubleshooting & Best Practices 00:24:00 Security and Permissions Controlling User Access and Passwords 00:27:00 ESXi Active Directory (AD) Integration 00:11:00 Managing Firewalls & Certificates 00:09:00 vCloud VMsafe and vShield 00:05:00 Server and VM Monitoring Optimizing Resources 00:32:00 Resource Pools 00:12:00 Latency Sensitive Applications 00:03:00 Performance Monitoring 00:55:00 Configuring Alarms 00:20:00 ESXi & vCenter Logs 00:22:00 Advanced ESXi and vCenter Server Management Storage Views & Topology Maps 00:11:00 Storage vMotion 00:19:00 Configuring vMotion 00:13:00 Enhanced vMotion 00:12:00 Distributed Resource Scheduler (DRS) Cluster 00:29:00 Profile Driven Storage, Datastore Clusters & Storage DRS (SDRS) 00:27:00 DRS Cluster Monitoring 00:23:00 Host Profiles 00:15:00 Linked Mode Group of vCenter Servers 00:04:00 vSphere Storage Appliance (VSA) 00:04:00 VMware Virtual SAN (VSAN) 00:03:00 Patching and Upgrading ESXi Patching ESXi Standalone Hosts 00:02:00 Patching the vCenter Environment 00:30:00 Upgrades and Migrations 00:24:00 Disaster Recovery and Backup vSphere Replication 5.5 00:07:00 Site Recovery Manager (SRM) 00:07:00 High Availability (HA) 00:40:00 VM Fault Tolerance 00:06:00 Microsoft Clustering 00:03:00 Backup Strategies 00:02:00 VMware Data Protection 00:28:00 Third Party Backups 00:10:00 Mock Exam Mock Exam- VMware Ultimate Bootcamp vSphere 5.5 00:20:00 Final Exam Final Exam- VMware Ultimate Bootcamp vSphere 5.5 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

VMware Ultimate Bootcamp vSphere 5.5
Delivered Online On Demand20 hours 46 minutes
£11.99

Web Application Penetration Testing & Security

4.9(27)

By Apex Learning

Give a compliment to your career and take it to the next level. This Web Application Penetration Testing & Security will provide you with the essential knowledge and skills required to shine in your professional career. Whether you want to develop skills for your next job or want to elevate skills for your next promotion, this Web Application Penetration Testing & Security will help you keep ahead of the pack. The Web Application Penetration Testing & Security incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can reinforce your professional skills and essential knowledge, reaching out to the level of expertise required for your position. Further, this Web Application Penetration Testing & Security will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your profession while at the same time it outlines essential career insights in this job sector. Consequently, you'll strengthen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Web Application Penetration Testing & Security, you can equip yourself with the essentials to keep you afloat into the competition. Along with this Web Application Penetration Testing & Security course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. This Bundle Consists of the following Premium courses: Course 01: Complete Web Application Penetration Testing & Security Course 02: Secure Programming of Web Applications Course 03: GDPR Data Protection Level 5 Course 04: Front End Web Development Diploma Course 05: Modern Web Designing - Level 2 Course 06: WebGL 2D/3D Programming and Graphics Rendering Course 07: Python for Data Analysis Course 08: Network Security Level 2 Course 09: SQL Server for Beginners Course 10: Functional Skills IT Course 11: Level 2 Microsoft Office Essentials As one of the top course providers in the UK, we're committed to providing you with the best educational experience possible. Our industry experts have designed the Web Application Penetration Testing & Security to empower you to learn all at once with accuracy. You can take the course at your own pace - anytime, from anywhere. So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Web Application Penetration Testing & Security: One payment, but lifetime access to 11 CPD courses Certificate, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Get 24/7 help or advice from our email and live chat teams Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificates: Free (Previously it was £10*11= £110) Hard Copy Certificates: Free (Previously it was £20*11= £220) Curriculum of the Bundle Course 01: Complete Web Application Penetration Testing & Security Unit 01: Introduction Unit 02: BE PREPARED Unit 03: WEB APPLICATION TECHNOLOGIES Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS Unit 07: CROSS SITE REQUEST FORGERY - XSRF Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Unit 09: CLIENT SIDE SECURITY TESTING Unit 10: FILE RELATED VULNERABILITIES Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE Course 02: Secure Programming of Web Applications Section 01: Introduction Section 02: Well-known Vulnerabilities and Secure Programming Section 03: Conclusion and Summary Course 03: GDPR Data Protection Level 5 Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations Course 04: Front End Web Development Diploma Welcome to the course! Web Development Basics - HTML Advanced HTML Concepts Introduction to Cascading Style Sheets (CSS) Advanced CSS JavaScript for Begeinners More JavaScript Concepts Getting Started with jQuery More jQuery Bootstrap Basics Project #2 - Pipboy from Fallout 4 Project #3 - Google Chrome Extension BONUS - Coding Another Google Chrome Extension Course 05: Modern Web Designing - Level 2 Module: 01 1.1 Intro 1.2 Install the Tools and Get Started Module: 02 2.1 Intro to HTML 2.2 What is HTML 2.3 Start a New HTML File & Use Tags 2.4 Header Tags 2.5 Edit Text 2.6 Links 2.7 Images 2.8 Lists 2.9 Challenge 1 2.10 HTML Outro Module: 03 3.1 CSS Intro 3.2 Add CSS Styles 3.3 Classes and IDs 3.4 Borders 3.5 Sizing 3.6 Padding and Margin 3.7 Text Styles 3.8 DIVs 3.9 Postioning 3.10 Hover 3.11 Easily Center Elements 3.12 Fonts 3.13 Challenge 3.14 CSS Outro Module: 04 4.1 Intro to Bootstrap 4.2 Install Bootstrap 4.3 Indenting and Containers 4.4 The Grid System 4.5 Images 4.6 Buttons 4.7 Challenge 3 4.8 Bootstrap Outro Module: 05 5.1 Landing Page Intro 5.2 Sketch Your Landing Page 5.3 The Top Section 5.4 Polish the Top Section 5.5 Adding Images 5.6 The Main Points Section 5.7 Collecting Emails With an Opt-In Form 5.8 Challenge 4 5.9 Landing Page Outro Module: 06 6.1 Business Site Intro 6.2 Sketch Up 6.3 Using Fancy Font Logo 6.4 Carousel Basics 6.5 Carousel Extras 6.6 Text on Images 6.7 Phone Number Icon 6.8 Google Maps 6.9 Font Awesome 6.10 Challenge 4 6.11 Business Site Outro Module: 07 7.1 Intro 7.2 Portfolio Sketch 7.3 Jumbotron 7.4 Nav Bar 7.5 Panels 7.6 Challenge 5 7.7 Portfolio Outre Module: 08 8.1 Hosting 8.2 Bluehost 8.3 Uploading 8.4 Tips 8.5 Hosting Outro Course 06: WebGL 2D/3D Programming and Graphics Rendering Section 01: Introduction Section 02: Drawing Objects Section 03: Colours and Textures Section 04: Moving & Transforming Objects Section 05: Movement & Camera Section 06: Lighting & Shading Course 07: Python for Data Analysis Welcome, Course Introduction & overview, and Environment set-up Python Essentials Python for Data Analysis using NumPy Python for Data Analysis using Pandas Python for Data Visualization using matplotlib Python for Data Visualization using Seaborn Python for Data Visualization using pandas Python for interactive & geographical plotting using Plotly and Cufflinks Capstone Project - Python for Data Analysis & Visualization Python for Machine Learning (ML) - scikit-learn - Linear Regression Model Python for Machine Learning - scikit-learn - Logistic Regression Model Python for Machine Learning - scikit-learn - K Nearest Neighbors Python for Machine Learning - scikit-learn - Decision Tree and Random Forests Python for Machine Learning - scikit-learn -Support Vector Machines (SVMs) Python for Machine Learning - scikit-learn - K Means Clustering Python for Machine Learning - scikit-learn - Principal Component Analysis (PCA) Recommender Systems with Python - (Additional Topic) Python for Natural Language Processing (NLP) - NLTK - (Additional Topic) Course 08: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Course 09: SQL Server for Beginners Introduction Setup Basic queries Security MSSQL an ddifferent drivers Files General Course 10: Functional Skills IT Section 1: Introduction Section 2: Information Technology Section 3: Components of IT Section 4: Hardware Section 5: Operating System Section 6: Application/Software Section 7: Networking Section 8: Security Section 9: Traffic Flow & Enterprise Level IT Components Section 10: Storage Section 11: Database Section 12: Virtualisation & Cloud Section 13: Management & Other IT Jobs Course 11: Level 2 Microsoft Office Essentials Excel 2016 Getting Started with Microsoft Office Excel 2016 Performing Calculations Modifying a Worksheet Formatting a Worksheet Printing Workbooks Managing Workbooks Word 2016 Getting Started with Word Formatting Text and Paragraphs Working More Efficiently Managing Lists Adding Tables Inserting Graphic Objects Controlling Page Appearance Preparing to Publish a Document Workbooks - Microsoft Word 2016 (Beginner) PowerPoint 2016 PowerPoint Interface Presentation Basics Formatting Inserting Options Working with Objects Table Charts Review and Presentatin Access 2016 Introduction to Access Modify Data Working with Queries Access Forms Working with Reports CPD 135 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Web Application Penetration Testing & Security bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Web Application Penetration Testing & Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various expertise will increase the value in your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included

Web Application Penetration Testing & Security
Delivered Online On Demand
£53

Master Hibernate and JPA with Spring Boot in 100 Steps

By Packt

Master JPA using Hibernate as the implementation. Learn the basics of JPA: entities, relationships, entity manager, annotations, JPQL and Criteria API. Take a step into the advanced world of JPA such as caching, performance tuning (n + 1 queries), and mapping inheritance hierarchies. Get a peek into the magic of Spring Data JPA and Spring Data REST.

Master Hibernate and JPA with Spring Boot in 100 Steps
Delivered Online On Demand12 hours 58 minutes
£147.99

Financial Management with Xero

By Compete High

Unleash Financial Mastery with 'Financial Management with Xero' Course! 💰📊 Are you ready to take control of your finances and elevate your financial management skills to new heights? Look no further than our comprehensive 'Financial Management with Xero' course! 🚀 Why Choose 'Financial Management with Xero'? 🎓 Unlock the Power of Xero: Dive into the world of Xero, the leading cloud-based accounting software trusted by millions worldwide. Learn how to harness its robust features and functionalities to streamline your financial processes with ease. 📈 Gain Financial Clarity: Master the art of financial management, from budgeting and forecasting to cash flow management and financial analysis. Acquire the skills needed to make informed financial decisions that drive growth and success. 💼 Enhance Career Opportunities: Stand out in today's competitive job market with in-demand financial management skills. Whether you're an aspiring accountant, small business owner, or finance professional, this course equips you with the expertise employers crave. 🔧 Practical Hands-On Learning: Dive into real-world case studies, practical exercises, and interactive simulations to reinforce theoretical concepts and apply them to real-life scenarios. Gain practical experience that sets you apart from the competition. 👨‍🏫 Expert-Led Instruction: Learn from industry experts and seasoned financial professionals who bring years of experience and insights to the table. Benefit from their expertise as they guide you through every step of your financial management journey. Who is this for? 👩‍💼 Business Owners: Whether you're running a small startup or managing a growing enterprise, mastering financial management with Xero is essential for driving profitability and sustainable growth. 🎓 Students: Aspiring accountants, finance majors, and business students looking to enhance their financial acumen and gain a competitive edge in their future careers will find immense value in this course. 💼 Finance Professionals: From financial analysts and controllers to CFOs and accounting professionals, anyone looking to advance their career and excel in the field of finance will benefit from mastering Xero and financial management principles. Career Path 🌟 Accountant: Unlock exciting opportunities as a certified accountant equipped with Xero expertise, offering financial management services to businesses of all sizes. 💼 Financial Analyst: Dive into the world of financial analysis and reporting, leveraging your Xero skills to provide valuable insights and recommendations that drive business growth. 📊 Finance Manager: Lead financial strategy and decision-making processes as a finance manager, utilizing your Xero proficiency to optimize financial performance and drive profitability. 📈 Small Business Owner: Take your business to new heights with a solid understanding of financial management and Xero, empowering you to make informed decisions that fuel success and growth. FAQ Q: Is prior experience required to enroll in this course? A: No prior experience is necessary. This course is designed to accommodate learners of all levels, from beginners to advanced users. Q: How long does it take to complete the course? A: The duration of the course varies depending on individual learning pace and commitment level. However, most learners typically complete the course within [insert estimated duration]. Q: Will I receive a certificate upon completion of the course? A: Yes, upon successful completion of the course requirements, you will receive a certificate of completion, showcasing your mastery of financial management with Xero. Q: Is this course accredited? A: While this course may not be accredited by a specific governing body, it provides valuable skills and knowledge that are highly sought after in the finance industry. Q: Can I access the course materials on any device? A: Yes, the course materials are accessible on any device with an internet connection, allowing you to learn anytime, anywhere. Q: Is there ongoing support available during the course? A: Yes, our dedicated support team is available to assist you throughout your learning journey, addressing any questions or concerns you may have along the way. Q: Will I have access to updated course materials? A: Yes, as part of your enrollment, you will have access to updated course materials to ensure you stay informed of the latest industry trends and developments. Enroll Now and Empower Your Financial Future! Don't miss out on this incredible opportunity to master financial management with Xero and take your career to new heights. Enroll now in our 'Financial Management with Xero' course and unlock the door to financial success and prosperity! 🚀💼📈 Course Curriculum Module 1 Introduction to Financial Management and Xero Introduction to Financial Management and Xero 00:00 Module 2 Financial Data Entry and Recording with Xero Financial Data Entry and Recording with Xero 00:00 Module 3 Streamlining Financial Workflows and Efficiency with Xero Streamlining Financial Workflows and Efficiency with Xero 00:00 Module 4 Advanced Financial Management and Compliance in Xero Advanced Financial Management and Compliance in Xero 00:00 Module 5 Integration Strategies and Continuous Improvement with Xero Integration Strategies and Continuous Improvement with Xero 00:00 Module 6 Cash Flow Management and Financial Planning with Xero Cash Flow Management and Financial Planning with Xero 00:00

Financial Management with Xero
Delivered Online On Demand6 hours
£5

Tailwind CSS From Scratch - Learn by Building Projects

By Packt

This is a fun project-based course to learn how to create awesome layouts using the Tailwind CSS framework and to get comfortable using utility classes over something like Bootstrap, which uses component-based classes. Experiment and learn all about certain aspects of Tailwind with the help of this course.

Tailwind CSS From Scratch - Learn by Building Projects
Delivered Online On Demand12 hours 33 minutes
£82.99

Practical WebRTC: A Complete WebRTC Bootcamp for Beginners

By Packt

In this course, we will learn about the future's technology called WebRTC by building two real-world chat applications. We will learn what is WebRTC, why it is important, how it works, and cover the different protocols used in WebRTC. A basic understanding of HTML, CSS, and JavaScript is required.

Practical WebRTC: A Complete WebRTC Bootcamp for Beginners
Delivered Online On Demand3 hours 26 minutes
£52.99

VMware Horizon 8: Infrastructure Troubleshooting

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Discuss Horizon Connection Server advanced configurations List troubleshooting techniques for Horizon Connection Server common issues Interpret Horizon 8 Connection Server logs Identify Unified Access Gateway configuration and certificate issues List troubleshooting steps for Unified Access Gateway common issues Describe BLAST configuration verification using logs and settings Describe BLAST optimization recommendations for different use cases Describe Horizon 8 Connections and how to troubleshoot related issues Describe Horizon 8 certificates List troubleshooting steps for common issues with Horizon 8 certificates Leverage Horizon infrastructure troubleshooting steps to resolve issues This three-day, hands-on training provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon© 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting VMware Horizon© Connection Server?, VMware Unified Access Gateway?, protocols, connections, and certificates Course Introduction Introduction and course logistics Course objectives Horizon Connection Server Troubleshooting Discuss Horizon Connection Server general troubleshooting techniques Identity Horizon Connection Server common issues through logs Describe AD LDS replication Discuss Horizon Connection Server replication common issues Review and Interpret Horizon Connection Server logs Compare successful and unsuccessful logs from everyday infrastructure administration tasks Unified Access Gateway Troubleshooting List and identify common Unified Access Gateway deployment issues Monitor the Unified Access Gateway deployment to identify health and issues Identify and troubleshoot Unified Access Gateway certificate issues Monitor, test, and troubleshoot network problems Discuss general Unified Access Gateway troubleshooting processes BLAST Configuration Verification Discuss BLAST Codecs and Encoder Switch settings. Describe how to verify BLAST configuration using logs and settings BLAST Optimization List general BLAST optimization recommendations Summarize BLAST tuning recommendations that apply to WAN connections Summarize BLAST tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe recommended tuning options to increase display protocol quality for all use cases and applications. VMware Horizon Connections Troubleshooting Explain Horizon connections Describe the role of Primary and Secondary protocols in Horizon connections Describe HTML client access connections Describe Horizon connections load balancing Describe timeout settings, supported health monitoring string, and suitable load balancer persistence values Identify troubleshooting steps for failing Horizon load balancer connections List troubleshooting steps for Horizon connections VMware Horizon Certificates Troubleshooting List Horizon certificate functions Describe Horizon certificates scenarios. Discuss potential challenges related to certificates in Horizon Describe the troubleshooting approach to Horizon certificate issues VMware Horizon Challenge Lab Leverage Horizon infrastructure troubleshooting steps to resolve issue Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Infrastructure Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Log Insight: Deploy and Manage [V8.4]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system integrators, and developers responsible for designing and implementing vRealize Log Insight Overview By the end of the course, you should be able to meet the following objectives: Identify features and benefits of vRealize Log Insight Determine the vRealize Log Insight cluster that meets your monitoring requirements Describe the vRealize Log Insight architecture and use cases Deploy and configure a vRealize Log Insight cluster Use the Interactive Analytics tab to get a deep understanding of log data Create and manage queries Managing vRealize Agents and Agent Groups Create various custom dashboards Describe and use the vRealize Log Insight widgets Extend the capabilities of vRealize Log Insight by adding content packs and configuring solutions This two-day course focuses on deploying, using, and managing VMware vRealize© Log Insight? product. It provides you with the knowledge and skills to deploy a vRealize Log Insight cluster that meets the monitoring requirements of your environment. This course covers the configuration and use of vRealize Log Insight to collect and manage logs from a variety of VMware and third-party products. This course discusses interfacing vRealize Log Insight with other systems to monitor, troubleshoot, and secure a data center. Course Introduction Introductions and course logistics Course objectives Introduction to vRealize Log Insight Describe a cloud management platform Explain the importance of efficient log management Describe the requirements for a log analytics solution Describe the key benefits of vRealize Log Insight Describe the key features of vRealize Log Insight Describe the various stages of log processing vRealize Log Insight Architecture and Deployment Identify the minimum requirements for deploying vRealize Log Insight Using vRealize Log Insight Sizing Calculator Describe vRealize Log Insight compatibility with other VMware products Describe the vRealize Log Insight architecture Determine the correct vRealize Log Insight deployment for an environment Install the vRealize Log Insight virtual appliance vRealize Log Insight Queries and Dashboards Describe the primary functions of the vRealize Log Insight UI Use the Interactive Analytics tab to get a deep understanding of log data Create and Manage queries Create vRealize Log Insight custom dashboards Describe and use the vRealize Log Insight widgets Administering vRealize Log Insight Describe User Access Control in vRealize Log Insight Describe User Management Access the vRealize Log Insight Administration page Configure vRealize Log Insight settings Manage certificates Configure system notifications Upgrade vRealize Log Insight Describe the vRealize Log Insight Importer vRealize Log Insight Integrations Describe how to integrate vRealize Operations with vRealize Log Insight Describe the advantages of integrating vRealize Operations with vRealize Log Insight Describe the advantages of using the vSAN content pack Install NSX content packs Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Log Insight: Deploy and Manage [V8.4] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Log Insight: Deploy and Manage [V8.4] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Log Insight: Deploy and Manage [V8.4]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Deployment engineer Network engineer Sales engineer Overview After taking this course, you should be able to: Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection error The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco© on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.This course offers lessons and hands-on labs to prepare you for the 300-825 Implementing Cisco Collaboration Conferencing (CLCNF) exam. Course outline Describing Cisco Conferencing Architecture Configuring a Single Combined Deployment Installing Cisco Meeting Server Using APIs with Cisco Meeting Server Configuring a Cisco Meeting Server Scalable and Resilient Deployment Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server Configuring Recording and Streaming with Cisco Meeting Server Troubleshooting Cisco Meeting Server Integrating Cisco Meeting Server with Cisco Unified CM Integrating Cisco Meeting Server with Microsoft Skype for Business Installing and Operating Cisco TMS and Cisco TMSXE Installing and Integrating Cisco Meeting Management Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry