The demand for a computer is everywhere. So, the technical support specialist of it is inevitable. If you pursue a high position in this field, look at the Computer Maintenance Specialist Course course. Its precise contents will guide you to develop the skills you need to kick-start in such a role. The course teaches you all technical equipment and aspects of the computer in order to support customer, organization, or company on the basis of their problem with a proper solution. Overall, the course enhances your ability to diagnosis the problems of the computer at once and support the customers efficiently. Who is this course for? Computer Maintenance Specialist Course is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Computer Maintenance Specialist Course is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Computer Fundamentals Basic Terms 00:15:00 Types of Computers 00:15:00 Anatomy of a PC 00:30:00 How a PC Works 00:15:00 CPU and Memory 00:30:00 Input Devices 00:15:00 Output Devices 00:15:00 Secondary Storage Devices 00:30:00 The Basics 00:15:00 Operating Systems and Applications 00:30:00 How is Software Built 00:15:00 Types of Software 00:15:00 Legal Issues 00:15:00 Computer Maintenance Introduction 00:15:00 Understanding The Components Of A PC 01:30:00 Do You Need To Upgrade Your PC? 01:00:00 Essential Softwares You Must Have On Your PC 01:00:00 Installing And Organizing Your PC 01:00:00 Troubleshooting Guidelines 01:00:00 How To Speak To A Technician 00:30:00 Summary 00:30:00 Mock Exam Mock Exam-Computer Maintenance Specialist Course 00:20:00 Final Exam Final Exam-Computer Maintenance Specialist Course 00:20:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This intermediate course is for operations personnel and technical staff who are directly involved in the installation, operation, systems support, and software support of their System z mainframe environment. Overview Identify the zEnterprise 196 and 114, System z10, System z9, and zSeries servers Describe the major differences of the function and features between the System z servers Describe and explain the concept of logical partitioning Identify how various resources are assigned to LPARs during initialization Describe the functions provided by the HMC and SE This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain indepth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers. WelcomeUnit 1: IBM mainframe server hardware: Overview Unit 2: Using the HMC classic style user interface Unit 3: Using the HMC tree style user interfaceUnit 4: Using the HMC to monitor System z servers Supporting labsReviewUnit 5: Activation profiles and operational tasksUnit 6: Single object operation: CPC session Supporting labs
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues
Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s Overview Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security Develop a security plan for your Power Systems with IBM i Describe the options to implement security auditing Develop a plan to audit security on your Power Systems with IBM i Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i Develop a backup and recovery plan for your Power Systems with IBM i Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Class administration and introductions . IBM i overview and concepts . Management central overview . Security concepts and overview . System values . User security . Resource security . Security auditing . Designing security . IBM i availability overview . Disk management . Backup and recovery strategy using Save/Restore . Journal management . Commitment control overview . Backup and recovery planning . Problem determination . Overview of Systems Director Navigator for i . Introduction to BRMS .
Duration 1 Days 6 CPD hours Companies are increasingly integrating Mac computers into Windows or other standards-based network environments. This Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. This course is also ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users Directory Services Connecting a Mac to a Directory Server Using Network Account File Sharing Connecting to File Servers Turning on Personal File Sharing Email, Contacts, and Calendars Managing Internet Accounts Preferences Connecting to an Exchange Server Connecting Mail to Non-Windows Servers Adding Accounts in Mail, Contacts, and Calendars Security Built-in Security Features Creating Strong Passwords Using Two-factor Authentication Setting a Firmware Password Locking a Mac Screen Creating User Accounts Disabling Automatic Login Protecting Start-up Disk Files Ensuring that the Apps you Download are Safe Providing Network Security Printing Connecting to a Local Printer Setting up a Wireless Printer Sharing your Printer Setting up a Printer Shared by a Mac and a PC via SMB or CIFS Setting up an IP Printer Specifying Printer Features Printing from a Network Printer Instant Messaging iMessage Jabber Configuring Messages Adding Accounts Chatting on a local network with Bonjour Moving and Backing Up Content Moving Content Backing up Data with Time Machine Running Windows on a Mac Running Windows Natively or Virtually Using Office Using Cross-platform Apps Using Cross-platform Files
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers
Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client
Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .