• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1696 Computing courses in Chepstow delivered Live Online

DevOps Fundamentals

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Individuals involved in IT development, IT operations or IT service management; Those whose role is touched by DevOps and continuous delivery, such as the following IT roles: DevOps engineers, Product owners Integration specialists, Operations managers, Incident & change managers, System administrators, Network administrators, Business managers, Automation architects, Enterprise architects, Testers Overview Know the emergence of DevOps Know the core concepts and principles of DevOps Know what DevOps means for you as professional and for your organization Know the essence of a DevOps culture Understand the key elements of a DevOps culture Know the important aspects when creating a DevOps culture Know the Operational models of DevOps Understand the need for autonomous teams Understand the impact of DevOps on Architecture with respect to deployment Understand governance within DevOps teams Understand Agile, Scrum and Kanban and how these practices relate to one another Understand how ITSM processes relate to practices in a DevOps culture Understand how lean is used to optimise processes Know how to provide a Value Stream Map for a given process Understand the way to harvest new and innovative ideas Know the impact of automation on Software Delivery processes Understand the benefits and core principles of Continuous Delivery Describe the key cloud principles for DevOps organisations Know the relevance of monitoring and logging DevOps This course is designed to provide the core education necessary to build your DevOps vocabulary and to understand its principles and practices. With the help of key DevOps concepts and terminology, real-life case studies, examples and interactive group discussions and extensive exercises in each module you will acquire a fundamental understanding of DevOps. Introduction Let?s Get to Know Each Other Overview Course Objectives Mapping of the Competence Model with the Course Modules Course Agenda Type of Activities Exam Course Book Technical Glossary Group Activity Module Summary DevOps Introduction Module Objectives Module Topics Emergence of DevOps Core Concepts of DevOps DevOps Agile Skills Association (DASA) Module Summary Module End Questions Culture Module Objectives Module Topics Essence of a DevOps Culture Key Elements of DevOps Implementation of a DevOps Culture Module Summary Module End Questions Organization Module Objectives Module Topics Organizational Model Autonomous Teams Architecting for DevOps Governance Module Summary Module End Questions Processes Module Objectives Module Topics Process Basics DevOps in Relation to ITSM Agile and Scrum 12 Principles of the Agile Manifesto Optimizing Processes Using Lean Business Value Optimization and Business Analysis Using Story Mapping Module Summary Module End Questions Automation Module Objectives 6A Automation Concepts Automation for Delivery of Software Continuous Delivery Core Concepts Continuous Delivery Automation Concepts Continuous Delivery Automation Focus Topics 6B Data Center Automation Emergence of Cloud Technology and Principles Cloud Services Concepts in a DevOps Organization Automated Provisioning Concepts Platform Product Characteristics and Application Maturity Module Summary Module End Questions Measure and Improvement Module Objectives Module Topics Importance of Measurement Choosing the Right Metrics Monitoring and Logging Module Summary Module End Questions

DevOps Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

PostgreSQL Server Administration (TTDB7020)

By Nexus Human

Duration 3 Days 18 CPD hours PostgreSQL is a powerful, open-source, object-relational database system known for being reliable, secure, and flexible. For administrators, learning PostgreSQL equips you with the skills needed to handle complex and high-performance databases in our data-driven world. Big-name companies like Apple, Cisco, Fujitsu, and IBM trust PostgreSQL for their critical applications, which highlights its significance and broad industry adoption. By getting the hang of PostgreSQL, administrators can boost their career opportunities and play a key role in the success of data-focused businesses. PostgreSQL Server Administration is a three-day hands-on course geared for administrators seeking to sharpen their skills and elevate their database management capabilities. Throughout the course you?ll explore a wide range of essential topics, from server architecture and user accounts to monitoring and routine maintenance. Throughout the course, you'll gain invaluable insights and practical techniques that will empower you to optimize, secure, and manage your PostgreSQL environment effectively. As you navigate through server configuration, database reporting, backup and restore procedures and more, you'll have the opportunity to apply your newfound knowledge to real-world scenarios. By the end of the course, you'll be equipped with the confidence and skillset required to tackle a wide array of administrative challenges and to effectively manage your PostgreSQL databases. Additional course details: Nexus Humans PostgreSQL Server Administration (TTDB7020) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL Server Administration (TTDB7020) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PostgreSQL Server Administration (TTDB7020)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

Java Fundamentals for Android Development

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for software developers or anyone interested in building Android applications. Overview Install Android Studio. Writing a Java Program. Run a Java Program. Write a Java Comment. Understand Java Variables and Their Data Types. Acquiring Good Knowledge of Java Control Flow Statements. Understanding The Java Methods and Arrays. Understanding the Object-Oriented Programming (OOP) Concepts and Java Class. Developing applications for Android? systems requires basic knowledge of Java programming language. Introductory course that focuses on the fundamentals of Java programming language, its framework, syntax, and paradigm. First Step in Java The History of Java How Java Programs work? Install Java JDK and JRE Why did Google choose Java over other programming languages? Android OS Structure Install Android Studio Create and Run Java Projects Creating an Android Project (Java Project) Using Android Studio Writing a Java Program Java Methods Running a Java Program Write a Comment Java Variables and Their Data Type Control Flow Statements Introduction IF ? Else Statement If?Else and Else?If... Statement If Else and Logical Operators Switch Statement While Loop Do-while Loop For Loop The Break Statement The Continue Statement Methods and Arrays Introduction Method Structure Call Method by Value Call Method by Reference Arrays Enter Data to Java Program Object-Oriented Programming (OOP) Concepts Java Class Additional course details: Nexus Humans Java Fundamentals for Android Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Fundamentals for Android Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Java Fundamentals for Android Development
Delivered OnlineFlexible Dates
Price on Enquiry

9000 System Manager 2.8 (5-day)

By Nexus Human

Duration 1 Days 6 CPD hours

9000 System Manager 2.8 (5-day)
Delivered OnlineFlexible Dates
Price on Enquiry

40550 Microsoft Cloud Workshop - Windows Server and SQL Server 2008 EOS planning

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services Overview At the end of this whiteboard design session, you will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as they are transitioned and modernized. Topics covered will include how to get an inventory of a 2008 server environment, how to categorize 2008 workloads and evaluate the best option for each category, migration and upgrade tools available, TCO analysis tools, offers available from Microsoft to leverage existing licenses and innovations of recent product updates, licensing and technologies. This course will look at the process of migrating workloads to Azure. You will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as your customers transition and modernize their application, data, and infrastructure environment. Whiteboard Design Session - Windows Server 2008 and SQL Server 2008 end of support planning Review the customer case study Design a proof of concept solution Present the solution

40550 Microsoft Cloud Workshop - Windows Server and SQL Server 2008 EOS planning
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware TanzuTM portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this three-day course, you focus on installing VMware Tanzu© Kubernetes Grid? on a VMware vSphere© environment and then provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multi-pod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management and workload clusters, and the role of Cluster API List the components of a Tanzu Kubernetes Grid instance Illustrate how to use the Tanzu CLI Identify the requirements for a bootstrap machine Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API Custom Resource Definitions Management Clusters List the requirements for deploying a management cluster Differentiate between deploying on vSphere 6.7 Update 3 and vSphere 7 Describe the components of NSX Advanced Load Balancer Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer Explain how Kubernetes manages authentication Define Pinniped Define Dex Describe the Pinniped authentication workflow List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters Tanzu Kubernetes Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs make up a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Configuring and Managing Tanzu Kubernetes Grid Instances Define the Tanzu Kubernetes Grid packages Describe the Harbor Image Registry Define Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Demonstrate how to install Service Discovery with ExternalDNS. Define Multus CNI Define Prometheus Define Grafana Troubleshooting Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to use SSH to connect to a Tanzu Kubernetes Grid VM Describe the steps for troubleshooting a failed cluster deployment Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats

Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)
Delivered OnlineFlexible Dates
Price on Enquiry