• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1636 Database courses in Epsom delivered Online

Windows Server 2016 - Level 1 Hands-on Training Online

By Lead Academy

Windows Server 2016 - Level 1 Hands-on Training Course Overview Are you looking to begin your Microsoft Server 2016 career or want to develop more advanced skills in Microsoft Server 2016? Then this Windows Server 2016 - Level 1 Hands-on Training course will set you up with a solid foundation to become a confident Windows Server 2016 administrator and help you to develop your expertise in Microsoft Server 2016. This Windows Server 2016 - Level 1 Hands-on Training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this Windows Server 2016 - Level 1 Hands-on Training course will set you up with a solid foundation to become a confident Windows Server 2016 administrator and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a Windows Server 2016 administrator. The Windows Server 2016 - Level 1 Hands-on Training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a Windows Server 2016 administrator. This comprehensive Windows Server 2016 - Level 1 Hands-on Training course is the perfect way to kickstart your career in the field of Microsoft Server 2016. This Windows Server 2016 - Level 1 Hands-on Training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a Windows Server 2016 administrator or want to learn more skills on Microsoft Server 2016 but unsure of where to start, then this Windows Server 2016 - Level 1 Hands-on Training course will set you up with a solid foundation to become a confident Windows Server 2016 administrator and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This Windows Server 2016 - Level 1 Hands-on Training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who should take this course? This comprehensive Windows Server 2016 - Level 1 Hands-on Training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of Microsoft Server 2016. Entry Requirement There are no academic entry requirements for this Windows Server 2016 - Level 1 Hands-on Training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This windows server 2016 - level 1 hands-on training online course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Video Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox Video and Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox Video and Lab - Create Virtual Install of Server 2016 Core Using VirtualBox Video and Lab - Create Virtual Install of Windows 10 Pro Using VirtualBox Video - Take a Snapshot of Your Current Configuration Building a Microsoft Server 2016 Domain Video and Lab - Preparing Your Network for Active Directory Video and Lab - Prepare Server 2016 for Promotion to a Domain Controller Video and Lab - Promote Server 2016 to a Domain Controller Video and Lab - Join Server 2016 Core to Windows 2016 Domain Video and Lab - Promote Server Core to a Domain Controller Video and Lab - Add a Windows 10 Workstation to a Microsoft Domain Video - Create a Server 2016 Replica Domain Controller Domain Naming System (DNS) Video - Installing the DNS Role Using Server Manager Video - Create a secondary or backup DNS server using Server Core Video - Create a DNS reverse lookup zone in Server 2016 Video - Create a new DNS host record Video - Create a new MX record in DNS Dynamic Host Configuration Protocol (DHCP) Video and lab - Install and configure DHCP Using PowerShell Video - Authorize a Windows 2016 DHCP Server Video - Server and Scope options in Windows server 2016 Video - How to Edit the Default Gateway Settings in DHCP Video - How to Edit DNS Server List in DHCP Video - Use Filters in DHCP to Deny Clients DHCP Services Video - Use DHCP User Classes to Assign Alternate Scope Options Video - Edit a DHCP Scope Video - How to backup and restore the DHCP database video - Create predefined options in DHCP Speed Learning Active Directory Administration Video - Create a user in Active Directory Video - Create an administrator user in Server 2016 Video - Create a distribution group in Active Directory Video - Create and use a security group Video - Create an Organizational Unit Video - Unlock a User Account Video - Move an object to a New Organizational Unit in Active Directory Video - Change the domain administrator password Video - Fix Access Denied when deleting Active Directory objects Speed Learning Group Policy Video - Prevent automatic logoff due to inactivity Video - Create and link a Group Policy Object to an OU Video - Edit group policy objects to affect a user Video - Edit a group policy object to affect a computer Video - Backup and restore Group Policy objects Video - Force Screensaver and Timeouts Using Group Policy Video - Change Users Desktop Background Using Group Policy Speed Learning Server 2016 Administration Video - Overview of The New Start Menu for Server 2016 Video - Working with Task View in Server 2016 Video - Enable Remote Desktop Using PowerShell 623 Video - Rearm The 180-Day Evaluation Period for Wndows Server Video - Rearm The 30-Day Evaluation Period for Windows 10 Video - Create a Heads-up Display Using BgInfo Video - Change the date, time and numbers format in Server 2016. Video - Rename Windows Server 2016 Using PowerShell Manage Files and Shares Video and Lab - Setup Work Folders in a Windows Domain Video and Lab - Configure a Distributed File System Using Windows Server Video - Create a Shared Folder on a Windows Server Video - Create a Shared Folder Using Server Manager Speed Learning Managing Printers Video - Add a network printer in Windows server 2016 Video - Install and use the Print Management Role in Windows Server 2016 Video - Deploy printers using Group Policy in Windows Server 2016 Speed Learning Server 2016 Firewall Video - Turn the Firewall on or off in Windows 2016 Server Video - Allow an inbound port through a Windows Firewall Video - Enable PING for Server 2016 and Windows 10 Video - Using Netsh to Manage the Windows Firewall Video - Using Powershell to Gather Firewall Information Disk Management Video and Lab - Adding Additional Hard Disks Using VirtualBox Video - Shrink or Extend a Volume in Windows Server Video - Format a Volume With Refs in Windows Server Video - Format a volume with FAT32 in Windows Server Troubleshooting Video - NSLookup Video and Lab - Troubleshooting Internet Connectivity Overview of Windows Sysinternal Tools Video - Overview of Sysinternal's Process Explorer Order Your Certificate Now Order Your Certificate Now Feedback Feedback Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Windows Server 2016 - Level 1 Hands-on Training Online
Delivered Online On Demand
£25

Learn AutoCAD Programming using VB.NET - Hands On!

4.7(160)

By Janets

Description Register on the Learn AutoCAD Programming using VB.NET - Hands On! today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Learn AutoCAD Programming using VB.NET - Hands On! course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post.  Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.   Course Content Unit 01: Introduction Module 01: Course Outline 00:05:00 Module 02: Introduction 00:01:00 Module 03: Who is this Course for? 00:01:00 Module 04: What will I learn from this Course? 00:01:00 Module 05: What is VB.NET? 00:01:00 Module 06: What is AutoCAD .NET API? 00:01:00 Module 07: What are the advantages of programming in AutoCAD .NET API? 00:01:00 Module 08: Hands-on Projects overview 00:06:00 Unit 02: Exploring AutoCAD .NET API Components Module 01: AutoCAD .NET API Components Overview 00:01:00 Module 02: AutoCAD .NET API Assemblies 00:02:00 Module 03: Understanding AutoCAD Object Hierarchy 00:03:00 Module 04: AutoCAD .NET API Application Object 00:02:00 Module 05: AutoCAD .NET API Document Object 00:02:00 Module 06: AutoCAD .NET API Database Object 00:04:00 Unit 03: Hello AutoCAD from VB.NET Module 01: Section Overview 00:01:00 Module 02: Installing Visual Studio 2019 00:05:00 Module 03: Setting up Visual Studio 2019 Integrated Development Environment (IDE) 00:04:00 Module 04: Creating First VB.NET Plugin (Hello AutoCAD) 00:12:00 Module 05: Different ways to communicate with the User 00:04:00 Module 06: Configuring VS2019 Target Processor 00:10:00 Unit 04: Creating AutoCAD Objects using VB.NET Module 01: Creating AutoCAD Object using VB.NET Overview 00:01:00 Module 02: Creating DrawObjects Project 00:04:00 Module 03: Creating a Line Object using VB.NET 00:15:00 Module 04: Creating a MText Object using VB.NET 00:12:00 Module 05: Creating a Circle Object using VB.NET 00:09:00 Module 06: Creating an Arc Object using VB.NET 00:07:00 Module 07: Creating a Polyline Object using VB.NET 00:08:00 Module 08: Creating Multiple Circles Vertically 00:09:00 Module 09: Creating Multiple Circles Horizontally 00:05:00 Unit 05: Manipulating AutoCAD Objects using VB.NET Module 01: Manipulating AutoCAD Objects Overview 00:01:00 Module 02: Creating the Project ManipulateObjects 00:04:00 Module 03: Creating the SingleCopy Method 00:13:00 Module 04: Creating the MultipleCopy Method 00:11:00 Module 05: Creating the EraseObject Method 00:12:00 Module 06: Creating the MoveObject method 00:07:00 Module 07: Creating the MirrorObject method 00:10:00 Module 08: Creating the RotateObject method 00:07:00 Module 09: Creating the ScaleObject method 00:05:00 Module 10: Creating the OffsetObject method 00:05:00 Unit 06: Exploring AutoCAD Dictionaries using VB.NET Module 01: Exploring AutoCAD Dictionaries - Overview 00:02:00 Module 02: Creating LayersLineTypesAndStyles Project 00:06:00 Module 03: Creating the ListLayers Method 00:11:00 Module 04: Creating the CreateLayer Method 00:10:00 Module 05: Creating the UpdateLayer Method 00:12:00 Module 06: Creating the SetLayerOnOff Method 00:08:00 Module 07: Creating the SetLayerFrozenOrThaw Method 00:04:00 Module 08: Creating the DeleteLayer Method 00:05:00 Module 09: Creating the LockUnlockLayer Method 00:04:00 Module 10: Creating the SetLayerToObject Method 00:08:00 Module 11: Creating the ListLineTypes Method 00:09:00 Module 12: Creating the LoadLineType Method 00:07:00 Module 13: Creating the SetCurrentLineType Method 00:05:00 Module 14: Creating the DeleteLineType Method 00:09:00 Module 15: Creating the SetLineTypeToObject Method 00:05:00 Protected: Module 16: Exploring TextStyles - Overview 00:01:00 Module 17: Creating the ListStyles Method 00:08:00 Module 18: Creating the UpdateCurrentTextStyleFont Method 00:12:00 Module 19: Creating the SetCurrentTextStyle Method 00:08:00 Module 20: Creating the SetTextStyleToObject Method 00:08:00 Unit 07: User Interactions in VB.NET Module 01: User Input Functions - Overview 00:02:00 Module 02: Creating the UserInteractions Project 00:03:00 Module 03: Creating the GetName Method 00:11:00 Module 04: Creating the SetLayer Method using the GetString function 00:12:00 Module 05: Creating the CreateLineUsingGetpoint Method 00:11:00 Module 06: Creating the CalculateDefinedArea Method 00:17:00 Module 07: Creating the DrawObjectsUsingGetKeywords Method 00:14:00 Module 08: Creating the GetDistanceBetweenTwoPoints Method 00:05:00 Module 09: Creating the CountObjects Method 00:15:00 Unit 08: Selection Sets and Filters Module 01: Selection Sets and Filters - Overview 00:13:00 Module 02: Creating the SelectionSets Project 00:05:00 Module 03: Creating the SelectAllAndChangeLayer Method 00:12:00 Module 04: Creating the SelectObjectOnScreen Method 00:08:00 Module 05: Creating the SelectWindowAndChangeColor Method 00:06:00 Module 06: Creating the SelectCrossingAndDelete Method 00:05:00 Module 07: Creating the SelectFenceAndChangeLayer Method 00:06:00 Module 08: Creating the CountPickFirstSelection Method 00:07:00 Module 09: Creating the SelectLines Method 00:13:00 Module 10: Creating the SelectMTexts Method 00:05:00 Module 11: Creating the SelectPlines Method 00:04:00 Module 12: Creating the SelectWalls Method 00:07:00 Module 13: Creating the SelectStairs Method 00:03:00 Module 14: Creating the SelectFrenchDoors Method 00:04:00 Module 15: Creating the SelectBifoldDoors Method 00:03:00 Module 16: Creating CountReceptacles Method 00:04:00 Module 17: Creating the CountLightingFixtures Method 00:10:00 Unit 09: Developing Projects - Hands On Module 01: Developing Projects - Hands on Overview 00:02:00 Module 02: BlocksCounter Plugin Demo 00:03:00 Module 03: Creating the BlocksCounter Project 00:04:00 Module 04: Creating the CountBlocksToTable Method 00:08:00 Module 05: Creating the PromptUser Function 00:08:00 Module 06: Creating the GatherBlocksAndDrawTable Method 00:12:00 Module 07: Continuation of GatherBlocksAndDrawTable Method 00:17:00 Module 08: Running and Debugging the BlocksCounter Project - Part 1 00:15:00 Module 09: Running and Debugging the BlocksCounter Project - Part 2 00:11:00 Module 10: Running and Debugging the BlocksCounter Project - Part 3 00:01:00 Module 11: Creating the ObjectExtractor Plugin Project 00:04:00 Module 12: Creating the ExtractObjects Method 00:07:00 Module 13: Creating the ExtractLine Method 00:16:00 Module 14: Running and Debugging the ExtractLine Method 00:05:00 Module 15: Creating the ExtractCircle Method 00:11:00 Module 16: Creating the ExtractMText Method 00:13:00 Module 17: Creating the ExtractPolyline Method 00:19:00 Module 18: Creating the ExtractBlock Method 00:10:00 Unit 10: Conclusion Module 01: Congratulations and Thank you very much! 00:01:00 Assignment Assignment - Learn AutoCAD Programming using VB.NET - Hands On! 00:00:00

Learn AutoCAD Programming using VB.NET - Hands On!
Delivered Online On Demand12 hours 6 minutes
£25

Document Control: Electronic Document Management System - CPD Certified

5.0(3)

By School Of Health Care

Document Control: Document Control Course Online Would you like your Document Control: Document Control Course talents to be better? If so, you are welcome to enrol in our specially created Document Control Course, which is intended to provide participants an in-depth understanding. This Document Control: Document Control Course will teach you about the basics of document control and the identification of document control. Also, the Document Control course describes how to classify and secure the document control system. Moreover, the Document Control course emphasizes on Document Control lifecycle, legal concepts, Document Control: Document Control Course best practices and the underlying expertise. You will be more productive at preparing the final documentation, management after completing our Document Control training. As a document control expert you can handle teams, engineering and management of document control. Unlock your potential in the Document Control: Document Control Course process! Main Course: Document Control Course Free Courses included with Document Control: Document Control Course Document Control Course Offers free Business Writing. Special Offers of this Document Control: Document Control Course. This Document Control: Document Control Course includes a FREE PDF Certificate. Lifetime access to this Document Control: Document Control Course Instant access to this Document Control: Document Control Course 24/7 Support Available to this Document Control: Document Control Course [ Note: Free PDF certificate as soon as completing the Document Control: Document Control Course] Document Control: Document Control Online Training You will learn about the advantages of document management as well as the document control lifecycle in this Document Control course. The Document Control course also explains how to make a document control system more efficient. Additionally, the Document Control course places a strong emphasis on the underlying expertise, best practices, and legal ideas related to document control. Following your completion of our Document Control programme, you'll be more efficient at work. Who is this course for? Document Control: Document Control Online Training A wide spectrum of people who are keen to advance their knowledge and abilities in Document Control Training are catered to by this Document Control: Document Control Course. Requirements Document Control: Document Control Online Training To enrol in this Document Control: Document Control Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Document Control: Document Control Course. Be energetic and self-motivated to complete our Document Control: Document Control Course. Basic computer Skill is required to complete our Document Control: Document Control Course. If you want to enrol in our Document Control: Document Control Course, you must be at least 15 years old. Career path Document Control: Document Control Online Training

Document Control: Electronic Document Management System - CPD Certified
Delivered Online On Demand1 hour
£12

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

Diploma in Computer Science and Programming at QLS Level 5

4.8(9)

By Skill Up

Level 5 QLS Endorsed Diploma | 150 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

Diploma in Computer Science and Programming at QLS Level 5
Delivered Online On Demand14 days
£100

Understanding Microservices | A Technical Overview (TT7050)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. Introduction to Microservices Understand what microservices are and their role in modern software development. Introduction to Microservices: what they are and why they matter. Monolithic vs Microservices: highlighting the shift and benefits. Key principles and characteristics of microservices. Identifying suitable applications for microservices transformation. Demo: Analyzing a sample application and identifying potential microservices Architecting and Managing Microservices Learn the basic strategies for scaling and managing microservices. Scaling Microservices: from a single service to hundreds. Key components of a microservices architecture. Introduction to resilience patterns: Circuit-Breakers and Bulkheads. Load management and provisioning in a microservices setup. Understanding the role of cloud services in microservices. Optional Demo: Illustrating how a microservice-based application scales in real-time Designing Microservices Learn the key aspects to consider when designing microservices. Defining microservice boundaries: Deciding the scope of a microservice. Communication patterns in microservices. Understanding Microservice endpoints. Exploring data stores and transaction boundaries in microservices. Overcoming challenges in Microservices design. Demo: Designing microservices for a hypothetical business requirement Implementing Microservices in a Business Enterprise Understand the process and considerations for implementing microservices in an enterprise context. Assessing enterprise readiness for microservices. Building the business case for microservices: strategic advantages and potential challenges. Aligning microservices with business capabilities. Organizational changes: Team structures and processes for microservices. Dealing with Legacy Systems: Strategies for microservices integration. Demo: Exploring a case study of successful microservices implementation in a business enterprise The Microservices Ecosystem Understand the key tools and best practices in the Microservices ecosystem. Understanding the typical Microservices Stack. Monitoring and Logging in Microservices. Introduction to Docker: Containerization of Microservices. Deployment strategies in a Microservices setup. Introduction to Orchestration in Microservices Demo: Containerizing and deploying a simple microservice Microservices Deployment Strategies Understand various ways to safely introduce changes in a microservices environment. The concept of Blue-Green Deployment: changing services without downtime. Canary Releases and Feature Toggles: slowly rolling out changes to users. Database changes in a microservices environment: keeping data consistent. Demo: Examining various deployment strategies Microservices Best Practices and DevOps Learn key strategies to ensure a smooth operation of your microservices setup. The DevOps culture in Microservices: collaboration for efficiency. Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. Dealing with data in a distributed setup: managing Data Islands. The importance of Continuous Integration/Continuous Delivery in a microservices setup. Governance: Keeping track of your services and their consumers. Demo: Visualizing a simple continuous delivery pipeline Microservices Patterns and Anti-Patterns Learn about common do's and don'ts when working with microservices. Understanding patterns that help with efficient microservices operation. Recognizing and avoiding anti-patterns that can hinder performance. Dealing with common challenges: dependencies between services, managing service boundaries. Demo: Examples of real-world patterns and anti-patterns Simple Overview of OAuth and OpenID for Microservices Introduction to OAuth and OpenID: What they are and why they matter in Microservices. The role of tokens in OAuth 2.0: How they help in securing communications. A simplified look at OpenID Connect: Linking identities across services. Demo

Understanding Microservices | A Technical Overview  (TT7050)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Data Analysis In Excel

5.0(1)

By Course Gate

Data Analysis In Excel is suitable for anyone aspiring to or already working in this field or simply want to learn deeper into data analysis. You will be able to add this qualification to your CV by downloading your certificate instantly without any cost. To make this course more accessible for you, we have designed it for both part-time and full-time students. This course is packed into the bite-size module for your convenience. You can study at your own pace or become accredited within hours! If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email. This Data Analysis In Excel aims to introduce Data Analysis in Excel 2016. You'll learn the best way to enter and organize data, sort and map data, perform calculations with simple functions, format the appearance of your data and cells, and build charts and PivotTables for data analysis. You will know how to validate data, search and remove invalid data. The course covers Lookup information using VLOOKUP, and INDEX-MATCH, data forecasting and cleansing, providing external and 3D references and inserting sparklings, so that you have a great foundation in the world's most popular spreadsheet programme. Finally, you will learn different features to visualise or analyse your data in the most convenient way, which allows you to take the right business decisions for your company Who is this Course for? Data Analysis In Excel is perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Data Analysis In Excel is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Modifying a Worksheet Insert, Delete, and Adjust Cells, Columns, and Rows 00:10:00 Search for and Replace Data 00:09:00 Use Proofing and Research Tools 00:07:00 Working with Lists Sort Data 00:10:00 Filter Data 00:10:00 Query Data with Database Functions 00:09:00 Outline and Subtotal Data 00:09:00 Analyzing Data Create and Modify Tables 00:15:00 Apply Intermediate Conditional Formatting 00:07:00 Apply Advanced Conditional Formatting 00:05:00 Visualizing Data with Charts Create Charts 00:13:00 Modify and Format Charts 00:12:00 Use Advanced Chart Features 00:12:00 Using PivotTables and PivotCharts Create a PivotTable 00:13:00 Analyze PivotTable Data 00:12:00 Present Data with PivotCharts 00:07:00 Filter Data by Using Timelines and Slicers 00:11:00 Working with Multiple Worksheets and Workbooks Use Links and External References 00:12:00 Use 3-D References 00:06:00 Consolidate Data 00:05:00 Using Lookup Functions and Formula Auditing Use Lookup Functions 00:12:00 Trace Cells 00:09:00 Watch and Evaluate Formulas 00:08:00 Automating Workbook Functionality Apply Data Validation 00:13:00 Search for Invalid Data and Formulas with Errors 00:04:00 Work with Macros 00:18:00 Creating Sparklines and Mapping Data Create Sparklines 00:07:00 MapData 00:07:00 Forecasting Data Determine Potential Outcomes Using Data Tables 00:08:00 Determine Potential Outcomes Using Scenarios 00:09:00 Use the Goal Seek Feature 00:04:00 Forecasting Data Trends 00:05:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Data Analysis In Excel
Delivered Online On Demand4 hours 58 minutes
£11.99

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry