• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

534 Courses in Cardiff delivered Live Online

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Deploy and manage Virtual Delivery Agent machines to on-premises resource locations as well as in Microsoft Azure using MCS. Integrate Citrix Cloud and Citrix Virtual Apps and Desktops 2203 LTSR with Microsoft Azure Active Directory. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you will learn how to create a new Citrix DaaS deployment on Citrix Cloud, with a resource location on Microsoft Azure. You will also learn how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and a Microsoft Azure resource location that will host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. Module 1: Introduction to Citrix DaaS New Citrix Workspace Packaging Citrix Virtual Apps and Desktops - On-Premises Site What is Citrix Cloud? Why Citrix DaaS? What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? Citrix Cloud Administration Module 2: Planning - Citrix DaaS Architecture, Security, and Operations Architecture and Deployment Options Citrix DaaS Security Citrix DaaS Operations Module 3: Planning - Citrix Cloud Connectors Cloud Connector Architecture Cloud Connector Services and Communications Overview Cloud Connector Operations in a Resource Location Cloud Connector Resiliency Installing, Updating, and Removing Cloud Connectors Supported Domain Scenarios for Cloud Connectors Securing Cloud Connector Communications Local Host Cache (LHC) Citrix Cloud Connector vs Delivery Controller Operations Module 4: Planning - Citrix DaaS Resource Locations Citrix DaaS Resource Locations Citrix DaaS Hosting Connections Zones Module 5: Active Directory, Authentication, and Authorization Active Directory Design Options Desktops from Non-Domain Joined VDAs Citrix Federated Authentication Service and Identity Provider Services Module 6: Planning - Provisioning VDA Workloads and Delivering Resources Master Images Machine Creation Services (MCS) in Citrix DaaS Citrix Provisioning in Citrix DaaS Machine Catalogs Delivery Groups Citrix Cloud Library Module 7: Planning - Provide Access in Citrix Cloud Selecting Between Citrix digital workspace experience and StoreFront Citrix StoreFront and Citrix digital workspace experience Communications Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway Access Layer Communications User Authentication Module 8: Planning - Citrix DaaS Administration Citrix Cloud Manage and Monitor Delegated Administration Citrix DaaS Remote PowerShell Software Development Kit Manage Multiple Resource Locations Module 9: Planning - Public Cloud Considerations General Public Cloud Considerations Using Autoscale to Power Manage Machines in a Public Cloud Microsoft Azure as a Citrix DaaS Resource Location Amazon Web Services as a Citrix DaaS Resource Location Google Cloud as a Citrix DaaS Resource Location Module 10: Planning - Migrating to Citrix DaaS from Citrix Virtual Apps and Desktops Citrix Cloud Migration Options and Considerations Citrix Automated Configuration Tool Citrix Image Portability Service Module 11: Manage - Operations and Support in Citrix Cloud Citrix Cloud Connector Support Updating and Rolling Back Machine Catalogs VDA Restore Citrix Self-Help Strategy Monitor Your Environment Module 12: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 13: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 14: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 15: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 16: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 17: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 18: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 19: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Additional course details: Nexus Humans CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure
Delivered OnlineFlexible Dates
Price on Enquiry

CCTA Check Point Troubleshooting Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTA Check Point Troubleshooting Administration
Delivered OnlineFlexible Dates
Price on Enquiry

55316 Administering a SQL Database

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows

55316 Administering a SQL Database
Delivered OnlineFlexible Dates
Price on Enquiry

ADVANCED GRAPHIC DESIGN LEVEL 3

By Creative Design School International

ARE YOU READY TO ADVANCE YOUR GRAPHIC DESIGN SKILLS?

ADVANCED GRAPHIC DESIGN LEVEL 3
Delivered OnlineFlexible Dates
£550

Data Centre Foundation Certificate (DCFC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for this course is anyone who wants to acquire foundation level knowledge on data centre infrastructure. This course is ideally suited for data centre new hires, internal data centre support staff, IT support staff who work in the data centre, helpdesk staff, vendors/suppliers who install/maintain data centre equipment, building maintenance staff including data centre cleaners and other supporting functions, and fresh graduates. This course is also well suited for individuals working in data centre business support functions such as sales/pre-sales, HR, Finance and business administration. Overview The DCFC course will prepare participants for entry into the exciting and high-growth data centre industry. It will ensure that participants acquire the required basic knowledge to take on a wide variety of jobs in the data centre industry. It will also provide the required knowledge and skill to further their training into specialised areas on data centre design/build, operations/governance or standards/compliance. The Data Centre Foundation Certificate (DCFC©) is a 2-day course designed to deliver foundation knowledge about data centre facilities infrastructure. It provides participants with global overview and knowledge on data centres which will be of advantage to the participants who are looking at joining the ranks of professionals working in the data centre, ICT, infrastructure or the mechanical and electrical (M&E) design industries. It will also form a solid foundation for participants who wish to pursue his/her studies either academically or to further his/her industry specialisation with professional certification courses on data centre design/build, operations/governance and/or standards/compliance. With the tremendous growth of data and the data centres to support it, the demand for data centre professionals will grow in tandem. Introduction to Data Centres History of data centres Definition of different type data centres Data Centre Standards List of standards Rating definitions Data Centre Facilities Areas Listing of all areas and their functions Topology Designs Definition of Ratings Components of the Power Infrastructure Utility power Transformers Generators Fuel systems ATS UPS systems Batteries Electric panels Cabling/busbar systems Power rails/strips Lights Lights Emergency lights Cooling Infrastructure Chillers DX Systems Evaporators CRAC/CRAU/HVAC Raised floor Non-raised floor Containment ICT/Network Infrastructure Equipment racks Network cabling (fibre, copper) Cable trays and pathways TIA-606 labelling Data Centre Security Perimeter security Physical protection CCTV Access control Security management Fire Suppression Detection systems Suppression systems Prevention systems Fire extinguishers Fire Safety Monitoring and reporting DCIM EMS/BMS

Data Centre Foundation Certificate (DCFC)
Delivered OnlineFlexible Dates
£1,250

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Infrastructure Administration and Troubleshooting

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 system administrators, and integrators responsible for managing and maintaining VMware Horizon Infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Describe the installation, architecture, and requirements of Horizon Connection Server Describe the authentication and certificate options for a VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access and VMware Horizon Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in VMware Horizon Discuss the scalability options available in VMware Horizon Describe the different security options for VMware Horizon environments Discuss the advanced configurations of Horizon Connection Server List the troubleshooting techniques for common Horizon Connection Server issues Interpret the Horizon Connection Server logs Identify Unified Access Gateway configuration and certificate issues List the troubleshooting steps for common Unified Access Gateway common issues Describe Blast configuration verification using logs and settings Describe the Blast optimization recommendations for different use cases Describe VMware Horizon connections and how to troubleshoot related problems Describe VMware Horizon certificates List the troubleshooting steps for common VMware Horizon certificates issues Describe Cloud Pod Architecture troubleshooting scenarios Identify and fix problems in a VMware Horizon environment VMware Horizon 8: Infrastructure Administrator and Troubleshooting is a five-day combination course of VMware Horizon 8: Infrastructure Administration & VMware Horizon 8: Infrastructure Troubleshooting. This training collection gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon© through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Also, this course provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting Horizon Connection Server, Unified Access Gateway, protocols, connections, and certificates. This course provides a challenge lab designed to present participants with infrastructure issues that may arise in actual Horizon environments. The lab objective is to put into practice the contents covered during the training to create a working environment. Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the supported features of Horizon Connection Server Identify the recommended system requirements for Horizon Connection Server Configure the VMware Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD Lightweight Directory Service (LDS) database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the smart card authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Describe the features of the Workspace ONE Access console Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace ONE services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe Blast Describe the Blast display protocol codecs Summarize the Blast codec options List the ideal applications for each Blast codec Describe Blast and PCoIP ADMX GPO common configurations Graphics Cards Describe the 3D rendering options available in Vmware Horizon Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List the Unified Access Gateway firewall rules Describe the situations in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Troubleshooting Horizon Connection Server Identify the general troubleshooting techniques for Horizon Connection Server Explain how to use logs to identify common Horizon Connection Server problems Describe AD LDS replication Discuss common Horizon Connection Server replication issues Explain how to interpret Horizon Connection Server logs Compare successful and unsuccessful logs from common infrastructure administration tasks Troubleshooting Unified Access Gateway Identify common Unified Access Gateway deployment issues Explain how to monitor the health of a Unified Access Gateway deployment Identify and troubleshoot Unified Access Gateway certificate issues Explain how to monitor, test, and troubleshoot network errors using tcpdump and curl Detail the general Unified Access Gateway troubleshooting methods Blast Configuration Discuss Blast codecs and Encoder Switch settings Describe how to verify BLAST configuration using logs and settings Optimizing Blast List general Blast optimization recommendations Summarize Blast tuning recommendations that apply to WAN connections Summarize Blast tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe the recommended tuning options to increase display protocol quality for all use cases and applications Troubleshooting VMware Horizon Connections Explain VMware Horizon connections Describe the role of primary and secondary protocols in VMware Horizon connections Describe HTML client access connections Describe Horizon Connections load balancing Describe timeout settings, supported health monitoring strings, and suitable load balancer persistence values Identify the troubleshooting steps for failing VMware Horizon load balancer connections List the steps for troubleshooting VMware Horizon connections Troubleshooting VMware Horizon Certificates List the functions of VMware Horizon certificates Describe VMware Horizon certificate scenarios Discuss potential challenges related to certificates in VMware Horizon Describe the troubleshooting approach to VMware Horizon certificates issues Cloud Pod Architecture Describe Cloud Pod Architecture troubleshooting scenarios Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Administration and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Administration and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Infrastructure Administration and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

GRAPHIC DESIGN FOR BEGINNERS LEVEL 1

By Creative Design School International

This is a beginners level course and will take you through the basics of Graphic Design. This is a great way to start if you have no prior knowledge of graphic design and want to start at the beginning.

GRAPHIC DESIGN FOR BEGINNERS LEVEL 1
Delivered OnlineFlexible Dates
£550

WA590 IBM WebSphere Application Server V9 Administration

By Nexus Human

Duration 2.5 Days 15 CPD hours This course is intended for This course is designed for administrators who configure and manage web-based applications on WebSphere Application Server. Web administrators, application developers and deployers, security specialists, and application architects can also benefit from this course.Prerequisite(s) Overview After completing this course, you should be able to:Relate WebSphere Application Server to the WebSphere family of productsDescribe the features and standards in WebSphere Application Server V9Describe the use of WebSphere Application Server in cloud, hybrid cloud, and on-premises environmentsDescribe the architectural concepts that are related to WebSphere Application ServerAssemble and install server-side Java enterprise applicationsUse WebSphere administrative tools to configure and manage enterprise applicationsUse wsadmin scriptingConfigure WebSphere Application Server securityView performance information about server and application componentsTroubleshoot problems by using problem determination tools and log files In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 in a single-server environment. Course Outline Course introduction WebSphere product family overview WebSphere Application Server architecture - stand-alone Exercise: Profile creation WebSphere Application Server administrative console Exercise: Exploring the administrative console Introduction to the PlantsByWebSphere application Application assembly Exercise: Assembling an application Application installation Exercise: Installing an application Problem determination Exercise: Problem determination Introduction to wsadmin and scripting Exercise: Using wsadmin WebSphere security Exercise: Configuring WebSphere Application Server security Exercise: Configuring application security Performance monitoring Exercise: Using the performance monitoring tools Course summary Additional course details: Nexus Humans WA590 IBM WebSphere Application Server V9 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WA590 IBM WebSphere Application Server V9 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WA590 IBM WebSphere Application Server V9 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 2 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Enterprise Linux System Admin 2 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry