• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4390 Courses in Cardiff delivered Live Online

Network fundamentals for engineers

5.0(3)

By Systems & Network Training

Network fundamentals training course description An intensive hands on IP foundation leading to LINX Accredited Internet Technician stage 1. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT I certification, is available after the course. The exam consists of 40 questions and lasts 1.5 hours. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network fundamentals training course details Who will benefit: Network engineers. Prerequisites: None Duration 5 days Network fundamentals training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.

Network fundamentals for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,297

LINX 1 training course description An intensive hands on IP foundation leading to LINX Accredited Internet Technician stage 1. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT I certification, is available after the course. The exam consists of 40 questions and lasts 1.5 hours. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. LINX 1 training course details Who will benefit: Network engineers. Prerequisites: None. Duration 5 days LINX 1 training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.

LINX 1
Delivered in Internationally or OnlineFlexible Dates
£2,297

TCP/IP foundation for engineers

5.0(3)

By Systems & Network Training

TCP/IP training course description An intensive hands on IP foundation leading to LINX Accredited Internet Technician stage 1. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT I certification, is available after the course. The exam consists of 40 questions and lasts 1.5 hours. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. TCP/IP training course details Who will benefit: Network engineers. Prerequisites: None Duration 5 days TCP/IP training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.

TCP/IP foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,297

SAFe Product Owner / Product Manager: In-House Training

By IIL Europe Ltd

SAFe® Product Owner / Product Manager: In-House Training Develop the skillsets needed to guide the delivery of value in a Lean Enterprise by becoming a SAFe® 5.0 Product Owner / Product Manager (POPM). During this course, attendees gain an in-depth understanding of how to effectively perform their role in the Agile Release Train (ART) as it delivers value through Program Increments. Attendees explore how to apply Lean thinking to decompose Epics into Features and Stories, refine Features and Stories, manage Program and Team backlogs, and plan and execute Iterations and Program Increments. Attendees also discover how the Continuous Delivery Pipeline and DevOps culture contribute to the relentless improvement of the ART. What you will Learn To perform the role of a SAFe® Product Owner / Product Manager, attendees should be able to: Articulate the Product Owner and Product Manager roles Connect SAFe® Lean-Agile principles and values to the PO / PM roles Decompose Epics into Features and decompose Features into Stories Manage Program and Team backlogs Collaborate with Agile teams in estimating and forecasting work Represent customer needs in Program Increment Planning Execute the Program Increment and deliver continuous value Becoming a Product Owner / Product Manager in the SAFe® enterprise Preparing for PI Planning Leading PI Planning Executing Iterations Executing the Program Increment Becoming a Certified SAFe® Product Owner / Product Manager

SAFe Product Owner / Product Manager: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495

Principles of Risk Assessment

5.0(50)

By Pochat Training

QA Level 2 Award In Principles Of Risk Assessment (RQF) Face to Face: One-day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Don't run risks with the safety of your people - it will cost you a lot more when things start to go wrong... Risk Assessments are vital for Health and Safety, and vital for the whole process Course Contents: Main causes of Work-related Fatalities, Injuries and ill health Moral, Legal and Economic Reasons for Preventing Accidents and ill health at Work Key Terms associated with Risk Assessments in Health and Safety at Work:AccidentNear MissAccident TriangleHazardRiskRisk AssessmentSuitable and SufficientCompetence The Role of Risk Assessments in Accident and ill Health Prevention Legal Requirements for Risk Assessments Importance of Personal hygiene Basic Process for Undertaking a Risk Assessment The Five Steps of a Risk Assessment Benefits of this course: In 2020/21, a whopping 1.7 million people suffered from a work-related illness 441,000 of those sustained an injury 142 People, plus 60 members of the public, lost their lives... The estimated cost of injuries and ill health was £15 billion 28.2 million working days, or 108,045 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 2 Award in Principles of Risk Assessment (RQF) course is ideal for all employees, helping them to create a better understanding of health and safety issues and risk assessments Accredited, Ofqual regulated qualification: QA Level 2 Award in Principles of Risk Assessment (RQF) training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Principles of Risk Assessment certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained appropriately.The Ofqual Register number for this course is 603/0857/9

Principles of Risk Assessment
Delivered in Chesterfield or Online + more
£105

SAFe Product Owner / Product Manager: Virtual In-House Training

By IIL Europe Ltd

SAFe® Product Owner / Product Manager: Virtual In-House Training Develop the skillsets needed to guide the delivery of value in a Lean Enterprise by becoming a SAFe® 5.0 Product Owner / Product Manager (POPM). During this course, attendees gain an in-depth understanding of how to effectively perform their role in the Agile Release Train (ART) as it delivers value through Program Increments. Attendees explore how to apply Lean thinking to decompose Epics into Features and Stories, refine Features and Stories, manage Program and Team backlogs, and plan and execute Iterations and Program Increments. Attendees also discover how the Continuous Delivery Pipeline and DevOps culture contribute to the relentless improvement of the ART. What you will Learn To perform the role of a SAFe® Product Owner / Product Manager, attendees should be able to: Articulate the Product Owner and Product Manager roles Connect SAFe® Lean-Agile principles and values to the PO / PM roles Decompose Epics into Features and decompose Features into Stories Manage Program and Team backlogs Collaborate with Agile teams in estimating and forecasting work Represent customer needs in Program Increment Planning Execute the Program Increment and deliver continuous value Becoming a Product Owner / Product Manager in the SAFe® enterprise Preparing for PI Planning Leading PI Planning Executing Iterations Executing the Program Increment Becoming a Certified SAFe® Product Owner / Product Manager

SAFe Product Owner / Product Manager: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,650

Certified TIA-942 Internal Auditor (CTIA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. Fundamental concepts and process of an internal audit Terms and de_nitions Difference between an internal and external auditor Audit principles Auditor competency requirements Managing an audit programme Establishing the audit objectives Establishing the audit programme Planning the audit Planning the schedule Resource planning Tools/equipment required Document requirements - Design documents - Process documents - Declarations Conducting the audit Conducting an opening meeting Conducting the audit Interviews Document review Facility review Typical non-conformities - Architectura - Electrica - Mechanical - Telecommunications Preparing the audit conclusions Conducting the closing meeting Preparing and distributing the audit report Audit report requirements Classification of non-conformities Typical format of an audit report Following up on the audit The CAR ? Corrective Action Report Evaluation of the Corrective Action Report Requesting a formal external auditIssuing a conformity certificate Requirements of the certificate Registration of the certificate Surveillance auditsRecertification auditsExam: Certified TIA-942 Internal Auditor) Actual course outline may vary depending on offering center. Contact your sales representative for more information. Additional course details: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified TIA-942 Internal Auditor (CTIA)
Delivered OnlineFlexible Dates
£1,500

VMware vSphere: Install, Configure, Manage v8.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Create virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource allocation Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability (HA) and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. Course Introduction Introductions and course logistics Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host Recognize ESXi user account best practices Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize vSphere HA design considerations Recognize the use cases for various vSphere HA settings Configure a vSphere HA cluster Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster Describe features of the vCenter Update Planner Run vCenter upgrade prechecks and interoperability reports Recognize features of vSphere Lifecycle Manager Distinguish between managing hosts using baselines and managing hosts using images Describe how to update hosts using baselines Describe ESXi images Validate ESXi host compliance against a cluster image and update ESXi hosts Update ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

VMware vSphere: Install, Configure, Manage v8.0
Delivered OnlineFlexible Dates
£4,250