Firefighting or solving the same problems week after week? Create a problem-solving culture in your business with this proven methodology.
Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course includes professionals who are new to Looker who are interested in leveraging Looker for data analysis, visualization, and reporting. The course is designed for individuals seeking to gain a comprehensive understanding of Looker's functionalities and apply these skills in their organizations to drive data-driven decision-making. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore and gain: Comprehensive understanding of Looker's platform: Gain a solid foundation in Looker's key features, functionality, and interface, enabling you to navigate and utilize the platform effectively for your data analysis and visualization needs. Mastery of LookML and data modeling: Develop proficiency in Looker's unique data modeling language, LookML, to create customized and efficient data models that cater to your organization's specific requirements. Expertise in creating insightful Explores: Learn to build, customize, and save Explores with dimensions, measures, filters, and calculated fields, empowering you to analyze your data and uncover valuable insights. Proficiency in dashboard design and sharing: Acquire the skills to design visually appealing and informative dashboards, share them with different user roles, and schedule exports to keep stakeholders informed and up-to-date. Enhanced content organization with folders and boards: Understand how to effectively use folders and boards to organize, manage, and discover content within Looker, making it easily accessible for you and your team. Optional: Advanced visualization techniques for impactful storytelling: Master advanced visualization techniques, including customizations with HTML, CSS, and JavaScript, and interactive visualizations using Looker's API, to create compelling data stories that resonate with your audience. Discover the power of data analytics and visualization with our hands-on, two-day introductory course Looker Bootcamp: Analyzing and Visualizing Data with Looker. Designed for professionals who want to unlock valuable insights from their data, this immersive training experience will guide you through Looker's cutting-edge features and provide you with the essential skills to create engaging, interactive, and insightful reports and dashboards. Our experienced trainers will take you on a journey from the fundamentals of Looker and its unique data modeling language, LookML, to advanced visualization techniques and content organization strategies, ensuring you leave the course equipped to make data-driven decisions with confidence. Throughout the course, you will have the opportunity to participate in practical exercises and workshops that will help you apply the concepts and techniques learned in real-world scenarios. You will explore the potential of Looker's Explores, dive into LookML's capabilities, and master the art of dashboard design and sharing. Learn how to organize and manage your content with folders and boards and harness the power of advanced visualization techniques to make your data come alive. Getting Started with Looker Overview of Looker and its key features Navigating the Looker interface Looker terminology and basic concepts Connecting to Data Sources Setting up and managing data connections Exploring database schemas Understanding LookML: Looker's data modeling language Creating and Customizing Explores Building and customizing Explores Adding dimensions, measures, and filters Creating calculated fields Saving and organizing Explores Data Visualization Creating visualizations using Looker's visualization library Customizing chart types, colors, and labels Displaying visualizations in dashboards Introduction to Looker's API for custom visualizations Advanced Explores and LookML LookML refresher and best practices Creating derived tables and data transformations Managing access controls and data permissions Organizing and Sharing Content with Folders and Boards Introduction to folders and boards in Looker Creating and managing folders for organizing content Setting up boards for easy content discovery Sharing folders and boards with different user roles and permissions Dashboard Design and Sharing Best practices for dashboard design Adding, arranging, and resizing visualizations Scheduling and exporting dashboard data Advanced Visualization Techniques Customizing visualizations with HTML, CSS, and JavaScript Creating interactive visualizations using Looker's API Integrating Looker visualizations with other tools Hands-on Workshop and Project Participants work on a guided project to apply the skills learned Trainer provides individual support and guidance Project Presentations, Q&A, and Training Wrap-up Additional course details: Nexus Humans Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 201 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: measure hardware resource and network bandwidth, identify and troubleshoot resource problems monitor resource usage to predict future resource needs utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements properly configure a kernel to include or disable specific features of the Linux kernel as necessary manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules query and modify the behaviour of system services at various targets / run levels properly manipulate a Linux system during both the boot process and during recovery mode properly configure and navigate the standard Linux filesystem configure automount filesystems using AutoFS configure and implement software RAID configure kernel options to support various drives create and remove logical volumes, volume groups, and physical volumes use system tools to back up important system data. This course prepares students to take the 201 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Capacity Planning Measure and Troubleshoot Resource Usage Predict Future Resource Needs Linux Kernel Kernel components Compiling a Linux kernel Kernel runtime management and troubleshooting System Startup Customising system startup System recovery Alternate Bootloaders Filesystem and Devices Filesystem and Devices Maintaining a Linux filesystem Creating and configuring filesystem options Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration Troubleshooting network issue System Maintenance Make and install programs from source Backup operations Notify users on system-related issues
Duration 2 Days 12 CPD hours This course is intended for Developers, Data Engineers, Architects, and Administrators Overview Join an engaging hands-on learning environment, where you'll learn: Splunk essentials Indexing in Splunk Splunk architecture and components Query and search your data How to create dashboards and visualizations How to apply alerts This is a hands-on course with engaging instruction, demos, group discussions, labs, and project work. Join an engaging hands-on learning environment, where you?ll learn - Splunk essentials Indexing in Splunk Splunk architecture and components Query and search your data How to create dashboards and visualizations How to apply alerts This is a hands-on course with engaging instruction, demos, group discussions, labs, and project work. Introduction to Splunk What?s Splunk? What?s Splunk? Authentication Methods Access Controls and Users Products, Licensing, and Costs Quick Tour Guide: User Interface Indexes Splunk Data What are Indexes? Search-Head Index Clusters Index Pipeline Events Fields and Field Extraction Forwarders Metrics Removing Data Splunk Architecture Components of Splunk Deployments Deployment Scenarios Search Processing Language What is Search Processing Language (SPL)? Searching Operators Search Commands Search Pipeline Sub-searches Commonly Used Search Commands Drilldowns Lookups Optimize Searches Dashboard and Visualizations Dashboards in Splunk Creating Dashboards Visualization Types Search as Reports Dashboards Drilldown Forms Alerts Creating Alerts Scheduling Alerts Alerts Notifications Scheduled Reports Creating Scheduled Reports Putting the Pieces Together In your final exercise, you?ll configure a typical scenario when using Splunk. You'll install and configure an NGINX, then the Splunk forwarder to collect logs in Splunk. The idea is that you can apply everything you've learned within the Bootcamp: creating searches, visualizations, dashboards, etc.
This very practical two-day workshop analyses the content and implications of key MoD terms and conditions of contract. The programme explains the principles and terminology of the contractual aspects of defence procurement as well as considering a number of relevant policies and initiatives. The course covers key components, constructs and methodologies associated with any commercial venture entered into with the UK MoD. Starting at the MoD organisational level the workshop sets the scene by looking at the acquisition process and organisation, detailing the various roles and responsibilities of MoD personnel. The workshop provides an in-depth examination of MoD DEFCONs and many narrative terms, setting them in the context of the organisation and its structures. The workshop helps participants to gain an understanding of the content and purpose of the range of MoD DEFCONs and narrative conditions commonly used throughout the acquisition lifecycle. It includes a review of Part 2 of the Defence Reform Act 2014 regarding Single Source Pricing, which comes into effect in 2015 and is already starting to be applied to significant contracts. On completion of this programme the participants will understand the terminology associated with the MoD terms and conditions of contract and will have an accurate view of their relevance, usage and their legal basis and how they can affect contractual and commercial decision-making. They will have gained an insight into defence acquisition contracting and they will be more commercially aware. DAY ONE 1 The commercial environment Key roles and responsibilities of the MoD organisations at the heart of the acquisition process 2 Tendering to MoD An appraisal of some of the obligations placed upon contractors when they are submitting a proposal to the MoD pre-contract 3 Standardised contracting MoD have introduced non-negotiable standardised contracts for certain levels of procurement. This section considers their use and relevance to defence contracting 4 Pricing, profit, post-costing and payment The parameters specific to a costing structure and the differences between competitive and non-competitive bidding The role of the QMAC, the profit formula, the requirements for equality of information and post-costing Different types of pricing and issues surrounding payment 5 Defence Reform Act - Single Source Pricing Single Source Pricing under Part 2 of the new Defence Reform Act Changes from the existing position, how contractors are affected and the compliance regime that accompanies the new requirements 6 Delivery and acceptance Specific requirements and the significance and impact of failing to meet them Acceptance plans Non-performance and the remedies that may be applied by the Customer - breach of contract, liquidated damages and force majeure DAY TWO 7 Protection of information and IPR Contractor's and MoD's rights to own and use information How to identify background and foreground intellectual property Technical information and copyright in documentation and software How to protect IPR at the various stages of the bidding and contracting process 8 Defence Transformation and Defence Commercial Directorate Widening and increasing roles and functions of the Defence Commercial Directorate Background to the Defence Reform Act 2014 9 Legal requirements Terms used in MoD contracts to reflect basic legal requirements Records and materials required for MOD contracts and therefore the obligations, responsibilities and liabilities that a company undertakes when it accepts these conditions Overseas activities 10 Subcontracting and flowdown Understanding the constructs required by the MoD for subcontracting Which terms must be flowed down to the subcontractor and which are discretionary 11 Termination Termination of a contract for default Termination for convenience How to optimise the company's position on termination 12 Warranties and liabilities Obligations and liabilities a company might incur and how they might be mitigated MoD policy on indemnities and limits of liability 13 Electronic contracting environment Electronic forms of contracting Progress toward a fully electronic contracting environment
Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario
Duration 3 Days 18 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and datacenter networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Platform layered architecture and deployment procedures Describe the VMware Telco Cloud Platform virtual infrastructure requirements List the use cases of VMware vSphere and VMware vCenter Server Describe the VMware Telco Cloud Platform networking and storage requirements Describe the architecture of VMware Tanzu⢠Standard for Telco Configure management and workload clusters for containers as a service functionality Instantiate network services and network functions Enumerate troubleshooting concepts and Day 2 operations for VMware Telco Cloud Platform This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform? environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process. his three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform⢠environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises. In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for the professional tasked with implementing, designing, architecting, installing, and configuring Symantec Client Management Suite (CMS) to manage the software and hardware in their company. Overview At the completion of the course, you will be able to: Identify the types of information you need to collect to help determine what type of CMS configuration to implement. Install Client Management Suite. Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Create Organizational Views and Groups and assign resources to them. Create and configure policies, tasks, and jobs and assign them to targets. Troubleshoot common problems with installation and managing of Client Management Suite. Creating reports and installing and configuring IT Analytics. This course teaches students theory and concepts, and provides technical know-how on implementing Client Management Suite. Course Introduction Course objectives Course overview Lab environment introduction Understanding the Symantec Management Platform Introducing the Symantec Management Platform Symantec management Platform components used by Client Management Suite Symantec Management Platform concepts How Client Management Suite works Architecture of Client Management Suite Understanding Architecture Hardware Recommendations Installing and configuring Client Management Suite Installing and using the Symantec Installation Manager Installing the Notification Server, suite and solution software The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Configuring the Notification Server after installation Getting to know the ITMS Management views Discovering resources Introducing resource discovery methods Importing resources from Microsoft Active Directory Discovering computers using domain resource discovery Discovering network resources using Network Discovery Creating and Managing Organizational Views and Groups Learning about organizational views and groups Creating custom organizational views and groups Managing organizational views and groups Installing and Configuring the Agents and Plug-ins Managing computers with the Symantec Management Agent Installing the Symantec Management Agent Verifying the Symantec Management Agent installation Configuring the Symantec Management Agent settings Introducing solution plug-ins for the Symantec Management Agent Upgrading Client Management Suite Introducing agent, Notification Server and site server communications Introducing Notification Server event queues Resource Filters Introducing resource filters Managing and working with existing filters Creating and modifying filters Filters and Targets Introducing targets Working with targets in the computer management view Policies Getting to know policies Understanding user-based policies Understanding how the Symantec Management Agent receives policies Configuring automation policies Managing shared schedules Creating and Managing Tasks and Jobs Overview of task management Creating and scheduling tasks and jobs Task management communication and processing Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Reporting Introducing reports Using and creating classic reports Configuring and using IT Analytics Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Cloud-enabled Management (CeM) Introducing Cloud-enabled Management (CeM) Understanding the cloud-enabled agent Preparing the Notification Server and agents for CeM Configuring site management for CeM Installing and Configuring the SMP Internet Gateway and configuring a CeM Settings policy Configuring the SMP Internet Gateway with the SMP IG Manager Configuring the CeM Settings policy Creating a cloud-enabled agent installation package Installing a cloud-enabled agent from a package Replication Understanding replication Setting up and configuring replication Running replication Hierarchy Understanding hierarchy Setting up a Notification Server hierarchy Configuring hierarchy replication Changing the hierarchy topology Migration Migrating Symantec Management Platform Agent registration (trust)Post installation checklist Readiness checklist for CMS Migration Post migration checklist for a CMS Migration Migrating from 6.x to 7.6 Migrating from 7.x to 7.6 Troubleshooting Learning about Symantec Management Platform troubleshooting tools Using NSConfigurator Using Remote Altiris Agent Diagnostics Introducing Notification Server event queues Troubleshooting Cloud-enabled Management (CeM) Backing up the server and database Symantec Management Platform components needed for recovery Backing up the IIS default web site virtual directories Backing up the Configuration Management Database Customizing the Console Customizing the Symantec Management Console Personalizing the Symantec Management Console SQL Basics Learning SQL basics Obtaining Technical Support from Symantec Using self-help resources Obtaining customer support Additional course details: Nexus Humans Symantec Management Suite 7.6 - Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Management Suite 7.6 - Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.