• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

717 Courses in Cardiff delivered Live Online

55152AC Fundamentals of Active Directory

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55152AC Fundamentals of Active Directory
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting on AWS - Accelerator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS - Accelerator
Delivered OnlineFlexible Dates
Price on Enquiry

DOG BEHAVIOUR

5.0(84)

By Cheshire Dog Services Ltd

DOG BEHAVIOUR At Cheshire Dog Services, emphasis is placed on modification of the dog’s behaviour through non-coercive and non-aversive methods. While basic training is a component of any behaviour modification program, it is likely you require assistance in devising a course of action that will help you and your dog successfully overcome any problems that arise during your dogs’ lifetime. Plenty of the problem behaviours that dogs’ develop can be a result of an owner’s misunderstanding of their dogs’ behaviour and can make matters worse when responding in an inappropriate way. Harsh methods can deteriorate your relationship with your dog and build distrust on both sides so using aggression to cure aggression does not work. Many nuisance behaviours or aggression problems are often very normal dog behaviours, therefore using harsh or aversive tactics to remove these undesirable actions are unwarranted and only delay in “fixing” the problem in the first place. Helping you understand dog psychology can give you the foundation to a happier life together! Glyn has a diploma (merit pass) in Advanced Canine Behaviour from the esteemed British College of Canine Studies. Are you experiencing problems with your dog such as: Jumping up Object guarding or stealing Aggression to other dogs, children & strangers Over guarding of you or your house Fear / nervousness / anxiety Excessive barking Getting into the car Barking at people or cars Behaviour Modification takes into account: Ensuring the Health & physical wellbeing of your dog. (physical health – diet, rest, exercise, medical illness ) & emotional wellbeing. Setting the dog up for Success – Avoiding putting the dog in a situation where he/she is likely to fail. Desensitisation & Counter Conditioning – presenting less threatening versions of the triggering stimulus & pairing it with things the dog enjoys. Positive Reinforcement / Differential reinforcement of Alternative Behaviour – teaching other skills the dog can do instead of the unwanted behaviour. Please contact us with the behaviour problems you are encountering and we’ll review what’s involved to help you. We would normally like to carry out a visit to your home, discuss the issue on full, meet your dog and set out what we need to do to help you. At this stage, we’ll set out costs involved as I’m sure you can understand that some behavioural issues can take longer to resolve than others. We would normally like to carry out at least one follow up visit and will provide you with a written report too. Please contact us for prices (they vary depending on what’s required)

DOG BEHAVIOUR
Delivered OnlineFlexible Dates
Price on Enquiry

CCMS Check Point Certified Multi-Domain Security Management Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX

CCMS Check Point Certified Multi-Domain Security Management Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB. Overview Building Globally Distributed Applications with Cosmos DB Migrate MongoDB Workloads to Cosmos DB Migrate Cassandra DB Workloads to Cosmos DB This course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB. Building Globally Distributed Applications with Cosmos DB Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Migrate MongoDB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Migrate Cassandra DB Workloads to Cosmos DB Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Additional course details: Nexus Humans DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-060T00 Migrate NoSQL workloads to Azure Cosmos DB
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat High Availability Clustering With Exam (RH437)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resiliency though high-availability clustering services and using fault-tolerant shared storage technologies. Overview As a result of attending this course, students should be able to create, manage, and troubleshoot highly available network services and tightly coupled cluster storage for business-critical applications. Students should be able to demonstrate the following skills: Improve application uptime by using high-availability clustering Manage storage in a high-availability environment using iSCSI initiators, HA-LVM or CLVM as appropriate, and GFS2 cluster file systems Implement strategies to identify single points of failure in high-availability clusters, and eliminate them This course will guide you through an intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.This course covers the same material as RH436, but includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436). This course is based on Red Hat Enterprise Linux 7.1. Clusters and storage Get an overview of storage and cluster technologies. Create high-availability clusters Review and create the architecture of Pacemaker-based high-availability clusters. Nodes and quorum Review cluster node membership and how quorum is used to control clusters. Fencing Understand fencing and fencing configuration. Resource groups Create and configure simple resource groups to provide high-availability services to clients. Troubleshoot high-availability clusters Identify and troubleshoot cluster problems. Complex resource groups Control complex resource groups by using constraints. Two-node clusters Identify and work around two-node clusters issues. ISCSI initiators Manage iSCSI initiators for access to shared storage. Multipath Storage Configure redundant storage access. Logical volume manager (LVM) clusters Manage clustered LVM. Global File System 2 Create symmetric shared file systems. Eliminate single points of failure Eliminate single points of failure to increase service availability. Comprehensive review Set up high-availability services and storage.

Red Hat High Availability Clustering With Exam (RH437)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodology Assess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deployment Apply advanced authentication and load balancing principles In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, you will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare you for the Citrix Certified Expert in Networking (CCE-N) exam. Module 1: Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirementrs User Segmentation Application Assessment Capabilities Assessment Module 2: Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Module 3: Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Module 4: Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Module 5: Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Module 6: Advanced Load Distribution and Link Load balancing Advanced Load Balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Module 7: Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new)

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-224: Implement Citrix ADC 13.x with Traffic Management

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little or no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC traffic management. Overview Optimize the Citrix ADC system for traffic handling and management Customize the ADC system for traffic flow and content-specific requirements Employ recommended tools and techniques to troubleshoot common Citrix ADC network and connectivity issues Configure advanced load balancing and GSLB on the Citrix ADC system Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing. At the end of the course, students will be able to configure their ADC environments to address efficient traffic switching and resilience requirements including Content Switching, Traffic Optimization, and Disaster Recovery. Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings App Expert Additional Features Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Content Switching Content Switching Overview Content Switching Configuration Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB Additional course details: Nexus Humans CNS-224: Implement Citrix ADC 13.x with Traffic Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-224: Implement Citrix ADC 13.x with Traffic Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNS-224: Implement Citrix ADC 13.x with Traffic Management
Delivered OnlineFlexible Dates
Price on Enquiry