• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1527 Courses in Cardiff delivered Live Online

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Mission Control: Management and Operations 2024

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Administrators or application owners who are responsible for deploying and managing Kubernetes clusters and workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create and manage Kubernetes clusters Control access Create image registry, network, quota, security, custom and mutation policies Connect your on-premises vSphere with Tanzu Supervisor to VMware Tanzu Mission Control Create, manage, and back up VMware Tanzu Kubernetes Grid™ clusters Create and manage Amazon Elastic Kubernetes Service clusters Perform cluster inspections Manage packages in your clusters Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply image registry, network, security, quota, custom, and mutation policies to Kubernetes environments. It focuses on how to deploy, upgrade, back up, and monitor Kubernetes clusters on VMware vSphere© with VMware Tanzu©, and it also covers package management using the VMware Tanzu Mission Control catalog. Course Introduction Introduction and course logistics Course Objectives What Is VMware Tanzu Mission Control Describe VMware Tanzu Mission Control Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu© for Kubernetes Operations Explain how to request access to VMware Tanzu Mission Control Describe VMware Cloud? services Describe the VMware Cloud services catalog Explain how to access VMware Tanzu Mission Control Identify the components of VMware Tanzu Mission Control Explain the resource hierarchy of VMware Tanzu Mission Control Access, Users, and Groups Explain VMware Cloud services and enterprise federation Describe VMware Cloud services roles Explain multifactor authentication Describe the VMware Tanzu Mission Control UI List the components of the VMware Tanzu Mission Control UI Describe the VMware Tanzu CLI Describe the VMware Tanzu Mission Control API Cluster Lifecycle Management Outline the steps for registering a management cluster to VMware Tanzu Mission Control Discuss what a management cluster is Describe provisioners Explain the purpose of a cloud provider account Describe Amazon Elastic Kubernetes Service Describe Azure Kubernetes Service Workload Clusters Describe Tanzu Kubernetes Grid workload clusters Explain how to create a cluster Explain how to configure a cluster Describe Amazon Elastic Kubernetes Service workload clusters Describe Azure Kubernetes Service workload clusters Explain how to attach a Kubernetes cluster Explain how to verify the connections to the cluster Describe cluster health Policy Management Explain how access policies grant users access to different resources Describe the policy model Describe the available policy types Explain how image registry policies restrict from which image registries container images can be pulled Outline how network policies are applied to clusters Discuss how security policies control deployment of pods in a cluster Discuss how quota policies manage resource consumption in your clusters Discuss how custom policies implement specialized policies that govern your Kubernetes clusters Describe mutation policies Explain how Policy Insights reports VMware Tanzu Mission Control policy issues Control Catalog Describe the VMware Tanzu Mission Control catalog Explain how to install packages Describe cert-manager Explain Service Discovery and ExternalDNS Describe Multus CNI and Whereabouts Describe Fluent-Bit Explain Prometheus and Grafana Describe Harbor Describe Flux Describe Helm Describe Git repositories Tanzu Mission Control Day 2 Operations Describe data protection Describe cluster inspections Explain life cycle management Describe VMware Aria Operations? for Applications Discuss VMware Tanzu© Service Mesh? Advanced edition Describe VMware Aria Cost? powered by CloudHealth©

VMware Tanzu Mission Control: Management and Operations 2024
Delivered OnlineFlexible Dates
Price on Enquiry

Complete Fitness Trainer Certification: Beginner To Advanced

By NextGen Learning

Complete Fitness Trainer Certification: Beginner To Advanced Course Overview: The "Complete Fitness Trainer Certification: Beginner To Advanced" is a comprehensive course designed to equip learners with the knowledge and skills needed to excel in the fitness industry. Covering a broad range of topics from basic anatomy to advanced training techniques, this course prepares you for a successful career in fitness training. By completing the course, you will gain expertise in assessing clients, designing personalised fitness plans, and delivering effective exercise programmes. Whether you're a beginner or looking to enhance your skills, this certification is a valuable asset for anyone pursuing a career in fitness. Course Description: This course covers a wide array of topics to ensure learners gain a complete understanding of fitness training. Modules include in-depth lessons on human anatomy, client assessment, resistance training, cardio and endurance techniques, flexibility, and more. Learners will also access detailed exercise instruction videos, which reinforce the concepts taught throughout the course. By the end of the programme, learners will be confident in designing and delivering fitness plans tailored to individual needs, enabling them to support clients in achieving their fitness goals. This certification also highlights the importance of understanding the body’s mechanics to ensure safe and effective exercise. Complete Fitness Trainer Certification: Beginner To Advanced Curriculum: Module 01: Introduction Module 02: Anatomy Module 03: Client Assessment Module 04: Resistance Training Module 05: Exercise Instruction Videos Module 06: Cardio & Endurance Training Module 07: Flexibility (See full curriculum) Who is this course for? Individuals seeking to become certified fitness trainers. Professionals aiming to enhance their skills in fitness and wellness. Beginners with an interest in the fitness industry. Anyone passionate about pursuing a career in health and fitness. Career Path Personal Trainer Fitness Coach Health and Wellness Consultant Group Fitness Instructor Sports Trainer

Complete Fitness Trainer Certification: Beginner To Advanced
Delivered OnlineFlexible Dates
£7.99

Microsoft SharePoint Modern Experience: Advanced Site Owner

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview In this course, you will perform advanced site-building and administration tasks. You will: Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location.Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance.Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration.This course focuses on these advanced site-building and administration tasks. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level

Microsoft SharePoint Modern Experience: Advanced Site Owner
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Solaris 11 System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The course provides an intensive hands-on experience for key system administration tasks with the goal of making the system administrator job-ready. Overview Administer the Oracle Solaris 11 Host on an Existing Network Administer Oracle Solaris Zones Control Access to Systems and Files Install Oracle Solaris 11 Operating System Administer User Accounts Administer System Processes and Schedule System Tasks Manage Data by Using ZFS Manage Boot and Shutdown of a System Administer Services by Using SMF Administer Software Packages by Using IPS and Manage Boot Environments Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS The Oracle Solaris 11 System Administration training covers the full range of introductory system administration tasks on Oracle Solaris 11.3 OS. The topics covered range from installing the operating system on a single system, to monitoring and basic troubleshooting. The Oracle Solaris 11 System Administration course is designed to provide new system administrators, as well as enterprise system administrators who are new to the Oracle Solaris 11 Operating System, with the skills they need to perform their job tasks successfully and efficiently. Installing Oracle Solaris 11 Operating System Introduction to Oracle Solaris 11 OS Planning for Oracle Solaris 11 OS installation Installing Oracle Solaris 11 OS by Using the Live Media Installer Installing Oracle Solaris 11 OS Using the Text Installer Verifying the OS Installation Managing Boot and Shutdown of Systems Analyze the boot design and boot process Boot a SPARC-based system Boot an x86-based system Shut down a system Administering Services by Using SMF Describing SMF and its components Administering SMF Services Administering Software Packages by Using IPS and Managing Boot Environments Describing IPS, its components, and interfaces Configuring an IPS Client to Access the Local IPS Repository Managing Package Publishers Managing Software Packages Managing Signed Packages and Package Properties Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS Managing Data by Using ZFS Introducing ZFS Administering ZFS Storage Pools Administering ZFS File Systems Administering ZFS Properties Administering ZFS Snapshots and Clones Administering the Network Reviewing Networking Fundamentals Administering Datalink Configuration Administering a Network Interface Administering Profile-Based Network Configuration Configuring a Virtual Network Verifying the Network Operations Managing Resources on the Virtual Network Administering Oracle Solaris Zones Introducing Oracle Solaris Zones Configuring an Oracle Solaris Zone Determining an Oracle Solaris Zone Configuration Controlling Access to Systems and Files Controlling Access to Systems Controlling Access to Files Securing Access to Remote Host Administering User Accounts Getting Started with the User Administration Setting Up User Accounts Maintaining User Accounts Configuring User Disk Quotas Managing System Processes and System Tasks Managing System Processes Scheduling System Administration Tasks

Oracle Solaris 11 System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Tuning (TTOR21519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate-level course requires students have incoming experience working with Oracle Database 18 or higher. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore: The Oracle Database Architecture Query Optimizer Tuning Container Databases and Pluggable Databases Oracle 19c Tuning features Evaluating Execution Plans Oracle Tuning Tools Using Automatic Workload Repository Join Types AWR Using Baselines Additional AWR performance tools Optimizer Statistics Monitoring a Service Bind Variables and database parameters Oracle's Real Application Testing (RAT) SQL Tuning Advisor Automatic Sql Tuning Sql Plan Management Shared Pool Tuning Tuning the database buffer cache Tuning the PGA (Program Global Area) Automatic Memory Management (AMM) Tuning Segment Space Utilization (ASSM) Automatic Storage Management Oracle 19C Database Tuning is an intermediate level course for Oracle database experienced attendees that explores core tuning skills such as Database parameters, SQL Tuning Advisor, SQL Access Advisor, Adaptive SQL plans and more. Overview Oracle Database Architecture Instance Definition Define SGA Define Background Processes Datafile Definition Query Optimizer SQL Parsing Optimizing Terms Optimizing Methods Query Plan Generation Query Plan Control Tuning Container Databases and Pluggable Databases Pluggable tuning parameters Define Container tuning structure Using PDB$SEED Create a new PDB Plug and unplug a PDB Oracle 12c Tuning features Identifying and Using Oracle's Heat Map 12c Compression Levels and Types Evaluating Execution Plans Defining SQL execution plans Automatic Workload Repository Reading execution plans Oracle Tuning Tools Monitoring tools overview Enterprise Manager Dynamic Performance Views Automatic Workload Repository Automatic Database Diagnostic Monitor Sql Tuning Advisor SQL Access Advisor Sql Access Advisor DB operation Tuning DB operation Active Reporting Using Automatic Workload Repository Defining AWR AWR Settings Creating AWR Baselines Metrics, Alerts, and Thresholds Defining Metrics Setting Alerts Setting Corrective Actions User Defined Metrics Metric Dynamic Views Join Types Nested Loops Join Sort Merge join Hash Join and Cartesian Join Equijoins and Nonequijoins Outer Joins Semijoins AWR Using Baselines Creating AWR baselines Creating AWR Repeating baselines Moving Window Baseline Additional AWR performance tools Automatic Maintenance Tasks Segment Advisor Statistics Gathering Automatic Tuning Optimizer Automatic Database Diagnostic Monitor Active Session History (ASH) Optimizer Statistics Optimizer Statistics Overview Table and Index Statistics Statistic Preferences Statistics Gathering e) Locking Statistics, Export/Import Statistics Pending and published statistics Optimizer Hints Optimizer Paths Cost Base Optimization Monitoring a Service Overview of what is an Oracle Service Creating an Oracle Service for Single instance and RAC Monitoring a Service Resource Management and a Service Enterprise Manager and a Service Bind Variables and database parameters Bind variable definition Cursor_sharing parameter Adaptive Cursor Sharing Oracle's Real Application Testing (RAT) Sql Performance Analyzer overview Sql Performance Analyzer Options Database Parameter changes Database version changes Creating SQL Tuning Sets Database Replay Overview Database Replay Configuration Database Replay Options SQL Tuning Advisor SQL Tuning Advisor: Overview SQL Tuning Advisor Limited Mode Sql Tuning Advisor Comprehensive mode Sql Tuning Profiles SQL Access Advisor SQL Access Advisor: Overview Sql Access Advisor options SQL Access Advisor and Sql Tuning Sets Sql Access Advisor and AWR Results and Implementation Automatic Sql Tuning Automatic Sql Tuning Maintenance Task Automatic Tuning Optimization implementation(ATO) Automatic Tuning Optimization Results Enable/Disable Automatic Tuning Optimization Sql Plan Management Sql plan Management and baseline overview Enable sql plan management Loading Sql Plan baselines into the SGA Adaptive plan management Shared Pool Tuning Shared pool architecture Shared pool parameters Library Cache Dictionary cache Large pool considerations and contents Tuning the database buffer cache Database buffer cache overview Database buffer cache parameters Oracle and Dirty reads and writes Automatic Shared Memory Management (ASMM) Buffer Cache goals and responsibility Buffer Cache pools Tuning the PGA (Program Global Area) PGA Overview PGA Database Parameters Temporary Segments Temporary Tablespace Sizing the PGA Automatic Memory Management (AMM) Oracle's Automatic Memory Management Overview Database Auto-tuned Parameters Database Non Auto-tuned Parameters Automatic Memory Management Hints and Sizing suggestions AMM versus ASMM Tuning Segment Space Utilization (ASSM) Overview of Automatic Segment Space Management Defining the DB_BLOCK_SIZE Defining DB_nk_CACHE_SIZE parameter The DB_BLOCK_SIZE Parameter Overview of table compression, block chaining, and block migration Automatic Storage Management Overview of ASM Definition of Grid Infrastructure ASM Instance ASM Diskgroups ASM Diskgroup parameters and templates ASMCMD

Oracle 19c Database Tuning (TTOR21519)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network design engineers Network engineers System administrators Overview After taking this course, you should be able to: Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network Design Open Shortest Path First (OSPF) internal routing for the enterprise network Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network Design a network based on customer requirements Design Border Gateway Protocol (BGP) routing for the enterprise network Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families Describe BGP load sharing Design a BGP network based on customer requirements Decide where the L2/L3 boundary will be in your Campus network and make design decisions Describe Layer 2 design considerations for Enterprise Campus networks Design a LAN network based on customer requirements Describe Layer 3 design considerations in an Enterprise Campus network Examine Cisco SD-Access fundamental concepts Describe Cisco SD-Access Fabric Design Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements Design service provider-managed VPNs Design enterprise-managed VPNs Design a resilient WAN Design a resilient WAN network based on customer requirements Examine the Cisco SD-WAN architecture Describe Cisco SD-WAN deployment options Design Cisco SD-WAN redundancy Explain the basic principles of QoS Design Quality of Service (QoS) for the WAN Design QoS for enterprise network based on customer requirements Explain the basic principles of multicast Designing rendezvous point distribution solutions Describe high-level considerations when doing IP addressing design Create an IPv6 addressing plan Plan an IPv6 deployment in an existing enterprise IPv4 network Describe the challenges that you might encounter when transitioning to IPv6 Design an IPv6 addressing plan based on customer requirements Describe Network APIs and protocols Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF) The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco© Enterprise Network Core Technologies (ENCOR) v1.0 course.This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP© Enterprise and Cisco Certified Specialist - Enterprise Design certifications. Course Outline Designing EIGRP Routing Designing OSPF Routing Designing IS-IS Routing Design Case Study Activity: Designing Enterprise Connectivity Designing BGP Routing and Redundancy Understanding BGP Address Families and Attributes Design Case Study Activity: Designing an Enterprise Network with BGP Internet Connectivity Designing the Enterprise Campus LAN Designing Layer 2 Campus Design Case Study Activity: Designing an Enterprise Campus LAN Designing Layer 3 Campus Discovering the Cisco SD-Access Architecture Exploring Cisco SD-Access Fabric Design Exploring Cisco SD-Access Site Design Strategy and Considerations Design Case Study Activity: Designing Cisco SD-Access in the Enterprise Designing Service Provider-Managed VPNs Designing Enterprise-Managed VPNs Designing WAN Resiliency Design Case Study Activity: Designing Resilient Enterprise WAN Examining Cisco SD-WAN Architectures Examining Cisco SD-WAN Deployment Design Considerations Designing Cisco SD-WAN Routing and High Availability Design Case Study Activity: Designing Resilient Enterprise Cisco SD-WAN Understanding QoS Designing LAN and WAN QoS Design Case Study Activity: Designing QoS in an Enterprise Network Exploring Multicast with Protocol-Independent Multicast-Sparse Mode (PIM-SM) Designing Rendezvous Point Distribution Solutions Designing an IPv4 Address Plan Exploring IPv6 Deploying IPv6 Design Case Study Activity: Designing an Enterprise IPv6 Network Introducing Network APIs and Protocols Exploring YANG, NETCONF, RESTCONF, and Model-Driven Telemetry Additional course details: Nexus Humans Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD)
Delivered OnlineFlexible Dates
Price on Enquiry

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW Cisco SD-WAN Overview Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN Advanced Settings Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN High Availability Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN Templates Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates Bridging Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging Routing Protocols Static Routes Dynamic Routing Protocols Multicast Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP Network Optimization Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS Direct Internet Access (DIA) Overview SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring Unified Communications Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN Security Policy Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN Local Policy Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN Central Policy Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN Migration Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration Additional course details: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot
Delivered OnlineFlexible Dates
Price on Enquiry

Basic NetApp Configuration and Administration (BNCA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. Getting Started with Data ONTAP List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems Use the CLI and GUI for administrative purposes Hardware Basics Describe the NetApp storage system hardware platforms and the types of disks that they support Describe the hardware components of NetApp storage controllers Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Creating & Managing Aggregates Describe aggregates and RAID groups Create aggregates in Data ONTAP operating in 7-Mode Create aggregates in the clustered Data ONTAP operating system Manage aggregates Managing NAS Client Access Configure NAS client access in Data ONTAP operating in 7-Mode Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP Create FlexVol volumes and qtrees Managing SAN Client Connections Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Use OnCommand System Manager to create iSCSI-attached LUNs Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs Access and manage a LUN from a Windows host Managing Volumes Explain the relationship between space guarantees, volumes, and aggregates Define thin provisioning and explain how it is used Define deduplication and describe the benefits that it provides Use OnCommand System Manager to set quotas Managing Snapshot Copies Define the function of Snapshot copies Create and delete a Snapshot copy Create Snapshot policies in the clustered Data ONTAP operating system Restore a volume from a Snapshot copy Create FlexClone volume clones that are backed by Snapshot copies Steps to Certification Recall the steps to NetApp Certification

Basic NetApp Configuration and Administration (BNCA)
Delivered OnlineFlexible Dates
Price on Enquiry