Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication Perform searches across endpoint data to discover suspicious behavior Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR Create custom watchlists to detect suspicious activity in your environment Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Enterprise EDR? product and leverage its capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Search operators Analyzing processes Analyzing binaries Advanced queries Managing Watchlists Subscribing Alerting Custom watchlists Alert Processing Alert creation Analyzing alert data Alert actions Threat Hunting in Enterprise EDR Cognitive Attack Loop Malicious behaviors Response Capabilities Using quarantine Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Enterprise EDR training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Enterprise EDR course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System administrators System engineers Consultants Overview By the end of the course, you should be able to meet the following objectives: Identify the features and benefits of VMware Aria Operations for Logs Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements Describe the VMware Aria Operations for Logs architecture and use cases Deploy and configure a VMware Aria Operations for Logs cluster Use the Explore Logs page to get a deep understanding of log data Create and manage queries Manage VMware Aria Operations for Logs agents and agent Groups Create custom dashboards Explain how to use the VMware Aria Operations for Logs widgets Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions Discuss VMware Aria Operations for Logs (SaaS) This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations? for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Logs Describe the VMware Aria cloud management platform Describe the VMware Aria? use cases Describe the key capabilities of VMware Aria Operations for Logs Describe the requirements for a log analytics solution Explain the importance of efficient log management Navigate the VMware Aria Operations for Logs UI Describe the various stages of log processing VMware Aria Operations for Logs Architecture and Deployment Identify the minimum requirements for deploying VMware Aria Operations for Logs Explain how to use the VMware Aria Operations for Logs sizing calculator Describe VMware Aria Operations for Logs compatibility with other VMware products Describe the VMware Aria Operations for Logs architecture Explain how to install the VMware Aria Operations for Logs virtual appliance Analyzing Logs Describe the primary functions of the VMware Aria Operations for Logs UI Describe log events Use Explore Logs for understanding and analyzing the log data VMware Using Dashboards Alerts and Reports Create VMware Aria Operations for Logs custom dashboards Describe how to use the VMware Aria Operations for Logs widgets Configure alerts Explain how to view and manage reports Administering VMware Aria Operations for Logs Describe user access control in VMware Aria Operations for Logs Describe user management Configure VMware Aria Operations for Logs settings Managing Data Sources and Content packs Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Install and manage content packs Manage certificates Install and manage agents for VMware Aria Operations for Logs Describe the VMware Aria Operations for Logs Importer VMware Aria Operations for Logs Integrations Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of integrating VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of using the vSAN content pack Explain how to configure the NSX content pack VMware Aria Operations for Logs (SaaS) Explain the VMware Aria Operations for Logs (SaaS) architecture Describe the ingestion options for Aria Operations for Logs (SaaS) Discuss integration with on-premises Aria Operations for Logs
Duration 3 Days 18 CPD hours This course is intended for Participants are any IT specialist eager to become an industry recognized expert on Veeam software solutions:System Engineer / Administrator Backup / Virtualization Administrators Pre-Sales / Post-Sales / Solution Architects / Consultants Overview This certification is an excellent investment for an IT professional looking to increase productivity, reduce operating costs, increase potential for personal career advancement and gain recognition from the employer and customers. By completing the Veeam Certified Engineer (VMCE) course you should be able to:Get more functionality out of Veeam solutionsIdentify and resolve issues more efficientlyGain a distinction from your peers The Veeam Certified Engineer (VMCE) course is a 3 day technical deep-dive focused on teaching consultants and engineers to architect, implement, optimize and troubleshoot the Veeam software solution. Introduction Introduction Overview of Veeam products Hypervisor Support Veeam Backup & Replication key features Veeam One key features Veeam Management Pack vCloud Director Support Key concepts Backup Methods Scheduling Changed Block Tracking (CBT) Compression and Deduplication Retention Policy Veeam ONE features and functionality Auto Discovery of Backup and Virtual Infrastructure Business Categorization Pre-Defined Alerting Unattended monitoring Reporting and dashboards Agentless data gathering Hyper-V specific features Veeam One Deployment Veeam One assessment Tool Deployment Solution Architecture Deployment Scenarios Prerequisites Upgrading Veeam Backup & Replication Initial Configuration Adding Servers Adding a VMware Backup Proxy Adding a Hyper-V Offhost Backup Proxy Adding Backup Repositories Performing Configuration Backup and Restore Getting to Know User Interface Performing Backup Creating Backup Jobs Creating VM Copy Jobs Instant VM Recovery Replication (Replication Job, Failover, Failback) Insight into Replication Insight into Failover Insight into Failback SureBackup, SureReplica SureBackup Recovery Verification SureReplica Restore your VMs and Objects Data Recovery Restoring Microsoft Exchange and SharePoint objects Working with Veeam Backup & Replication Utilities 3-2-1 rule (Backup to tape, WAN, Backup Copy) Wan Accelerator Offsite Backup Copy Job Delegate file and VM restores with Veeam Backup Enterprise Manager Veeam Backup Enterprise Manager RESTful API HP StoreVirtual VSA Product Editions Product Editions Comparison Full and Free Troubleshooting How to review and analyze the issue Search for additional information Veeam Support Additional course details: Nexus Humans Veeam Certified Engineer (VMCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Certified Engineer (VMCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level Java programming course, designed for experienced developers who wish to get up and running with Java, or who need to reinforce sound Java coding practices, immediately. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand not only the fundamentals of the Java language, but also its importance, uses, strengths and weaknesses Understand the basics of the Java language and how it relates to OO programming and the Object Model Learn to use Java exception handling features Work with the Modular system (Project Jigsaw) Understand and use classes, inheritance and polymorphism Understand and use collections, generics, autoboxing, and enumerations Process large amount of data using Lambda expressions and the Stream API Abstract, static and private methods in interfaces Take advantage of the Java tooling that is available with the programming environment being used in the class Specific Java 11 features covered: Using the Local Variable Type in Lambda expressions; Updates made to the String AP Time Permitting: Quick look ahead - Java 12, Java 13, Java 14 and Beyond If you're an experienced OO developer (coming from a C# or C++ background, etc.) who needs to transition to programming in Java, this fast-paced, hands-on course will get you there quickly. Fast Track to Java Programming for OO Experienced Developers is a four-day, lab-intensive class where you'll quickly be immersed in working with the latest Java 11 programming techniques, using best practices for writing solid, robust (and well-written!) modern object-oriented applications. In addition to learning excellent, current coding skills in Java, you'll explore the new improved features for better performance and new capabilities for addressing rapid application development that Java 11 brings to the table. This course includes several key aspects that were introduced in Java 9, Java 10, and Java 11 including the Java Modular System, Local Variable Type Inference, and several API updates. This course also includes a Quick Look at what?s next in Java ? Java 12, Java 13, Java 14 and beyond. The Java Platform Java Platforms Lifecycle of a Java Program Responsibilities of JVM Documentation and Code Reuse Using the JDK Setting Up Environment Locating Class Files Compiling Package Classes Source and Class Files Java Applications The Eclipse Paradigm Workbench and Workspace Views Editors Perspectives Projects Writing a Simple Class Classes in Java Class Modifiers and Types Class Instance Variables Primitives vs. Object References Creating Objects Adding Methods to the Class Passing Parameters into Methods Returning a Value from a Method Overloaded Methods Constructors Optimizing Constructor Usage Language Statements Operators Comparison and Logical Operators Looping Continue and Break Statements The switch Statement The for-each() Loop Using Strings Create an instance of the String class Test if two strings are equal Get the length of a string Parse a string for its token components Perform a case-insensitive equality test Build up a string using StringBuffer Contrast String, StringBuffer, and StringBuilder Specializing in a Subclass Extending a Class Casting The Object Class Default Constructor Implicit Constructor Chaining Fields and Variables Instance vs. Local Variables: Usage Differences Data Types Default Values Block Scoping Rules Final and Static Fields Static Methods Using Arrays Arrays Accessing the Array Multidimensional Arrays Copying Arrays Variable Arguments Local-Variable Type Inference Type inference Infering Types of Local Variables The var Reserved Type name Benefits of Using var Backward Compatibility Java Packages and Visibility Class Location of Packages The Package Keyword Importing Classes Executing Programs Visibility in the Modular System Java Naming Conventions Inheritance and Polymorphism Polymorphism: The Subclasses Upcasting vs. Downcasting Calling Superclass Methods from Subclass The final Keyword Interfaces and Abstract Classes Separating Capability from Implementation Abstract Classes Implementing an Interface Abstract Classes vs. Interfaces Introduction to Exception Handling Exception Architecture Throwing Exceptions Checked vs. Unchecked Exceptions Exceptions Handling Multiple Exceptions Automatic Closure of Resources Creating Your Own Exceptions Utility Classes Wrapper Classes Autoboxing/Unboxing Enumeration Syntax Using Static imports Introduction to Generics Generics and Subtyping Bounded Wildcards Generic Methods Legacy Calls to Generics When Generics Should Be Used Lambda Expressions and Functional Interface Lambda Expression Syntax Functional Interfaces Type Inference in Java 8 Method references Collections Characterizing Collections Collection Interface Hierarchy The Set, List and Queue Interfaces Map Interfaces Using Collections Collection Sorting Comparators Using the Right Collection Lambda expressions in Collections Streams Processing Collections of data The Stream interface Reduction and Parallelism Filtering collection data Sorting Collection data Map collection data Find elements in Stream Numeric Streams Create infinite Streams Sources for using Streams Collectors Creating Collections from a Stream Group elements in the Stream Multi-level grouping of elements Partitioning Streams Introduction to the Module System Introduce Project Jigsaw Classpath and Encapsulation The JDK internal APIs Java 9 Platform modules Defining application modules Define module dependencies Implicit dependencies Implied Readability Exporting packages Java Date/Time The Date and Calendar classes Introduce the new Date/Time API LocalDate, LocalDateTime, etc. Formatting Dates Working with time zones Manipulate date/time values Java 12 and beyond Provide an overview of changes since Java 11 Introduce Preview Features Records (Java 14) Switch Expressions (Java 12, Java 13, Java 14) Text Blocks (Java 13, Java 14) Helpful NullPointerExceptions (Java 14) Pattern Matching for instanceof (Java 14) Additional course details: Nexus Humans Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Fast Track to Core Java Programming for Object Oriented Developers (TT2104-J11) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for solution architects, developers, business analysts, system administrators, or anyone who works as a solution builder within their company. Overview Build and deploy a solution Create properties and document classes Create roles and in-baskets Create a case type and tasks Create a workflow Use preconditions and sets Automate case packaging Add case stages Apply solution design principles In this course you will create basic case management solutions with IBM Case Manager Builder and Process Designer. Using an iterative solution development process, you will create, deploy, test, and revise your solutions, adding complexity and functionality to your solutions as you gain skills. You will create properties and document classes, configure roles and in-baskets, and define case stages. You will work with case types, tasks, and workflows. This course includes some guidelines on solution design principles. After completing this course, you can build on these skills by taking more advanced or specialized courses in security, user-interface customization, and solution deployment. Build and Deploy a Solution Build a solution Deploy a solution Test a solution Manage roles Redeploy a solution Create Properties and Document Classes Create case properties Create task properties Create a business object Create document classes Create Roles and In-Baskets Create roles Create in-baskets Create Tasks Create a to-do task Create a container task Add the to-do list widget to the Case Details pag Create a Step Map Open a task in Step Designer Create a step map Add a workgroup to a step map Add an attachment to a step map Use Preconditions and Sets Organize tasks with preconditions Organize tasks with inclusive sets Organize tasks with exclusive sets Automate Case Packaging Open a task in Process Designer Add a component step to a task Use a component step to package a case Add Case Stages Add case stages to a solution Use a system step to perform a case stage operation Use a case stage as a task precondition Solution Design Principles Describe solution design principles
Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Develop for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7.1x in an on-premises environment. Potential students include administrators, engineers, and architects designing or deploying Citrix Virtual Apps and Desktops workloads on Microsoft Azure. Overview Prepare the Azure environment for secure integration with Citrix Virtual Apps and Desktops Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services Integrate Citrix Cloud and Citrix Virtual Apps and Desktops with Microsoft Azure Active Directory Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azur Students learn to deploy and manage the Citrix Virtual Apps and Desktops apps and desktops in Microsoft Azure. Students gain the skills to plan the machine catalog and virtual machine design based in Microsoft?s public cloud and get hands-on practice deploying those machines using Machine Creation Services. Students will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, students will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix Virtual Apps and Desktops sites. Citrix Virtual Apps and Desktops on Azure Overview Defining IAAS Citrix Virtual Apps and Desktops Azure Deployment Models Azure Fundamentals Review Azure Management Azure Locations Citrix Virtual Apps and Desktops Integration with Azure Active Directory Active Directory Basics Active Directory Usage Connecting On-premises Active Directory to Azure Azure Role Based Access Control Connecting to Microsoft Azure Azure Connectivity Cloud Connectors in Azure Creating Citrix Virtual Apps and Desktops Host Connections to Azure Deploying Apps and Desktops using Machine Creation Services Master Image Preparation Machine Creation Services in Azure Considerations for Deploying onto Azure Providing Access to End Users StoreFront Locations Citrix ADC Locations Multiple Citrix Virtual Apps and Desktops Zones in Azure Regions Maintaining Infrastructure and VDAs in Microsoft Azure Maintaining Infrastructure Maintaining Resources Power Management Plan for a Successful POC Planning your next steps
Duration 2 Days 12 CPD hours Overview Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment's app and desktop workloads. You will learn how to plan, build, rollout, and manage on-premises WEM or WEM service and how to integrate it into Citrix Virtual Apps and Desktops or Citrix DaaS. You will leave this course with a good understanding of how to manage additional solutions and features in your Citrix Virtual Apps and Desktop or Citrix DaaS site Module 1: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 2: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 3: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 4: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 5: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 6: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 7: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 8: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 9: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 10: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 11: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 12: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-220 Citrix Workspace Environment Management Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-220 Citrix Workspace Environment Management Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.