Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation
Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 5 Days 30 CPD hours This course is intended for Database DesignersSupport EngineerTechnical AdministratorDatabase AdministratorsData Warehouse Administrator Overview Use Oracle Restart to manage components.Upgrade database to Oracle Database 12c.Install Oracle Grid Infrastructure for a Standalone Server.Create a container database.Create an Oracle DatabaseInstall Oracle Database 12c software.Monitor the Database.Manage Database Performance.Implement Database Auditing.Configure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and Tasks.Schedule Jobs to Run Inside or Outside of the Database.Configure Oracle Net Services.Configure your Database For Backup and Recovery Operations.Describe Oracle Database Architecture.Manage the Oracle Database Instance.Manage Oracle Database Storage structures. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c.
Course Duration: Half-day or full-day (can also be delivered as a 3-part virtual workshop series) Target Audience: Professionals in non-technical roles (e.g. executive assistants, HR, marketing, project managers, operations staff, trainers, and admin support) who want to use generative AI to enhance their work—without needing coding skills. Course Objectives By the end of this course, participants will be able to: Understand what generative AI is and how it works in plain language. Identify use cases relevant to their role or industry. Use popular generative AI tools (like ChatGPT, Gemini, and Copilot) confidently. Write effective prompts to get better, more relevant results. Apply AI ethically and responsibly in the workplace. Course Outline Module 1: Demystifying Generative AI What is generative AI? (Plain language explanation) How AI models like ChatGPT, Copilot, and Gemini work Examples of what generative AI can (and can’t) do Myths, risks, and benefits of AI in non-tech roles Module 2: Everyday Use Cases for Professionals Time-saving applications: Drafting emails, reports, meeting summaries Creating checklists, plans, or SOPs Enhancing creativity: Brainstorming ideas for events, campaigns, or training Writing social media posts, newsletters, or job ads Organising information: Summarising documents Structuring spreadsheets or creating templates Supporting communication: Improving tone and clarity Translating or simplifying content Module 3: Prompting Essentials What is a “prompt” and why does it matter? How to write clear, specific, and effective prompts Prompting frameworks (e.g., “Role–Task–Goal” method) Live practice: transforming a vague prompt into a powerful one Troubleshooting: when AI gives poor answers and how to improve them Module 4: Hands-On Exploration Try-it-yourself exercises using ChatGPT or Gemini (guided) Real workplace examples and team challenges Create an AI-generated email, checklist, or idea list Optional: use industry-specific examples (e.g., HR, admin, events, comms) Module 5: Responsible AI Use at Work Understanding AI limitations and biases Protecting privacy and sensitive data When not to use AI Workplace policies and guidelines (customisable for your organisation) Ethical use: attribution, transparency, and human review Module 6: Getting Started in Your Role Tools overview: free vs paid options (ChatGPT, Microsoft Copilot, Gemini) Building your own AI toolkit Tips for staying up to date as tools evolve 30-day challenge: how to build AI into your daily workflow Delivery Style Highly interactive, practical, and low-jargon No coding or tech background required Hands-on demos, guided practice, and scenario-based activities Group discussion and peer learning Course Materials Provided Quick-start guide: Top 10 prompts for non-tech roles AI Prompt Library for your job type Do’s and Don’ts for ethical use of AI at work “AI in Action” workbook with examples and checklists Personal AI Action Plan Optional Add-ons Team-based AI hackathon (mini workplace challenge) Tailored follow-up webinar for Q&A and deeper use cases Co-branded playbook for organisational AI use Integration with digital transformation or innovation initiatives
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 4 Days 24 CPD hours This course is intended for A Dynamics 365 Business Central core Functional Consultant is responsible for implementing core application setup processes for small and medium businesses. Overview Understand use cases for Business Central modules Set up Business Central Configure Financials Configure Sales and Purchasing Configure Operations Understand Integrationa nd Automation scenarios Built and optimized for small and medium businesses, Dynamics 365 Business Central is an application for companies that have outgrown their entry-level business applications. Growing businesses often outgrow their basic accounting software or legacy enterprise resource planning (ERP) systems that are unable to handle increased inventory and transactions, lack integration with other line-of-business systems, and have reporting limitations. Businesses are also challenged with the logistics of providing services that have more scalability, increased mobility, and availability in the cloud. With Business Central, you can manage your financials, automate and secure your supply chain, sell smarter, improve customer service and project performance, and optimize your operations. Introduction to Business Central Modules Introduction to Business Central Technology overview Navigate the user interface Master data for the Sales and Purchase process Application Setup Create and configure a new company Migrate data to Business Central Manage Security Set up core app functionality Set up dimensions Configure Financials Set up Finance Management Set up the Chart of Accounts Set up posting groups General Journals Set up Cash Management Set up Accounts Payables Set up Accounts Receivables Configure Sales and Purchasing Set up Inventory Configure prices and discounts Operations Purchase items Sell items Process financial transactions Inventory costing Integration and Automation Set up and use approvals with workflows Connect Power Apps Connect Power Automate Connect Power BI