Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and VMware NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX-T Data Center requirements Create a VMware NSX Manager⢠cluster design Create a VMware NSX Edge⢠cluster design to support traffic and service requirements in NSX-T Data Center Design logical switching and routing Recognize NSX-T Data Center security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX-T Data Center infrastructure across multiple sites Describe the factors that drive performance in NSX-T Data Center This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T? Data Center environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of NSX-T Data Center offered in release 3.2, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX-T Data Center architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives Design Concepts Identify design terms Describe framework and project methodology Describe VMware Validated Design? Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX-T Data Center architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile, VMware vSphere© Network I/O Control profile, and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe NSX-T Data Center single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX-T Data Center Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX-T Data Center security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX-T Data Center Describe stateful and stateless NSX-T Data Center NAT Identify benefits of NSX-T Data Center DHCP Identify benefits of metadata proxy Describe IPSec VPN and L2 VPN Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Describe a typical design for a KVM compute hypervisor with two pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX-T Data Center multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare Federation disaster recovery designs NSX Optimization Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available N-VDS enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Systems Administrators and Engineers Technical Solutions Architects Systems Integrators Channel Partners Value-Added Resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand the B-Series and C-Series product line similarities and differences Describe the Intersight support for C-Series standalone and UCS managed architectures Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight Administering service profiles, pools, and policies with UCSM and Intersight Understanding RBAC with Active Directory integration Administering backup and restores in UCS Manager Learn and discuss the various management tools for Cisco UCS including Intersight Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight Describe how to get started with Intersight programmability DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management. Module 1: UCS Infrastructure Components with Intersight Cisco UCS Product Line, Use Cases, and Components Introducing Cisco Intersight Describing Cisco UCS C-Series Servers Module 2: Administering Cisco UCS with Intersight Managing Virtual Resources Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Service Profile Templates and Cloning Service Profiles Managing Service Profiles Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation Backing Up & Restoring the Cisco UCS Manager Database Managing and Upgrading Cisco UCS B-Series Firmware Module 3: Administering UCS Management Tools with Intersight Describing Cisco UCS User Interfaces Exploring Intersight User Interfaces Describing Cisco UCS Management Framework & Features Describing Cisco UCS Hyperflex Getting Started with Intersight Programmability Lab Outline: Labs are designed to assure learners a whole practical experience, through the following practical activities: Connecting to the Lab Environment Explore the Cisco UCS GUI and CLI Environment Explore the Cisco Intersight Dashboard and claim devices Create Users, Groups, Roles and Organizations in Intersight Provision Identity and Resource Pools in UCSM Provision Mobile Service Profiles from Updating Templates Backup and Restore Cisco UCS Manager Database Objects Configure Logging in Cisco Intersight Create LAN and SAN Network Policies in Intersight Build a Server Profile and deploy to a UCS blade from Intersight Using Intersight to upgrade Firmware Install an OS from Intersight Using Rest API to Query UCSM Objects in Intersight
Bekah Legg, CEO of Restored, leads this webinar on how to raise our families with a culture of consent in a highly sexualised world.
Developing a network of MHFA Champions is a key step in creating a mentally healthy workplace. The MHFA Champion one-day course will give you all the skills you need to be an MHFA Champion. This one-day course trains you as an MHFA Champion, giving you: An understanding of common mental health issues Knowledge and confidence to advocate for mental health awareness Ability to spot signs of mental ill-health Skills to support positive wellbeing 1 Introduction to MHFA and understanding mental health (3 hours 30 mins) About Mental Health First Aid About mental health and stress in the workplace Stigma and discrimination Depression Anxiety disorders Other mental health issues (eating disorders, self-harm, psychosis) Early warning signs of mental ill-health Alcohol, drugs and mental health 2 MHFA Champion in practice (3 hours 30 mins) Applying the Mental Health First Aid action plan Action 1: Approach the person, assess and assist with any crisis Suicide Action 2: Listen and communicate non-judgementally Action 3: Give support and information Action 4: Encourage the person to get appropriate professional help Action 5: Encourage other supports Recovery Building a mentally healthy workplace Action planning for using MHFA
Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This is a one-day training event to help you: Develop your awareness of mental health issues in the workplace Enable you to act in a timely and constructive way to manage mental health issues that arise in the workplace Enable you to promote and maintain good mental health in your working environment It covers: Mental health statistical overview; most prevalent mental health problems, contributing factors, effects on productivity and the costs of mental ill-health Signs and symptoms of prevalent mental health conditions; 3 key indicators for all mental health problems Stigma; what it is and how it affects people Mental health legal and statistical overview: facts & figures, most prevalent mental health problems, aspects of the law, policy and procedural issues and guidelines for best practice Pro-active and constructive principles and strategies to manage mental health issues, to support colleagues who may be vulnerable to mental ill-health, and promote mental wellbeing This workshop will give you: Awareness of the key indications of mental ill-health Recognition of the prevalence and effects of stigma Knowledge of the wider picture; legal context Greater understanding and confidence to act constructively to support individuals who are vulnerable to mental ill-health The ability to take steps to actively promote mental-well-being in the workplace
Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG
Duration 5 Days 30 CPD hours This course is intended for Deployment engineer Network engineer Sales engineer Overview After taking this course, you should be able to: Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection error The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco© on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.This course offers lessons and hands-on labs to prepare you for the 300-825 Implementing Cisco Collaboration Conferencing (CLCNF) exam. Course outline Describing Cisco Conferencing Architecture Configuring a Single Combined Deployment Installing Cisco Meeting Server Using APIs with Cisco Meeting Server Configuring a Cisco Meeting Server Scalable and Resilient Deployment Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server Configuring Recording and Streaming with Cisco Meeting Server Troubleshooting Cisco Meeting Server Integrating Cisco Meeting Server with Cisco Unified CM Integrating Cisco Meeting Server with Microsoft Skype for Business Installing and Operating Cisco TMS and Cisco TMSXE Installing and Integrating Cisco Meeting Management Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Conferencing v2.0 (CLCNF) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
To increase your awareness and understanding of what safeguarding children means, in order to increase your confidence to enable you to make a positive contribution towards the process.