Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Software comes in a variety of guises - application software, firmware, middleware, system software. Increasingly, however, it doesn't necessarily present that way, especially as the boundaries between software, data and source code are becoming more and more blurred. And as software becomes more complex and more difficult to disentangle, so it becomes harder to manage and to value. But as it becomes more integral to every aspect of a business, so it is ever more important to keep on top of the technical, legal and commercial issues that arise, issues such as: To address these issues, organisations need a process for evaluating their current situation from all perspectives and for identifying the key actions they need to take to ensure holistic management of their software. This very practical programme will help set your organisation on the right path. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This programme is designed to give you a deeper understanding of: The technical, legal and commercial risks associated with software development, procurement, use and commercial exploitation The most appropriate processes and responsibilities for managing those risks Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 Software business model What is the software business model? What options exist? Has the software business model been thoroughly reviewed to ensure its viability? This means fully understanding the market opportunity, the business environment and customer and end-user expectations. 2 Technology What are the technologies? How has the technology selection been validated considering the competitiveness, structure, and potential for future innovation? 3 UI and UX What is the UI and UX? How to best articulate this? Has the user interface and user experience been studied from both a subjective and objective view to give insight into customer behaviour? 4 Legal framework / commercial aspects Has the necessary legal framework or commercial aspects that may impact upon use or operation of the software been understood and risks identified and mitigated? 5 Software development What is the software development process? Are both the business management and development team's processes resilient in order to improve the company's capability and the maturity of the software? 6 Software quality What is quality? What are the metrics around software quality? What is the maturity level, based around a qualitative and quantitative assessment? 7 Intellectual property associated What IP should be considered when it comes to software? Does the company understand both the intellectual property risks and potential opportunities associated with this software? 8 Security What does software security mean in this context? How is it being addressed? 9 An holistic approach Review of roles and responsibilities to ensure appropriate management and protection
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Architects and operators who build and manage data analytics pipelines Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a batch data analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service. You will learn how Amazon EMR integrates with open-source projects such as Apache Hive, Hue, and HBase, and with AWS services such as AWS Glue and AWS Lake Formation. The course addresses data collection, ingestion, cataloging, storage, and processing components in the context of Spark and Hadoop. You will learn to use EMR Notebooks to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon EMR. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Introduction to Amazon EMR Using Amazon EMR in analytics solutions Amazon EMR cluster architecture Interactive Demo 1: Launching an Amazon EMR cluster Cost management strategies Module 2: Data Analytics Pipeline Using Amazon EMR: Ingestion and Storage Storage optimization with Amazon EMR Data ingestion techniques Module 3: High-Performance Batch Data Analytics Using Apache Spark on Amazon EMR Apache Spark on Amazon EMR use cases Why Apache Spark on Amazon EMR Spark concepts Interactive Demo 2: Connect to an EMR cluster and perform Scala commands using the Spark shell Transformation, processing, and analytics Using notebooks with Amazon EMR Practice Lab 1: Low-latency data analytics using Apache Spark on Amazon EMR Module 4: Processing and Analyzing Batch Data with Amazon EMR and Apache Hive Using Amazon EMR with Hive to process batch data Transformation, processing, and analytics Practice Lab 2: Batch data processing using Amazon EMR with Hive Introduction to Apache HBase on Amazon EMR Module 5: Serverless Data Processing Serverless data processing, transformation, and analytics Using AWS Glue with Amazon EMR workloads Practice Lab 3: Orchestrate data processing in Spark using AWS Step Functions Module 6: Security and Monitoring of Amazon EMR Clusters Securing EMR clusters Interactive Demo 3: Client-side encryption with EMRFS Monitoring and troubleshooting Amazon EMR clusters Demo: Reviewing Apache Spark cluster history Module 7: Designing Batch Data Analytics Solutions Batch data analytics use cases Activity: Designing a batch data analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for beginners and intermediate frontend developers who want to become full-stack developers. You will need some prior working knowledge of JavaScript and MongoDB as we skim over its basics and get straight to work. Overview At the end of this day, students should be able to: Understand the MEAN architecture Create RESTful APIs to complete CRUD tasks Build a blogging application with basic features Describe best practices to secure node applications Implement authentication and authorization Create simple animations using Angular Perform unit testing on Angular applications MongoDB, Express, Angular and Node.js Fundamentals begins by demystifying the MEAN architecture. You will review the features of the JavaScript technologies, frameworks, or libraries that make up a MEAN stack. You will also understand how to develop a RESTful API using Node.js, Express.js, and MongoDB Atlas. This course will enable you to discover how to build a blogging application using the MEAN stack. Next, you will learn about authentication using MEAN, and explore the features of Angular, such as pipes, reactive forms, modules and optimizing apps, animations and unit testing, and much more. By the end of the course, you will have all of the knowledge you need to become a pro at developing efficient web applications using JavaScript technologies. Introduction to the MEAN stack MEAN Architecture Demystification Getting Started with Node Activity 1: Creating an HTTP Server for a Blogging Application Understanding Callbacks, Event loop and EventEmitters in Node Understanding Buffers, Streams and Filesystem in Node Activity 2: Streaming Data to a File Developing RESTful APIs to perform CRUD operations Getting Started with RESTful APIs Getting started with MongoDB Atlas Activity 3: Connecting the Node Application with MongoDB Atlas Getting Started with Express Activity 4: Creating Express API Route and Controller Activity 5: Testing Fully Functional RESTful API Beginning Frontend Development with Angular CLI Getting Started with Angular CLI Using Components, Directives, Services, and Making HTTP Requests in Angular Activity 6: Designing the Frontend and Components for the Blogging Application Activity 7: Writing Services and Making HTTP Request Calls to an API Understanding Angular Forms and Routing Activity 8: Creating a Form Application Using the Reactive/Model-Driven Method Activity 9: Creating and Validating Different Forms Using the Template and Reactive Driven Method Activity 10: Implementing a Router for the Blogging Application Understanding MEAN Stack Security Node Security and Best Practices Node Application Authentication with JSON Web Token (JWT) Activity 11: Securing the RESTful API Node Application Authentication with Passport Activity 12: Creating a Login Page to Allow Authentication with Twitter Using Passport Strategies Angular Declarables, Bootstrapping, and Modularity Using Inbuilt Pipes, Custom Pipes, Custom Directives, and Observables Activity 13: Communicating Between Two Components Using Observable Angular Bootstrapping and Modularity Activity 14: Creating a Lazy Loaded Application Testing and Optimizing Angular Applications Angular Animations and Latest Angular Features Activity 15: Animating the Route Transition Between the Blog Post Page and View Post Page of the Blogging Application Optimizing Angular Applications Testing Angular Applications Activity 16: Performing Unit Testing on the App Root Component and Blog-Post Component Overview on the new features in Angular
Duration 1 Days 6 CPD hours In this hands on workshop for Agile Scrum Masters, Release Train Engineers and anyone serving as Jira Administrators, Jira experts will lead you through advanced configuration and customization settings in Jira, from installation through to customized screens, workflows, filters and reports. Jira Administration Adding and managing Users Administering and managing Groups Global Jira Settings Jira layout and interface customization User authentication and security Jira Customization Customization of screens and fields Customization of workflows Project and Board Administration Configuring and managing Projects Configuring and managing Boards Creating and managing Filters JQL Jira Integration Integrating Jira with Atlassian Tools Retrospectives and Documentation in Confluence Code management with Bitbucket Integration management with Bamboo Building a Dashboard with gadgets Jira Plug-ins and Marketplace
Payroll Accounting Training Fast Track (Level 1-3): This course brings you the skills you need to use this popular payroll program to confidently process any businesses payroll. Being able to use Sage 50 Payroll should lead to greater productivity. But it also helps the business conform to employment legislation and data security requirements. Furthermore, broken down into practical modules this course is a very popular and well-received introduction to moving from manual payroll to computerised payroll. Moreover, it incorporates all the new government requirements for RTI reporting. Finally, Payroll is a vital role within any organisation. A career in payroll means specialising in a niche field with excellent progression opportunities. In this course, you will be learning from Level 1 to Level 3 of Sage Computerised Payroll which could help you to land your dream job in the Payroll sector. As Osborne Training is a Sage (UK) Approved training provider, you could gain the following qualifications provided that you book and register for exams and pass the exams successfully: Sage 50c Computerised Payroll Course (Level 1) Sage 50c Computerised Payroll Course (Level 2) Sage 50c Computerised Payroll Course (Level 3) All exams are conducted online through Sage (UK). Level 1: Introduction to payroll Introduction to Real-Time Information (RTI) Preparing employee records Starters - new employees Calculation of Gross Pay The PAYE and National Insurance systems Creating Payslips and analysis Creating Backups and Restoring data Payment analysis Processing National Insurance contributions Voluntary deductions Processing Leavers Completing the Payroll Procedures Level 2: Introduction to Payroll Introduction to Real Time Information (RTI) Preparing employee records Creating Backup and Restoring Data Starters - new employees Calculation of Gross Pay Deductions - Pension schemes and pension contributions Processing the payroll - introduction to the PAYE system Processing the payroll - income tax National Insurance contributions - Processing in the payroll Voluntary deductions Student Loan repayments Attachment of Earnings Orders & Deductions from Earnings Orders Processing Leavers Introduction to statutory additions and deductions Processing Statutory sick pay (SSP) Processing Statutory Paternity Pay (SPP) Statutory paternity pay and paternity leave Completing the processing of the payroll Creating Payslips and analysis Reports and payments due to HMRC Level 3: Advanced processing of the payroll for employees Preparation and use of period end preparation of internal reports Maintaining accuracy, security and data integrity in performing payroll tasks. Deductions - Pension schemes and pension contributions Processing the payroll -complex income tax issues Payroll Giving Scheme processing Processing Statutory Adoption Pay (SAP) Advanced Income tax implications for company pension schemes Student Loan repayments Processing Holiday Payments Processing Car Benefit on to the Payroll System Attachment of Earnings Orders & Deductions from Earnings Orders Leavers with complex issues Advanced processing of statutory additions and deductions Recovery of statutory additions payments - from HMRC Completing the processing of the payroll Complex Reports and payments due to HMRC Cost Centre Analysis Advanced, routine and complex payroll tasks Calculation of complex gross pay
Network automation course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network automation course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Network automation course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.
WAN training course description A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory What will you learn Describe the seven-layer model and realise how it applies to the real world. Evaluate and describe WAN technologies. Describe the architecture of WANs in the core. Use WANS to interconnect LANS. WAN training course details Who will benefit: Technical staff wishing to find out more about how their WAN works. Prerequisites: Intro to data communications & networking Duration 5 days WAN training course contents Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. Service provider technologies The transport plane, SDH, SONET, DWDM. WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. The Internet VPNs, IPSEC, QOS. What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.