Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for AWS IaaS, AWS PaaS, AWS SQL, AWS Blob Storage, AWS Application Insights, and AWS Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing, storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This course with labs introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup and want to gain experience configuring GCP products immediately. With presentations, demos, and hands-on labs, participants will get details of similarities, differences, and initial how-tos quickly. Introducing Google Cloud Explain the advantages of Google Cloud. Define the components of Google's network infrastructure,including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) Getting Started with Google Cloud Identify the purpose of projects on Google Cloud Platform. Understand how AWS?s resource hierarchy differs from Google Cloud?s. Understand the purpose of and use cases for Identity and Access Management. Understand how AWS IAM differs from Google Cloud IAM. List the methods of interacting with Google Cloud Platform. Launch a solution using Cloud Marketplace. Virtual Machines in the Cloud Identify the purpose and use cases for Google Compute Engine. Understand the basics of networking in Google Cloud Platform. Understand how Amazon VPC differs from Google VPC. Understand the similarities and differences between Amazon EC2 and Google Compute Engine. Understand how typical approaches to load-balancing in Google Cloud differ from those in AWS. Deploy applications using Google Compute Engine. Storage in the Cloud Understand the purpose of and use cases for: Cloud Storage,Cloud SQL, Cloud Bigtable and Cloud Datastore. Understand how Amazon S3 and Amazon Glacier compare to Cloud Storage. Compare Google Cloud?s managed database services with Amazon RDS and Amazon Aurora. Learn how to choose among the various storage options on Google Cloud Platform. Load data from Cloud Storage into BigQuery. Perform a query on the data in BigQuery. Containers in the Cloud Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Understand how Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS) differ from GKE. Provision a Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl Applications in the Cloud Understand the purpose of and use cases for Google App Engine. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand how App Engine differs from Amazon Elastic Beanstalk. Understand the purpose of and use cases for Google Cloud Endpoints. Developing, Deploying and Monitoring in the Cloud Understand options for software developers to host their source code. Understand the purpose of template-based creation and management of resources. Understand how Cloud Deployment Manager differs from AWS CloudFormation. Understand the purpose of integrated monitoring, alerting, and debugging. Understand how Google Monitoring differs from Amazon CloudWatch and AWS CloudTrail. Create a Deployment Manager deployment. Update a Deployment Manager deployment. View the load on a VM instance using Google Monitoring. Big Data and Machine Learning in the Cloud Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Understand how Google Cloud BigQuery differs from AWS Data Lake. Understand how Google Cloud Pub/Sub differs from AWS Event Hubs and Service Bus. Understand how Google Cloud?s machine-learning APIs differ from AWS's. Load data into BigQuery from Cloud Storage. Perform queries using BigQuery to gain insight into data. Summary and Review Review the products that make up Google Cloud and remember how to choose among them Understand next steps for training and certification Understand, at a high level, the process of migrating from AWS to Google Cloud. Additional course details: Nexus Humans Google Cloud Fundamentals for AWS Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Fundamentals for AWS Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for the professional tasked with implementing, designing, architecting, installing, and configuring Symantec Client Management Suite (CMS) to manage the software and hardware in their company. Overview At the completion of the course, you will be able to: Identify the types of information you need to collect to help determine what type of CMS configuration to implement. Install Client Management Suite. Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Create Organizational Views and Groups and assign resources to them. Create and configure policies, tasks, and jobs and assign them to targets. Troubleshoot common problems with installation and managing of Client Management Suite. Creating reports and installing and configuring IT Analytics. This course teaches students theory and concepts, and provides technical know-how on implementing Client Management Suite. Course Introduction Course objectives Course overview Lab environment introduction Understanding the Symantec Management Platform Introducing the Symantec Management Platform Symantec management Platform components used by Client Management Suite Symantec Management Platform concepts How Client Management Suite works Architecture of Client Management Suite Understanding Architecture Hardware Recommendations Installing and configuring Client Management Suite Installing and using the Symantec Installation Manager Installing the Notification Server, suite and solution software The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Configuring the Notification Server after installation Getting to know the ITMS Management views Discovering resources Introducing resource discovery methods Importing resources from Microsoft Active Directory Discovering computers using domain resource discovery Discovering network resources using Network Discovery Creating and Managing Organizational Views and Groups Learning about organizational views and groups Creating custom organizational views and groups Managing organizational views and groups Installing and Configuring the Agents and Plug-ins Managing computers with the Symantec Management Agent Installing the Symantec Management Agent Verifying the Symantec Management Agent installation Configuring the Symantec Management Agent settings Introducing solution plug-ins for the Symantec Management Agent Upgrading Client Management Suite Introducing agent, Notification Server and site server communications Introducing Notification Server event queues Resource Filters Introducing resource filters Managing and working with existing filters Creating and modifying filters Filters and Targets Introducing targets Working with targets in the computer management view Policies Getting to know policies Understanding user-based policies Understanding how the Symantec Management Agent receives policies Configuring automation policies Managing shared schedules Creating and Managing Tasks and Jobs Overview of task management Creating and scheduling tasks and jobs Task management communication and processing Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Reporting Introducing reports Using and creating classic reports Configuring and using IT Analytics Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Cloud-enabled Management (CeM) Introducing Cloud-enabled Management (CeM) Understanding the cloud-enabled agent Preparing the Notification Server and agents for CeM Configuring site management for CeM Installing and Configuring the SMP Internet Gateway and configuring a CeM Settings policy Configuring the SMP Internet Gateway with the SMP IG Manager Configuring the CeM Settings policy Creating a cloud-enabled agent installation package Installing a cloud-enabled agent from a package Replication Understanding replication Setting up and configuring replication Running replication Hierarchy Understanding hierarchy Setting up a Notification Server hierarchy Configuring hierarchy replication Changing the hierarchy topology Migration Migrating Symantec Management Platform Agent registration (trust)Post installation checklist Readiness checklist for CMS Migration Post migration checklist for a CMS Migration Migrating from 6.x to 7.6 Migrating from 7.x to 7.6 Troubleshooting Learning about Symantec Management Platform troubleshooting tools Using NSConfigurator Using Remote Altiris Agent Diagnostics Introducing Notification Server event queues Troubleshooting Cloud-enabled Management (CeM) Backing up the server and database Symantec Management Platform components needed for recovery Backing up the IIS default web site virtual directories Backing up the Configuration Management Database Customizing the Console Customizing the Symantec Management Console Personalizing the Symantec Management Console SQL Basics Learning SQL basics Obtaining Technical Support from Symantec Using self-help resources Obtaining customer support Additional course details: Nexus Humans Symantec Management Suite 7.6 - Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Management Suite 7.6 - Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. Course Introduction Introductions and course logistics Course objectives Overview of Network Transformation Reviews the technologies that enable modern networks Lists the components of modern service provider networks Outlines characteristics of modern service provider networks in meeting customer application needs Service Delivery with VMware Telco Cloud Outlines the components of the VMware Telco Cloud portfolio Reviews the role each VMware Telco Cloud product plays in delivering telco services Specifies the dependencies each product has on underlying technologies Supporting VMware Telco Cloud Service Delivery Reviews the products that implements the virtualization, management, platform, and orchestration layers Outlines the role played by other VMware products such as NSX in delivering cloud services Outline opensource integration options with VMware Telco Cloud products Securing VMware Telco Cloud Reviews security threats that affect telco services Identifies the critical telco assets that are prone to attack Outlines best practice for securing VMware Telco Cloud products and underlying technology Provides overview of appropriate security controls for VMware Telco Cloud products Assessing Service Provision Reviews tools and methodologies used to gather requirements Outlines how to assess cloud-native capabilities Documenting findings Identifying security vulnerabilities with Helm. Reviews VMware?s Customer Engagement process Capturing infrastructure requirements from TCA Designing a VMware Telco Cloud Solution Selecting appropriate deployment topology Pros and cons of design choices How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture Outlines typical scenarios where specific products align with identified requirements Documenting a design Designing for availability Ensuring a design aligns with best practice Specifying monitoring options Implementing VMware Telco Cloud Products Review deployment options for VMware products Integrating new products with existing ones Outline post-installation tasks Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight Ensuring products meet security requirements Configuring monitoring software Outlines the xNF onboarding process in TCA Maintaining Telco Services Outlines typical administrative tasks in ensuring services are maintained Use of native and other VMware performance monitoring tools Reviewing performance data Role of SLAs in service maintenance Reviews scenarios where known behaviors indicate problems Troubleshooting Deployed Telco Services Reviews the troubleshooting tools available Using tools to gather useful data Outlines how event correlation can be used to isolate problems Using a methodology to determine the root cause of a problem Steps to identify and resolve a problem Reviews scenarios where known problems are isolated and resolution steps identified Scaling VMware Telco Cloud Products Assessing if operations are impacted by lack of resources now or will be in the future Reviews performance optimization options Identifies implications for other products if you scale VMware Telco Cloud products Reviews VMware sizing guidelines Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek techniques for working with complex types of data resources. Overview Use Connector stages to read from and write to database tables Handle SQL errors in Connector stages Use Connector stages with multiple input links Use the File Connector stage to access Hadoop HDFS data Optimize jobs that write to database tables Use the Unstructured Data stage to extract data from Excel spreadsheets Use the Data Masking stage to mask sensitive data processed within a DataStage job Use the Hierarchical stage to parse, compose, and transform XML data Use the Schema Library Manager to import and manage XML schemas Use the Data Rules stage to validate fields of data within a DataStage job Create custom data rules for validating data Design a job that processes a star schema data warehouse with Type 1 and Type 2 slowly changing dimensions This course is designed to introduce you to advanced parallel job data processing techniques in DataStage v11.5. In this course you will develop data techniques for processing different types of complex data resources including relational data, unstructured data (Excel spreadsheets), and XML data. In addition, you will learn advanced techniques for processing data, including techniques for masking data and techniques for validating data using data rules. Finally, you will learn techniques for updating data in a star schema data warehouse using the DataStage SCD (Slowly Changing Dimensions) stage. Even if you are not working with all of these specific types of data, you will benefit from this course by learning advanced DataStage job design techniques, techniques that go beyond those utilized in the DataStage Essentials course. Accessing databases Connector stage overview - Use Connector stages to read from and write to relational tables - Working with the Connector stage properties Connector stage functionality - Before / After SQL - Sparse lookups - Optimize insert/update performance Error handling in Connector stages - Reject links - Reject conditions Multiple input links - Designing jobs using Connector stages with multiple input links - Ordering records across multiple input links File Connector stage - Read and write data to Hadoop file systems Demonstration 1: Handling database errors Demonstration 2: Parallel jobs with multiple Connector input links Demonstration 3: Using the File Connector stage to read and write HDFS files Processing unstructured data Using the Unstructured Data stage in DataStage jobs - Extract data from an Excel spreadsheet - Specify a data range for data extraction in an Unstructured Data stage - Specify document properties for data extraction. Demonstration 1: Processing unstructured data Data masking Using the Data Masking stage in DataStage jobs - Data masking techniques - Data masking policies - Applying policies for masquerading context-aware data types - Applying policies for masquerading generic data types - Repeatable replacement - Using reference tables - Creating custom reference tables Demonstration 1: Data masking Using data rules Introduction to data rules - Using the Data Rules Editor - Selecting data rules - Binding data rule variables - Output link constraints - Adding statistics and attributes to the output information Use the Data Rules stage to valid foreign key references in source data Create custom data rules Demonstration 1: Using data rules Processing XML data Introduction to the Hierarchical stage - Hierarchical stage Assembly editor - Use the Schema Library Manager to import and manage XML schemas Composing XML data - Using the HJoin step to create parent-child relationships between input lists - Using the Composer step Writing Hierarchical data to a relational table Using the Regroup step Consuming XML data - Using the XML Parser step - Propagating columns Topic 6: Transforming XML data - Using the Aggregate step - Using the Sort step - Using the Switch step - Using the H-Pivot step Demonstration 1: Importing XML schemas Demonstration 2: Compose hierarchical data Demonstration 3: Consume hierarchical data Demonstration 4: Transform hierarchical data Updating a star schema database Surrogate keys - Design a job that creates and updates a surrogate key source key file from a dimension table Slowly Changing Dimensions (SCD) stage - Star schema databases - SCD stage Fast Path pages - Specifying purpose codes - Dimension update specification - Design a job that processes a star schema database with Type 1 and Type 2 slowly changing dimensions Demonstration 1: Build a parallel job that updates a star schema database with two dimensions Additional course details: Nexus Humans KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In a world focused on digital media, 24-hour news channels and social channels, it’s really important to communicate with your audience – there are lots of opportunities to do this if you are interviewed by journalists. There’s the chance to deliver expert comments or take part in in-depth features or give a quote about your business or organisation. The media wants to stay relevant and engaged with its audience and you can play a part in that and talk to your audience. In our Broadcast Media Training Courses, we will teach you the best ways to share your story, how to answer those difficult questions and present yourself with confidence and style. This means you will capitalise on every opportunity. Our broadcast media and media interview training courses include: Exploiting the opportunity The world of digital media means there are lots of opportunities to appear online, on radio or on TV, as an expert or commentator and gain invaluable exposure for your business and organisation. You may meet journalists at industry events or be contacted for a comment on an issue. You may also need media training because you have to protect your business’ reputation by reacting proactively if you become involved in a news story. Media training will help you handle interviews with journalists, content creators and other media professionals. You need to communicate positively and effectively and make sure your message reaches the audience. It means speaking consistently, and with style and confidence. You’ll also need to know how to handle challenging questions and make sure you positively manage your reputation. Contemporary Media Training Our media training is interactive, engaging and importantly, carried out by experienced journalist trainers. Our team has worked at the highest levels of journalism and broadcasting and will give you an invaluable insight into how to maximise the opportunity of a media appearance. We will take you through the background of what journalists want and need, and give you a clear understanding of how to prepare and deliver your messages and ideas. We will then carry out a number of media style interviews which our technical team will record and playback so you can see and hear yourself. We will then support you with practical, inclusive and useful feedback for you to put into practice for the next interview. We provide copies of all your recordings and useful notes after the training. Locations that suit you We deliver training at our facilities in Birmingham or London or at your location, bringing our technical equipment and cameras with us. You can have a half day training session for up to 4 people or a full day training for a larger group. We also deliver training online for small groups which can be useful when teams are spread around the country. Expert Journalist Trainers We pride ourselves on two things at Coherent Comms – delivering contemporary media training and our supportive inclusive feedback. We know there are lots of media training companies out there but our clients tell us they work with us because we listen. We don’t tell you what training you need or hark back to the old days. We take on board your communication needs and deliver bespoke training. Our associates are working in digital communications, carrying out interviews for news online sites and our contacts are producing digital content for a 21st century audience. We’ll talk to you about TV and radio but we understand the wider media landscape and how to navigate it. And we’re really proud of our feedback – we want to take you from good to great and believe confidence building with tips and ideas that will work for you is the best way to develop your skills. We will help you design the course you want All our media training is bespoke and designed to exactly suit your needs. We have lots of ideas of how it might work but we want to hear from you and what you want! So get in touch with our friendly team by phone on 0754 533 4269 or fill in our contact form and we will get back to you. We’d love to hear how you hope to improve your media and communication skills.
Get the best management assignment help and management course guide online by Uk management experts.