• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2401 Courses delivered Online

Salesforce Configure and Administer a Salesforce CPQ Solution (CPQ301)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is ideal for experienced Salesforce Administrators, business analysts, and implementation specialists looking to gain a greater technical understanding of Salesforce CPQ Administration. It's also designed for experienced administrators, solution architects, implementation consultants, and developers looking to understand the full capabilities of Salesforce CPQ in order to formulate solutions for their business. This class is also a great foundation builder for anyone looking to earn the Salesforce CPQ Specialist credential. Overview When you complete this course, you'll be able to: Set Up Products, Bundles, and Product Rules Build Price Rules to Automatically Populate Field Values While Quoting or Configuring a Bundle Set Up Appropriate System Discounts and Pricing Methods Configure Dynamic Output Document Generation Manage Subscription Products (Including the Processes for Renewing and/or Amending Them) Formulate Sound Solutions to Common CPQ Business Requirements Make Significant Progress in Preparing for the Salesforce Certified CPQ Specialist Exam Discover how to configure an end-to-end Salesforce CPQ solution with out-of-the-box functionality. In this 5-day class, our CPQ experts will give you an in-depth look at Salesforce CPQ and its applications. You?ll learn how to set up and manage products, configure discount and pricing methods, create and manage subscriptions, and formulate solutions to meet common CPQ business requirements so you can successfully implement a Salesforce CPQ solution for your company. Course Introduction Review Course Objectives Set Learner Expectations Review Housekeeping Rules Explore Additional Course Resources Review Exam Quick Facts Introduction to CPQ Understand the Business Case for CPQ Watch an End-to-End Solution Demo Build a Quote Object Model Foundations Get Familiar with Products, Price Books, and Price Book Entries Review Product Fields Integral to Basic Salesforce CPQ Functionality Product Selection Modify Out-of-the-Box Button Behavior for Product Selection Review Guided Selling Bundle Configuration Define and Build Product Bundles Enforce Business Logic with Product Features Option Selection Guidelines Enforce Business Logic with Option Constraints Product Rules Define Product Rules Enforce Business Logic with Product Rules (Including Validation Rules, Alert Rules, Selection Rules, and Dynamic Bundles) Build Product Rules Using Supporting Objects (Including Error Conditions, Product Actions, Summary Variables, Configuration Rules, and Configuration Attributes) Pricing Methods Discover Pricing Waterfall Default Flows Review List Pricing, Cost Plus Markup, and Block Pricing Use Contracted Pricing for Negotiated Prices Subscription Pricing Configure Subscription and Proration Pricing Methods Understand How Subscription Pricing Methods Affect List and Regular Price Discounting Compare Discounting Strategies Build a Discount Schedule Price Rules Set Values for Quote and Quote Line Fields Declaratively Review CPQ Advanced Quote Calculator Calculation Events and Conditions Understand Price Action Sources (Including Static Values, Summary Variables, Formulas, and Lookup Tables) Create Lookup Queries to Outsource Evaluation to a Lookup Object Advanced Approvals Compare and Contrast the Advanced Approval Package Versus Native Approvals Define Approvers, Approval Chains, Approval Variables, and Approval Rules to Meet Specific Business Requirements Quote Templates Generate Dynamic Output Documents Create Conditional Template Content Localization and Multicurrency Make Accommodations for Localization Define Localization and How It Works in CPQ Orders Review Business Purposes of an Order Define the Data Model for Orders Define Data Requirements to Generate Orders Contracts, Renewals, and Amendments Generate New Contracts to Manage Active Subscriptions Related to an Account Review Amendment and Renewal Processes Review Renewal Pricing Methods Capstone Class Project: Troubleshoot Common Scenarios in Salesforce CPQ Design a Solution

Salesforce Configure and Administer a Salesforce CPQ Solution (CPQ301)
Delivered OnlineFlexible Dates
Price on Enquiry

Preparing for the Professional Data Engineer Examination

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants:Cloud professionals interested in taking the Data Engineer certification exam.Data engineering professionals interested in taking the Data Engineer certification exam. Overview This course teaches participants the following skills: Position the Professional Data Engineer Certification Provide information, tips, and advice on taking the exam Review the sample case studies Review each section of the exam covering highest-level concepts sufficient to build confidence in what is known by the candidate and indicate skill gaps/areas of study if not known by the candidate Connect candidates to appropriate target learning This course will help prospective candidates plan their preparation for the Professional Data Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, quizzes, and discussions, candidates will familiarize themselves with the domain covered by the examination, to help them devise a preparation strategy. Rehearse useful skills including exam question reasoning and case comprehension. Tips and review of topics from the Data Engineering curriculum. Understanding the Professional Data Engineer Certification Position the Professional Data Engineer certification among the offerings Distinguish between Associate and Professional Provide guidance between Professional Data Engineer and Associate Cloud Engineer Describe how the exam is administered and the exam rules Provide general advice about taking the exam Sample Case Studies for the Professional Data Engineer Exam Flowlogistic MJTelco Designing and Building (Review and preparation tips) Designing data processing systems Designing flexible data representations Designing data pipelines Designing data processing infrastructure Build and maintain data structures and databases Building and maintaining flexible data representations Building and maintaining pipelines Building and maintaining processing infrastructure Analyzing and Modeling (Review and preparation tips) Analyze data and enable machine learning Analyzing data Machine learning Machine learning model deployment Model business processes for analysis and optimization Mapping business requirements to data representations Optimizing data representations, data infrastructure performance and cost Reliability, Policy, and Security (Review and preparation tips) Design for reliability Performing quality control Assessing, troubleshooting, and improving data representation and data processing infrastructure Recovering data Visualize data and advocate policy Building (or selecting) data visualization and reporting tools Advocating policies and publishing data and reports Design for security and compliance Designing secure data infrastructure and processes Designing for legal compliance Resources and next steps Resources for learning more about designing data processing systems, data structures, and databases Resources for learning more about data analysis, machine learning, business process analysis, and optimization Resources for learning more about data visualization and policy Resources for learning more about reliability design Resources for learning more about business process analysis and optimization Resources for learning more about reliability, policies, security, and compliance Additional course details: Nexus Humans Preparing for the Professional Data Engineer Examination training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Preparing for the Professional Data Engineer Examination course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Preparing for the Professional Data Engineer Examination
Delivered OnlineFlexible Dates
Price on Enquiry

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment Identify concepts necessary to create CCE system design specifications and deployment plans Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop Discover how to install CCE software Administer CA signed security certificates to support the successful addition of a PCCE site Identify the tasks associated with adding Remote Site functionality to the PCCE environment Discuss integration of the CUIC, LiveData, and Finesse reporting environments Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits Examine concepts necessary to create CCE system design specifications and deployment plans Create a series of routing scripts using PCCE Configure Single sign-on for Unified CCE The Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco© Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2?3 solution support. The focus is on Day 1 support for a new CCE deployment. Planning a Cisco Packaged Contact Center Enterprise Deployment Packaged CCE Component Overview Call Flows Review Staging a Packaged CCE Deployment PCCE Deployment Planning and System Design Specification Software Compatibility and OS Requirements Preparing CCE Software for Installation General Considerations and System Requirements Active Directory Considerations Administering Security Certificates Security Certificate Overview Install and Configure Certificate Authority Introducing the Packaged CCE Integration Wizard PCCE Inventory and Service Accounts Run the PCCE Wizard Adding a Site to Packaged CCE Adding a Site to Packaged CCE PCCE Remote Site Overview Remote Site Security Certificate Considerations Integrating Cisco Unified Intelligence Center, LiveData, and Finesse Compare Real Time vs. Live Data Complete Cisco Unified Intelligence Center Integration Personalizing the Packaged CCE Dial Plan CCE Dial Plan Components Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate Deployment Configuring to Validate Deployment Confirm Configuration Readiness Cisco Unified Communications Manager Administration Scripting for Packaged Contact Center Enterprise Configure Script Editor Use Microapps Configuring Single Sign-On SSO Overview Configure SSO Prerequisites Additional course details: Nexus Humans Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI)
Delivered OnlineFlexible Dates
Price on Enquiry

BIT400 SAP Process Integration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Architects, Developers, Developer Consultants, System Administrators, System Architects, and Technology Consultants. Overview The participants will learn to configure scenariosUnderstand and configure the different options with which a back-end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure). In this course, students gain knowledge in configuring SAP Process Integration and learn how to implement different integration scenarios with SAP and non-SAP applications. SAP Process Integration Architecture Describing SAP Process Integration Architecture Explaining the Functionality and Utilization of SAP Process Integration The System Landscape Directory (SLD) Maintaining Products and Software Components in the System Landscape Directory (SLD) Implementing Technical Systems in the System Landscape Directory Maintaining Business Systems for Use in the Integration Directory Interface Objects in the Enterprise Service Repository (ESR) Listing Options for Navigating the Enterprise Services Repository (ESR) Analyzing Interface Objects in the Enterprise Services Repository (ESR) Maintaining Interface Objects Defining Message Processing Types and Quality of Services Object Mapping in the Enterprise Service Repository (ESR) Creating Message Mapping Objects Mapping Between Service Interfaces Analyzing Asynchronous Integration Scenarios Configuration of Integration Directory Communication Objects Using Configuration Views Creating Communication Channels in the Integration Directory (ID) Configuration of Integration Directory Objects for ABAP Processing Analyzing Objects Used in the Configuration of Integration Engine (IE) Communication Analyzing Routing Objects Used in Integration Engine (IE) Communication Analyzing Multiple Receiver Objects Used in Integration Engine (IE) Communication Configuration of Integration Directory Objects for Java Processing Maintaining Objects for Advanced Adapter Engine (AAE)-Only Processing Maintaining Objects for Advanced Adapter Engine Extended (AEX) Message Processing Creating and Deploying Integration Flows to the Advanced Adapter Engine Extended (AEX) Operations of SAP Process Integration Using the Runtime Workbench Using the Process Integration Monitoring (PIMon) Home Using the SAP NetWeaver Administrator Connectivity Options for SAP Process Integration Analyzing Connectivity Options between Back-End Systems with SAP Process Integration HTTP Connectivity Options Configuring the Simple Object Access Protocol (SOAP) Adapter Using Proxy Technology Checking the HTTP ABAP Adapter Using the HTTP_AAE (Java) Adapter File Adapter Configuration Configuring the Receiver File Adapter Configuring a Sender File Adapter Intermediate Document (IDoc) Connectivity Options Using the Intermediate Document (IDoc) Adapter with the Receiver Intermediate Document Adapter for the ABAP Stack Using the Sender Intermediate Document (IDoc) Adapter Using the Intermediate Document (IDoc) Adapter in the Advanced Adapter Engine (AAE) Configuring a Complete Intermediate Document (IDoc) Scenario Configuration of SAP Business Application Programming Interfaces (BAPIs) Connectivity Configuring the Receiver Remote Function Call (RFC) Adapter Configuring the Sender Remote Function Call (RFC) Scenario Enterprise Services and B2B Connectivity Analyzing Enterprise Services Configuring Business-to-Business (B2B) Connectivity Cross-Component Business Process Management (ccBPM) Integration Processes Analyzing the Runtime of the Cross-Component Business Process Management (ccBPM) Identifying the Steps to Create and Use an Integration Process Additional course details: Nexus Humans BIT400 SAP Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT400 SAP Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BIT400 SAP Process Integration
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center: Troubleshooting and Operations [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Use the native tools available in NSX-T Data Center to identify and troubleshoot the problems related to the NSX-T Data Center environment Use VMware vRealize Log Insight™ and VMware vRealize Network Insight™ to identify and troubleshoot the problems related to the NSX-T Data Center environment Explain the NSX-T Data Center infrastructure components and the communications between them Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX-T Data Center Identify, analyze, and troubleshoot problems related to infrastructure preparation in NSX-T Data Center Identify, analyze, and troubleshoot problems related to logical switching and logical routing in NSX-T Data Center Identify, analyze, and troubleshoot network security problems related to the NSX-T Data Center Distributed and Gateway firewalls Identify, analyze, and troubleshoot problems related to VPN and the VMware NSX Advanced Load Balancer™ Identify the components and packet flows involved in the NSX-T Data Center datapath and troubleshoot related problems This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX-T? Data Center environment. In this course, you are introduced to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your NSX-T Data Center environment.In addition, you are presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. Course Introduction Introduction and course logistics Course objectives NSX-T Data Center Operations and Tools Explain and validate the native troubleshooting tools (dashboards, Traceflow, live traffic analysis, port mirroring) for the NSX-T Data Center environment Configure syslog, IPFIX, and log collections for the NSX-T Data Center environment Integrate NSX-T Data Center with vRealize Log Insight and vRealize Network Insight Validate and review the API methods available to configure the NSX-T Data Center environment Troubleshooting the NSX Management Cluster Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Troubleshooting Infrastructure Preparation Describe the data plane architecture, components, and communication channels Explain and troubleshoot VMware ESXi? transport node preparation issues Explain and troubleshoot KVM transport node preparation issues Explain and troubleshoot VMware NSX© Edge? transport node preparation issue Troubleshooting Logical Switching Describe the architecture of logical switching List the modules and processes involved in configuring logical switching Explain the importance of N-VDS and VDS in transport nodes Describe the procedure to migrate from N-VDS to VDS Review the architecture and workflows involved in attaching workloads to segments Identify and troubleshoot common logical switching issues Troubleshooting Logical Routing Review the architecture of logical routing and NSX Edge nodes Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways Explain the high availability modes and validate logical router placements Identify and troubleshoot common logical routing issues using both BGP and OSPF Troubleshooting Security Review the architecture of the Distributed Firewall Explain the workflows involved in configuring the Distributed Firewall Review the architecture of the Gateway Firewall Explain the workflows involved in configuring the Gateway Firewall Identify and troubleshoot common distributed firewall and Gateway Firewall issues Troubleshooting the NSX Advanced Load Balancer and VPN Services Review the NSX Advanced Load Balancer architecture and components Identify and troubleshoot common NSX Advanced Load Balancer issues Review of IPsec and L2 VPN architecture and components Identify and troubleshoot common IPsec and L2 VPN issues Datapath Walkthrough Verify and validate the path of the packet on the NSX datapath (East-West and South-North) Identify and perform packet captures at various points in the datapath Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath

VMware NSX-T Data Center: Troubleshooting and Operations [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware SD-WAN: Deploy and Manage [V4.x] - On Demand

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, network administrators, and system integrators responsible for designing and implementing networking solutions Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Discuss the SD-WAN architecture and platform deployment model options Identify and describe the SD-WAN solution components Explain the interaction between the SD-WAN Edge, Orchestrator, and Gateway components Describe the SD-WAN Software-Defined Networking (SDN) approach, traffic, and network flows Explore SD-WAN core features and evaluate how these dramatically improve operational automation Use SD-WAN features to perform simple, agile, and secure SD-WAN operations Simplify branch infrastructure by inserting network services on the branch edge, in the cloud, or in the regional and enterprise data centers This course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud environment. In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud. Course Introduction Introductions and course logistics Course objectives Introduction to VMware SD-WAN Solution Revisit the traditional WAN technology, WAN topologies and downsides Explain the challenges solved by Secure Access Service Edge (SASE) and use cases List the components of the VMware SASE? solution Describe the VMware SD-WAN solution and list its capabilities VMware SD-WAN Components and Architecture Understand the architecture of the VMware SD-WAN solution and list all its components Explain the function of VMware SD-WAN Edges, Hub, Gateways, controllers, and Orchestrator Explain how the components of the VMware SD-WAN solution interact with each other Using VMware SD-WAN Orchestrator Describe key attributes of the VMware SD-WAN Orchestrator List primary features of the VMware SD-WAN Orchestrator Navigate the main menus of the VMware SD-WAN Orchestrator portal Deploy and Configure VMware SD-WAN Understand the deployment process of VMware SD-WAN components like VMware SD-WAN Edges, Hubs, Gateways, and more Understand the workflow of the VMware SD-WAN configuration List the optional network services that are supported by VMware and the steps to configure the same Understand the profiles and their application in the VMware SD-WAN infrastructure Describe the VMware SD-WAN Edge activation process Path and Traffic Management List the routing options supported by VMware SD-WAN: Static, BGP, OSPF Understand the Dynamic Multipath Optimization (DMPO) feature and its advantages Explain the Quality of Service and its configuration to manage traffic Securing VMware SD-WAN Environment Explain various options available to secure VMware SD-WAN environments. Understand the firewall capabilities and configuration Monitoring, Maintenance, and Troubleshooting List and understand the various features available to monitor the VMware SD-WAN infrastructure List and understand the various options available to troubleshoot and investigate issues in VMware SD-WAN Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware SD-WAN: Deploy and Manage [V4.x] - On Demand training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware SD-WAN: Deploy and Manage [V4.x] - On Demand course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware SD-WAN: Deploy and Manage [V4.x] - On Demand
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Orchestration and Extensibility [v8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.

VMware vRealize Automation: Orchestration and Extensibility [v8.6]
Delivered OnlineFlexible Dates
Price on Enquiry