Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority
Duration 5 Days 30 CPD hours This course is intended for Implementer Overview Enrolling in this course will help you better understand and leverage PeopleSoft Payroll for North America (USA) payroll requirements and processes. This knowledge will help you create, adjust and troubleshoot your organization's employee payroll. Learn Off-Cycle Payroll Events In addition to typical on-cycle payroll processing, Payroll for North America provides functionality for a variety of off-cycle payroll events and other payroll requirements. This course will illustrate how to reverse a paycheck, record a manual check, produce online checks and final checks and create a gross up check. In addition, you'll also learn the necessary steps to set up and process mid-period job changes and multiple jobs. Finally, you'll set up and processes benefit deductions and garnishments. This PeopleSoft Payroll - US Rel 9.2 training teaches you how to set up and maintain employee tax data, additional pay, general deductions and direct deposits. Expert Oracle University instructors will show you how to use this solution to calculate payroll, review calculation results, identify and correct errors, confirm payroll and more. Setting Up PeopleSoft HRMS Tables for Payroll Processing Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc Setting Up Payroll Tables Identifying Payroll Setup Tables Setting Up Source Bank Accounts Creating Special Accumulators Setting Up Earnings Codes Setting Up Earnings Programs Describing Shift Pay Setup Creating a Pay Group Creating a Rate Code Setting Up U.S. Payroll Tax Tables Identifying Tax Table Maintenance Responsibility Describing PeopleSoft-Maintained Tax Tables Setting Up Customer-Maintained Tax Tables Setting Up Employee Data Identifying Sources of Employee Data Setting Up an Employee Instance Entering and Viewing Employee Job Data Identifying Employee Pay Data Updating Employee Tax Data Assigning Additional Pay to Employees Assigning General Deductions to Employees Updating P Creating and Updating Paysheets Describing Paysheets in Payroll for North America Describing Balance ID Creation Creating Pay Calendars Setting Up Pay Run IDs Creating Paysheets Viewing and Updating Paysheets and Paylines Describing the Payroll Unsheet Process Calculating Payroll Describing Payroll Calculation Running Preliminary Payroll Calculation Running Final Payroll Calculation Confirming Payroll and Producing Checks and Reports Confirming a Payroll Viewing Confirmed Payroll Results Online Printing Checks and Advices Describing Check Reprinting Describing Direct Deposit Transmittals and Reports Describing Payroll and Tax Reports Identifying Methods of Reversing Payroll Confirmati Processing Off-Cycle Payrolls Identifying Off-Cycle Payroll Processing Reversing a Paycheck Describing Reversal/Adjustment Processing Recording a Manual Check Producing an Online Check Describing Retroactive Processing Setting Up and Processing Additional Payroll Functionality Setting Up a Holiday Schedule Setting Up Advanced Earnings Options Setting Up Multiple Jobs Processing Setting Up and Processing Mid-period Job Changes Processing Gross Ups Setting Up and Processing Benefit Deductions in Payroll Setting Up Deductions and Earnings for Benefits Calculations Updating a Benefit Program and Enrolling Employees Analyzing Benefits-Related Payroll Reports Setting Up and Processing Garnishments Identifying Garnishment Setup Steps Describing PeopleSoft-Maintained Garnishment Tables Setting Up Company-Level Tables for Garnishment Processing Assigning an Employee Garnishment Deduction Setting Up Employee Garnishment Specification Data Reviewing Emp Describing PeopleSoft Enterprise ePay Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft 365 and want to incorporate digital note taking and note collaboration by using Microsoft OneNote. Overview In this course, you will develop note-taking skills by creating, modifying, and managing OneNote notebooks that work with other Microsoft 365 applications. You will: Navigate and customize the OneNote environment and create your first notebook. Add and format various types of notes and note elements, including text, links, and drawing objects. Add images, video, audio, Excel spreadsheets, and other types of files to a notebook. Organize, categorize, and search notebook content. Finalize notebook content by checking spelling, printing copies, and password-protecting notebooks. Manage notebooks by exporting content and working with history and backups. Share notebooks using Outlook and collaborate with colleagues using OneDrive. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft's OneNote app provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will help you use OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Additionally, learning how OneNote and other applications in the Microsoft 365 suite are integrated will increase your productivity. Lesson 1: Getting Started with OneNote Topic A: Navigate the OneNote Environment Topic B: Create Notebook Pages from Page Templates Topic C: Customize the OneNote User Interface Lesson 2: Adding and Formatting Notebook Content Topic A: Format Notebook Content Topic B: Add Quick Notes and Linked Notes to a Notebook Topic C: Use Drawing Tools in a Notebook Topic D: Use Dictation in a Notebook Lesson 3: Adding Files to Notebooks Topic A: Insert Images, Video, and Audio into a Notebook Topic B: Embed Excel Spreadsheets in a Notebook Topic C: Attach Other File Types to a Notebook Lesson 4: Organizing Notebook Content Topic A: Use Tags to Categorize Notes Topic B: Organize and Search Notebooks Lesson 5: Finalizing Notebooks Topic A: Proof and Print a Notebook Topic B: Configure Password Protection and Notebook Properties Lesson 6: Managing Notebooks Topic A: Export Content from a Notebook Topic B: Manage Notebook History Lesson 7: Sharing OneNote Content Topic A: Send Notebook Pages to Others Topic B: Work with Integrated Outlook Features Topic C: Collaborate on Notebooks Additional course details: Nexus Humans Microsoft OneNote (Desktop App) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft OneNote (Desktop App) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE?s ArubaOS-Switches. Overview Upon completion of this course, students will be able to: Implement spanning tree protocol and loop protections Ensure redundancy for a network?s default gateway by configuring VRRP on Aruba switches Implement and manage an VSF fabric Deploy ArubaOS switches in single-area and multi-area OSPF systems Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicasts within VLANs Implement PIM-DM to route multicast traffic Establish and monitor BGP sessions between your routers and ISP routers Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on ArubaOS switches to select given traffic Implement 802.1X on ArubaOS switch ports Configure captive portal authentication on ArubaOS switches to integrate them with an Aruba ClearPass solution Configure tunneled-node on ArubaOS switches Configure ArubaOS switches to select traffic, apply the appropriate QoS marking, and place the traffic in the proper priority queues Implement DHCP snooping and ARP protection to defend networks against DHCP exploits, ARP snooping, and ARP poisoning attacks Implement the proper port security measures for various use cases Implement connection rate filtering to provide a first layer of protection against viruses and worms This course teaches students how to implement and operate enterprise-level Aruba campus switching solutions. Hand-on labs gives students experience with ArubaOS-Switches, including securing access, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with HPE?s Virtual SwitchingFramework (VSF). Students will also learn to configure dynamic routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP), network optimization via Quality of Service (QoS), IP multicast routing leveraging Protocol Independent Multicast (PIM), and protecting the network using Access Control Lists (ACLs). This course is approximately 30% lecture and 70% hands on lab exercises. Introduction to Aruba SolutionsData Link Layer Redundancy TechnologiesVirtual Router Redundancy Protocol (VRRP)Aruba Backplane Stacking and Advanced Virtual Switch Framework (VSF)Advanced Open Shortest Path First (OSPF)Internet Group Management Protocol (IGMP)Border Gateway Protocol (BGP)Access Control Lists (ACLs)MAC AuthenticationCaptive Portal and Other Guest OptionsIntegrating with Aruba Mobility SolutionsSecure Device ManagementQuality of Service (QoS)Additional Security Features Additional course details: Nexus Humans Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba Networks - Implementing Aruba Campus Switching Solutions, Rev. 17.41 (IACSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas Æ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice
Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 3 Days 18 CPD hours This course is intended for Programmers Application DevelopersSystem Architects Network ArchitectsNetwork Security Architects IT Professionals w/programming experience Overview Those who attend the Ethereum Development course and pass the exam certification will have a demonstrated knowledge of:An excellent overall understanding of the Ethereum architecture and Solidity language.All functional components (including smart contracts) required to develop an Ethereum Blockchain.The understanding of how to instantiate an Ethereum application on the network.An in-depth understanding of how transactions are created and implemented on an Ethereum network. This 3 day instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum?s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development. The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. What is Blockchain and Smart Contracts? What is Blockchain and how does it work? Bitcoin vs Ethereum Smart Contract How you can use Smart Contracts? Advantages of Smart Contracts Solidity LAB TASK Types of Variables in Solidity Public and Private Code Public Variables and Functions Private Variables and Functions Internal Functions External Functions Smart Contract Constructors Constant Variables Setting Variables LAB CHALLENGE Smart Contracts With WEB3.JS LAB Installing & Running the Ethereum TestRPC Installing Web3.js Changing the Environment in Remix Creating the UI Using Web3.js to Connect & Interact with the Smart Contract SOLUTION LAB CHALLENGE Smart Contract Events With WEB3.JS AIM LAB The Current Contract Defining the Smart Contract Event Updating the UI LAB CHALLENGE Functions, Mappings and Structs THEORY Functions Mappings Structs LAB The Smart Contract Creating a Modifier Using the Modifier Web3 UI?s Modifier Handling LAB Creating a Struct Creating the Mapping Map Addition Get from the Mapping The Full Contract Count from Map LAB CHALLENGE Inheritance and Deployment THEORY Object-oriented programming Inheritance LAB Current Contract Creating a Base Contract Changing from Strings to bytes Continuing the Project Installing MetaMask Deploy Contract to the Ropsten Test Network LAB Update the HTML Form Update the JavaScript Using the App LAB CHALLENGE Embark Framework and It's Deployment Blockchain (Ethereum) Decentralized Storage (IPFS) Decentralized Communication Web Technologies LAB Installing Embark Framework Hello World with Embark Framework First Contract Deployment with Embark Framework Solidity Smart Contracts Testing THEORY What is Software Testing? LAB LAB CHALLENGE Contracts Management With Factories THEORY Factory LAB LAB CHALLENGE IPFS Files Hosting THEORY IPFS FILES HOSTING LAB 1. Get your hosting server 2. Install IPFS on the Server LAB CHALLENGE End to End Development of DAPP AIM LAB Setup the Project Program the Smart Contract Create the Front-end of the application Deploy the App with IPFS LAB CHALLENGE
Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting