Duration 5 Days 30 CPD hours This course is intended for This course is for system administrators or anyone who will be installing, configuring, and managing a Deployment Solution system. Overview This course includes practical exercises using your own network by means of virtual computers enabling you to learn and fine tune the skills required to be successful in your working environment. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Deployment Solution Overview Symantec software overview Symantec Management Platform overview Installing Deployment Solution and pcAnywhere Installation prerequisites Installing the Symantec Installation Manager Installing Deployment Solution Installing agents and plug-ins Upgrading Deployment Solution Deployment Solution Console Fundamentals Console fundamentals Creating and managing Jobs and Tasks Scheduling Jobs and Tasks Monitoring Jobs and Tasks Searching for Jobs, Tasks, and computers Configuring Deployment Solution Adding configuration files and keys Symantec Network Boot Service Preboot configurations Configuring Network Boot Service (PXE/BSDP) Driver database management Preparing a Computer for Imaging Including agents and plug-ins Installing Software Installing software updates and service packs Creating Images Imaging Tools and Types About Prepare for Image capture tasks Creating Images PC Transplant with Deployment Solution PC Transplant overview Creating a PCT template file PC Transplant tasks Editing Personality Packages Building and editing A2i files Deploying Operating Systems & Performing Computer Migrations Deploying Images & Performing Computer Migrations Deploying computer images Unicast and multicast imaging Advanced options when deploying images Changing a computer?s system configuration Initial Deployment imaging Imaging predefined computers Disk preparations Performing scripted OS installations Jobs to migrate computers Installing and Using Deployment Site Servers Understanding Sites and Site Servers Understanding & Installing Deployment Site Server Components Image Management Advanced Features Using job conditions Custom Ghost imaging and Ghost tools Editing image files Creating bootable media Remote control with pcAnywhere Solution About pcAnywhere Solution Installing Symantec pcAnywhere Solution and plug-in Starting a pcAnywhere session Managing a pcAnywhere session Configuring pcAnywhere settings Additional course details: Nexus Humans Symantec Deployment Solution 7.5 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Deployment Solution 7.5 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for computer professionals involved with security compliance using CCS 11.0. Overview At the completion of the course, you will be able to: Describe current security risk and compliance challenges. Define methods of proactive security. Describe CCS 11 and how it helps meet security and compliance needs. Describe general CCS 11.0 pre-deployment considerations. Install CCS 11. Perform initial CCS configuration tasks. Import assets and common fields. Describe how to install CCS Agents. Perform data collection and evaluation. Describe the components of standards. Copy and edit standards. Evaluate collected data in terms of a standard. Describe compliance and risk scores. Manage exceptions. Create, edit, and map control statements. Use Controls Studio to eliminate duplication of controls. Describe mandates, policies, and control statements. Build queries to gather data quickly from assets. Add external data integration and configure data connectors. Use CCS reporting features. Create, edit, and manage dashboards. Investigate contingencies using a ?what if?? analysis in dynamic dashboards. This course focuses on defining security controls that govern the enterprise, assess compliance with standards and other mandates, and create reports and dashboards to demonstrate compliance and show deficiencies to multiple audiences. Introduction to CCS 11.0 Overview of Security and Compliance Proactive Security Into to CCS11 Implementing Security and Compliance with CCS 11.0 Installing the CCS Suite General pre-deployment considerations Pre-installation requirements Installation tasks Initial configuration Getting started tasks Preparing for data collection Getting started with CCS 11.0 Importing assets Installing a UNIX Agent Collecting and evaluating data Standards Manager/CVSS and Risk Score Working with standards Assessing compliance with standards Managing exceptions Controls Studio About Controls Studio Working with Controls Studio Ad hoc queries Query building Querying your enterprise External data integration Connecting to external data sources Overview of third-party connectors Reporting and dashboards Reporting overview Working with dynamic dashboards Additional course details: Nexus Humans Symantec Control Compliance Suite (CCS) 11.0 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Control Compliance Suite (CCS) 11.0 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Technology ConsultantSystem AdministratorSystem ArchitectHelp Desk / COE Support Overview Explain the architecture of SAP NetWeaver AS JavaStart and stop SAP NetWeaver AS JavaCarry out basic configurations for SAP NetWeaver AS JavaClassify network security conceptsSet up SSL encryption for SAP NetWeaver AS JavaExplain the architecture of the User Management EngineConfigure the User Management EngineCarry out user and authorization maintenanceUnderstand and change the standard logon procedure of SAP NetWeaver AS JavaMaintain destinations and the JCo RFC ProviderUnderstand the architecture and the tasks of the SAP NetWeaver Development InfrastructureExplain the process flow of the development process using the SAP NetWeaver Development InfrastructureSpecify the options for monitoring SAP NetWeaver AS JavaConnect SAP NetWeaver AS Java to a central Monitoring systemDisplay Monitoring and logging data using the SAP NetWeaver AdministratorImplement corrections for SAP NetWeaver AS Java In this course, students learn how to explain the architecture of SAP NetWeaver AS Java, carry out basic configurations for SAP NetWeaver AS Java, and much more. Fundamental Concepts of Java Describing the Fundamental Concepts of Java Describing the Architecture of the SAP NetWeaver Application Server (SAP NetWeaver AS) Outlining the Java Cluster Architecture Describing the Internal Structure of SAP NetWeaver AS for Java SAP NetWeavear AS for Java Start and Stop Procedures Starting and Stopping Procedures in SAP NetWeaver AS for Java Evaluating the Tools for Starting and Stopping an SAP System Evaluating Load Balancing Options in SAP NetWeaver AS for Java Operating the Java Startup and Control Framework Analyzing the Logs of Start and Stop Processes in SAP NetWeaver AS for Java Basic Configuration of SAP NetWeaver AS for Java Identifying the Administration Tools Used in Configuration Maintaining the Basic Configuration of SAP NetWeaver AS for Java with the Config Tool Configuring SAP NetWeaver AS for Java with SAP NetWeaver Administrator Configuring the Properties of the Central Services Instance Administering the Internet Communication Manager (ICM) Process Infrastructure Security Describing Network Security Setting Up the Secure Sockets Layer (SSL) User and Authorization Administration Configuring the SAP User Management Engine (UME) Maintaining Users and Groups Managing Java Authorization Administrating Special Principles Configuring the Logon Procedure in SAP NetWeaver AS for Java Java Connectors and Destinations Creating Connections to Other Systems Creating Connections to Other Systems with J2EE Connector Architecture (JCA) Change Management and Software Logistics Structuring the Java Development Approach Describing the Components of SAP NetWeaver Development Infrastructure Developing and Releasing Java Changes with SAP NetWeaver Development Infrastructure Transporting Java Developments Monitoring Monitoring SAP NetWeaver AS for Java Connecting to a Central Monitoring System (CEN) Configuring Availability Monitoring Configuring the Log and Trace Files Monitoring a System with SAP Solution Manager Software Maintenance Preparing for Software Maintenance Describing Java Support Packages, Stacks, and Patches Deploying Corrections with Software Update Manager (SUM) in SAP NetWeaver AS for Java Deploying Java Archives with Alternative Tools Outlining the Backup Strategy in SAP NetWeaver AS for Java
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers. System and technical support engineers. Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. Understand underlying Cisco Unified CCE processes, messaging and fault tolerance schemes. Install, upgrade and make basic configurations in Cisco Unified Communications Manager. Install, create databases, integrate, and upgrade all ICM components to include the ICM Router, Logger, Administration & Data Server, Peripheral Gateways, CTI Gateway and Cisco Finesse. Install, integrate, configure, and upgrade Cisco Unified CVP components to include the CVP Call Server, Voice XML Server, Media Server, Reporting Server and Cisco VVB. Install, upgrade, and make configurations for Cisco Unified Intelligence Center and Cisco Outbound Option Agent- and IVR-based campaigns. This course will provide the student with the underlying knowledge to understand deployment design solutions, requirements for deployment, and how to install and configure all major Cisco Unified CCE components. As a part of deployment activities, the student will understand how to install and integrate Intelligent Contact Manager (ICM) with Active Directory, how to install and integrate Cisco Unified CVP components using an IOS-based voice browser and Cisco Virtualized Voice Browser (Cisco VVB), how to install and integrate Cisco Finesse, how to install and integrate Cisco Unified Intelligence Center with Active Directory and associated Data Sources for reporting purposes, and how to install and configure Agent- and IVR-based Outbound Option dialing campaigns. And finally, the student will learn how to setup and use troubleshooting tools including RTMT, System CLI, Diagnostic Framework, and ICM command-line utilities to find status information and log files, and to track a call from the point of entry to the agent desktop. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Cisco Unified CCE Protocols, Processes and Services Lesson 1: Cisco Unified CM Lesson 2: Cisco Unified CCE/Intelligent Contact Manager Lesson 3: Cisco Unified CVP Installing Cisco Unified Communications Manager Lesson 1: Installation Prerequisites Lesson 2: Cisco Unified CM Installation Lesson 3: Post-installation Configurations Lesson 4: Creating Basic Infrastructure Lesson 5: Upgrading Cisco Unified CM Installing Intelligent Contact Manager Lesson 1: Installation Requirements Lesson 2: Pre-installation Tasks Lesson 3: Install the Main Installer Lesson 4: Install the Central Controller ?Lesson 5: Install the Administration and Data Server Lesson 6: Install the Peripheral Gateway Lesson 7: Install CTI Services Installing Cisco Unified CVP Lesson 1: Installation Prerequisites Lesson 2: Install the CVP Server Lesson 3: Configure Cisco Unified CVP Components Lesson 4: Upgrading Cisco Unified CVP Upgrade Path Installing and Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Cisco Unified Intelligence Center Supporting Cisco Unified CCE Lesson 1: Maintenance Activities Lesson 2: UCCE Troubleshooting Tools
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Content Collaboration, with little or no previous Content Collaboration experience. Potential students include networking administrators, engineers, and architects interested in learning how to deploy or manage Citrix Content Collaboration. Overview Understand Enterprise File Synchronization, Sharing, and Citrix Content Collaboration architecture How to navigate the Citrix Content Collaboration administration interface and build StorageZones How to manage Citrix Content Collaboration users in an Active Directory environment Different StorageZone deployment considerations and scenarios In this course, you?ll learn about how to use Citrix Content Collaboration to share, sync, and secure content for your organization. You?ll understand the Content Collaboration architecture, StorageZone configurations and deployment options available, how to manage and administer your Content Collaboration environment, Citrix Files applications, and how single sign-on, and how to use the User Management Tool for Content Collaboration Content Collaboration Architecture Overview Introduction to Enterprise File Sync and Sharing (EFSS) including its use cases, legal, and data security considerations Review Content Collaboration architecture, components and storage features Management and Administration Getting Started in Content Collaboration How to configure and manage users, folders, permissions and administrative settings Additional cloud-based features and integrations Storage Zone Deployments and Configuration Overview of Storage Zones architecture and deployment options for customer-managed storage including proof-ofconcept, high-availability, and multi-site deployments Review system, networking, and hosting requirements including steps for server preparation, installation and configuration Manage, monitor, and upgrade Storage Zone deployments for optimal performance Single Sign-on and User Management Overview of SAML 2.0 protocol and single-sign on use cases,security and benefits Single Sign-on settings for Content Collaboration and supported identity provider configurations User provisioning with User Management Tool (UMT) and task scheduling for automated updates synchronization with Active Directory Citrix Files Applications Citrix Files application system requirements, configuration and settings Compare features and functionalities for various use case applications and workflows Lifecycle product version considerations Additional course details: Nexus Humans CSF-202: Citrix Content Collaboration Enterprise Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CSF-202: Citrix Content Collaboration Enterprise Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Implement a ClearPass network access solution Design and apply effective services and enforcement in ClearPass Troubleshoot a ClearPass solution This course provides participants the foundational skills in Network Access Con-trol using the Aruba ClearPass product portfolio. This 5-day course includes both instructional modules and labs to teach participants about the major fea-tures in the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Introduction to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles External Devices Network Access Devices Messaging Services External Context Servers Endpoint Profiling Introduction to profiling Profiling collectors External collectors and profilers Roles and Enforcement Services Enforcement ClearPass roles Configuring Services Service selection rules Creating services Configuring Web Services Content Manager Skins Web page editor Guest Authentication Captive portal process Web logins Guest accounts Guest access with MAC authentication Guest Access Self-Registration Self-registration experience Configuring self-registration Self-registration process Wired Authentication Wired access Wired enforcement Profiling on wired ports Downloadable User Roles Requirements for DUR DUR enforcement profiles Dynamic Segmentation What is Dynamic Segmentation? How it works Configuring Dynamic Segmentation OnGuard Configuration Postures Posture policies OnGuard Agent Monitoring OnGuard OnGuard in Enforcement OnGuard workflow OnGuard enforcement Onboard Provisioning Configuring certificate authorities Portal setup Configuring services Onboard Administration Managing certificates Managing users and devices Certificate revocation and OCSP Administrative Operations Licenses Certificates Updates and upgrades Gathering logs ClearPass Cluster Cluster structure Policy Manager zones High availability Administrative Access Admin access to NADs Admin access to Policy Manager Guest operator logins Insight Reports Alerts Reports Administration Additional course details: Nexus Humans Aruba ClearPass Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba ClearPass Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment's app and desktop workloads. You will learn how to plan, build, rollout, and manage on-premises WEM or WEM service and how to integrate it into Citrix Virtual Apps and Desktops or Citrix DaaS. You will leave this course with a good understanding of how to manage additional solutions and features in your Citrix Virtual Apps and Desktop or Citrix DaaS site Module 1: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 2: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 3: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 4: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 5: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 6: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 7: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 8: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 9: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 10: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 11: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 12: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-220 Citrix Workspace Environment Management Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-220 Citrix Workspace Environment Management Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an Introductory level course for experienced Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. Ideally students should have familiarity with basic Python scripting. Attendees without programming skills can follow along with the scripting portion of the labs. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner attendees will explore how to: Describe Ansible concepts and install Red Hat Ansible Engine (optional - we can pre-install is as well if desired, depending on the audience) Deploy Ansible and Configure Ansible to manage hosts and run ad hoc Ansible commands. Implement playbooks Write a simple Ansible playbook and run it to automate tasks on multiple managed hosts. Manage variables and facts Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts. Implement task control; Manage task control, handlers, and task errors in Ansible playbooks. Deploy files to managed hosts Deploy, manage, and adjust files on hosts managed by Ansible. Manage large projects Write playbooks that are optimized for larger, more complex projects. Simplify playbooks with roles Use Ansible roles to develop playbooks more quickly and to reuse Ansible code. Troubleshoot Ansible Troubleshoot playbooks and managed hosts. Automate Linux administration tasks Automate common Linux system administration tasks with Ansible This lab-intensive course is geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows. Throughout the course you will explore core Ansible features such as automatic provisioning, configuration management, service deployment and operational processes. Ansible Overview Overview of Architecture Overview of Deployments Inventory Deploying Ansible Installing Configuration Files Running Ad Hoc Commands Dynamic Inventory Playbooks Writing YAML Files Modules Variables and Inclusions Variables Facts Inclusions Task Control Constructing Flow Control Handlers Tags Handling Errors Jinja2 Templates Jinja2 Templates Jinja2 Templates Roles Role Structure Creating Roles Deploying Roles with Ansible Galaxy Optimizing Ansible Configuring Connection Types Configuring Delegation Configuring Parallelism Ansible Vault Configuring Ansible Vault Executing with Ansible Vault Troubleshooting Ansible Troubleshooting Playbooks Troubleshooting Managed Hosts Ansible Tower Ansible Tower overview Installing Account management Hosts Jobs Optional: Ansible in a DevOps Environment Provisioning Vagrant Machines Deploying Vagrant in a DevOps Environment Deploying Docker in a DevOps Environment Additional course details: Nexus Humans Introduction to Ansible: Automation with Ansible (TTDV7580) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Ansible: Automation with Ansible (TTDV7580) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.